An Evaluation of Naive Bayesian Anti-Spam Filtering

Size: px
Start display at page:

Download "An Evaluation of Naive Bayesian Anti-Spam Filtering"

Transcription

1 Proceedgs of the workshop o Mache earg the New Iformato Age, G. Potamas, V. Moustaks ad M. va omere (eds.), th Europea Coferece o Mache earg, Barceloa, pa, pp. 9-7, A Evaluato of Nave Bayesa At-pam Flterg Io Adroutsopoulos, Joh Koutsas, Kostatos V. Chadros, George Palouras ad Costate D. pyropoulos oftware ad Kowledge Egeerg aoratory Natoal Cetre for cetfc Research Demokrtos 53 0 Ag. Paraskev, Athes, Greece phoe: fax: E-mal: {oadr, jkouts, kostel, palourg, costass}@t.demokrtos.gr Astract It has recetly ee argued that a Nave Bayesa classfer ca e used to flter usolcted ulk e-mal ( spam ). We coduct a thorough evaluato of ths proposal o a corpus that we make pulcly avalale, cotrutg towards stadard echmarks. At the same tme we vestgate the effect of attrute-set sze, trag-corpus sze, lemmatzato, ad stop-lsts o the flter s performace, ssues that had ot ee prevously explored. After troducg approprate cost-sestve evaluato measures, we reach the cocluso that addtoal safety ets are eeded for the Nave Bayesa at-spam flter to e vale practce. Itroducto Usolcted ulk e-mal, electroc messages posted ldly to thousads of recpets, s ecomg alarmgly commo. Although most users fd these postgs called spam aoyg ad delete them mmedately, the low cost of e-mal s a strog ctemet for drect marketers advertsg aythg from vacatos to get-rch schemes. A 997 study (Craor & amaccha, 998) foud that 0% of the comg e-mal to a corporate etwork was spam. Apart from wastg tme, spam costs moey to users wth dal-up coectos, wastes adwdth, ad may expose uder-aged recpets to usutale (e.g. porographc) cotet. ome at-spam flters are already avalale. These rely mostly o maually costructed pattermatchg rules that eed to e tued to each user s comg messages, a task requrg tme ad expertse. Furthermore, the characterstcs of spam (e.g. products advertsed, frequet terms) chage over tme, requrg the rules to e mataed. A system that would lear automatcally to separate spam from other legtmate messages would, therefore, preset sgfcat advatages. everal mache learg algorthms have ee appled to text categorzato (e.g. Apte & Damerau, 994; ews, 996; Daga et al., 997; see easta, 999, for a survey). These algorthms lear to classfy documets to fxed categores, ased o ther cotet, after eg traed o maually categorzed documets. Algorthms of ths kd have also ee used to thread e-mal (ews & Kowles, 997), classfy e-mal to folders (Cohe, 996; Paye & Edwards, 997), detfy terestg ews artcles (ag, 995), etc. To the est of our kowledge, however, oly oe attempt has ever ee made to apply a mache learg algorthm to at-spam flterg (aham et al., 998). aham et al. traed a Nave Bayesa classfer (Duda & Hart, 973; Mtchell 997) o maually categorzed legtmate ad spam messages, reportg mpressve precso ad recall o usee messages. It may e surprsg that text categorzato ca e effectve at-spam flterg: ulke other text categorzato tasks, t s the act of ldly mass-malg a message that makes t spam, ot ts actual cotet. Nevertheless, t seems that the laguage of spam costtutes a dstctve gere, ad that spam messages are ofte aout topcs rarely metoed legtmate messages, makg t possle to tra a text classfer for at-spam flterg. ee, for example, Cosult ad for related resources ad legal ssues.

2 Text categorzato research has eefted from pulcly avalale maually categorzed documet collectos, lke the Reuters corpus (ews, 992), that have ee used as echmarks. Creatg smlar resources for at-spam flterg s ot straghtforward, ecause a user s comg e-mal stream caot e made pulc wthout volatg hs/her prvacy. A useful approxmato of such a stream, however, ca e made y mxg spam messages wth messages extracted from spam-free pulc archves of malg lsts. Towards that drecto, we test aham et al. s approach o a mxture of spam messages ad messages set va the gust lst, 2 a moderated (hece, spam-free) lst aout the professo ad scece of lgustcs. The resultg corpus, dued g-pam, s made pulcly avalale for others to use as a echmark. 3 The gust messages are, of course, more topc-specfc tha most users comg e-mal. They are less stadardzed, however, tha oe mght expect (e.g. they cota jo postgs, software avalalty aoucemets, eve flame-lke resposes), to the extet that useful prelmary coclusos aout atspam flterg of a user s comg e-mal ca e reached wth g-pam, at least utl etter pulc corpora ecome avalale. Wth a more drect terpretato, our expermets ca e see as a study o at-spam flters for ope umoderated malg lsts or ewsgroups. Ulke aham et al., we use te-fold cross-valdato whch makes our results less proe to radom varato. Our expermets also shed more lght o the ehavor of Nave Bayesa at-spam flterg y vestgatg the effect of attrute-set sze, trag-corpus sze, lemmatzato, ad stop-lsts, ssues ot covered y aham et al. s study. Furthermore, we show how evaluato measures that corporate a decso-theoretc oto of cost ca e employed. Our results cofrm aham et al. s hgh precso ad recall. A cost-sestve evaluato, however, suggests that complemetary safety ets are eeded for the Nave Bayesa flter to e vale. ecto 2 dscusses Nave Bayesa classfcato; secto 3 lsts aham et al. s results; secto 4 descres our flterg system, the g-pam corpus, ad our results; secto 5 troduces cost-sestve evaluato measures; ad secto 6 cocludes. 2 Nave Bayesa classfcato Each message s represeted y a vector attrutes x, x, x2, x3, x, where x,, x are the values of X,, X. Followg aham et al., we use ary attrutes: X f some characterstc represeted y X s preset the message; otherwse X 0. I our expermets, attrutes correspod to words,.e. each attrute shows f a partcular word (e.g. adult ) s preset. To select amog all possle attrutes, we follow aham et al. ad compute the mutual formato ( MI ) of each caddate attrute X wth the category-deotg varale C : X x, C c) MI( X ; C) X x, C c) log X x) C ) x { 0,}, c { spam, legtmate} c The attrutes wth the hghest MI s are selected. Proaltes are estmated as frequecy ratos from the trag corpus (see Mtchell, 996, for etter estmators that we pla to corporate future). From Bayes theorem ad the theorem of total proalty, gve the vector documet d, the proalty that d elogs to category c s: x x,, x of a l P ( C c X x) C c) X x C c) k { spam, legtmate} C k) X x C k) The proaltes P ( X C) are practcally mpossle to estmate drectly (the possle values of X are too may, ad there are data-sparseess prolems). The Nave Bayesa classfer makes the smplfyg assumpto that X, l, X are codtoally depedet gve the category C. The: 2 Archved at 3 The g-pam corpus s avalale from

3 P ( C c X x) C c) X C k) x k { spam, legtmate} C c) X x C k) where X C) ad P (C) ca e easly estmated as relatve frequeces from the trag corpus. everal studes have foud the Nave Bayesa classfer to e surprsgly effectve (agley et al., 992; Domgos & Pazza, 996), despte the fact that ts depedece assumpto s usually oversmplstc. Mstakely lockg a legtmate message (classfyg t as spam) s geerally more severe tha lettg a spam message pass the flter (classfyg a spam message as legtmate). et ad deote the two error types. Assumg that s λ tmes more costly tha, we classfy a message as spam f: C spam X x) > λ C legtmate X x) To the extet that the depedece assumpto holds ad the proalty estmates are accurate, a classfer adoptg ths crtero acheves optmal results (Duda & Hart, 973). I our case, P ( C spam X x) C legtmate X x), whch leads to a alteratve reformulato of the crtero: λ t P ( C spam X x) > t, wth t, λ + λ t aham et al. set the threshold t to ( λ 999 );.e. lockg a legtmate message s as ad as lettg 999 spam messages pass the flter. uch a hgh value of λ s reasoale whe locked messages are dscarded wthout further processg, as most users would cosder losg a legtmate message uacceptale. Alteratve cofguratos are possle, however, where lower values of λ are reasoale. Istead of deletg a locked message, t could e retured to the seder, wth a request to re-sed t to a prvate u-fltered e-mal address of the recpet (see also Hall, 998). The prvate address would ever e advertsed (e.g. o we pages), makg t ulkely to receve spam drectly; ad the request to re-sed could clude a frequetly chagg rddle (e.g. Iclude the suject the captal of Frace. ) to esure that reples are ot set y spam-geeratg roots. I that case, λ 9 ( t 0. 9 ) seems reasoale: lockg a legtmate message s pealzed mldly more tha lettg a spam message pass, to model the fact that re-sedg a locked message volves more work (y the seder) tha maually deletg a spam message. Eve λ ( t 0. 5 ) may e acceptale, f the recpet does ot care aout extra work mposed o the seder. 3 Prevous results Tale summarzes aham et al. s results. If ad are the umers of ad errors, ad, are the umers of correctly treated legtmate ad spam messages, the spam recall ( R ) ad spam precso ( P ) are: R + P + I the secod expermet of tale, caddate attrutes cluded ot oly word-attrutes, ut also attrutes showg f partcular had-pcked phrases (e.g. e over 2 ) were preset. I the thrd ad fourth expermets, o-textual caddate attrutes were added, showg f messages had maually chose propertes (e.g. attachmets). aham et al. s phrasal ad o-textual attrutes troduce a maual cofgurato stage, as oe has to select maually phrases ad o-textual characterstcs to e treated as caddate attrutes. ce our target was to explore fully automatc at-spam flterg, we have lmted ourselves to word-attrutes.

4 Tale : Resuls of aham et al. (500 attrutes, threshold 0.999, λ 999 ) Attrutes Total Messages Testg Messages % pam pam Precso pam Recall words oly % 97.% 94.3% words + phrases % 97.6% 94.3% words + phrases + o-textual % 00.0% 98.3% words + phrases + o-textual ~20% 92.3% 80.0% 4 Expermets wth g-pam Our expermets were all performed o the g-pam corpus, whch cossts of: 242 gust messages, otaed y radomly dowloadg dgests from the archves, separatg ther messages, ad removg text added y the lst s server. 48 spam messages, receved y the frst author. Attachmets, HTM tags, ad duplcate spam messages receved o the same day were ot cluded. pam s 6.6% of the corpus, a fgure close to the spam rates of the authors, aham et al. s fourth expermet, ad rates reported elsewhere (Craor & amaccha, 998). Our mplemetato of the Nave Bayesa flter (developed o GATE), cludes a lemmatzer that coverts each word to ts ase form, ad a stop-lst that removes from messages the 00 most frequet words of the Brtsh Natoal Corpus (BNC). 4 The two modules ca e ealed or dsaled, allowg ther effect to e measured. To reduce radom varato, te-fold cross-valdato was employed, ad averaged scores are reported. I a frst seres of expermets, the umer of retaed attrutes (hghest MI ) raged from 50 to 700 y 50, for all comatos of ealed/dsaled lemmatzer ad stop-lst. Three thresholds were tred: t ( λ 999 ), t 0. 9 ( λ 9 ), ad t 0. 5 ( λ ). As dscussed secto 2, these represet three scearos: deletg locked messages; ssug a re-sed request ad accoutg for the seder s extra work; ad ssug a re-sed request gorg the seder s extra work. Fgures 3 show that the flter acheved mpressve spam recall ad precso at all three thresholds, verfyg that sese the fdgs of aham et al. I all cases, lemmatzato seems to mprove results. The stop-lst has a postve effect for λ ad λ 9, ut ts effect looks eglgle for λ 999. Wthout a sgle evaluato measure, however, to e used stead of spam precso ad recall, t s dffcult to check f the effects of the lemmatzer ad the stop-lst are statstcally sgfcat. For λ 999, lockg a legtmate message s much more severe tha lettg a spam message pass the flter. Hece, t seems reasoale to assume that the est cofgurato s the oe that maxmzes spam precso. Ths s acheved wth 300 attrutes ad the lemmatzer ealed (00% spam precso, 63% spam recall; here, the effect of the stop-lst s eglgle). For λ ad λ 9, however, t s hard to tell whch cofgurato (comato of precso ad recall) s est. Aga, a sgle measure s eeded; ad t must e sestve to our cost. We dscuss ths ext. 5 4 GATE, cludg the lemmatzer, s avalale from BNC frequecy lsts are avalale from ftp://ftp.tr.to.ac.uk/pu/c. 5 The F-measure, used formato retreval ad extracto to come recall ad precso, s usutale to our purposes, ecause ts weghtg factor caot e easly related to our oto of cost.

5 spam precso spam precso o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst spam recall o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst spam recall Fgure : pam precso ad recall at t 0.5 ( λ ) Fgure 2: pam precso ad recall at t 0.9 ( λ 9 ) 0.99 spam precso o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst spam recall Fgure 3: pam precso ad recall at t ( λ 999 ) 5 Cost-sestve evaluato measures I classfcato tasks, two commoly used evaluato measures are accuracy ( Acc ) ad error rate ( Err Acc ). I our case: Acc N + + N Err N + + N N ad N are the umers of legtmate ad spam messages to e classfed. Accuracy ad error rate assg equal weghts to the two error types ( ad ). Whe selectg the threshold of the classfer (secto 2), however, we assumed that s λ tmes more costly tha. To make accuracy ad error rate sestve to ths cost, we treat each legtmate message as f t were λ messages: whe a legtmate message s msclassfed, ths couts as λ errors; ad whe t s classfed correctly, ths couts as λ successes. Ths leads to weghted accuracy (WAcc ) ad weghted error rate ( WErr WAcc ): WAcc λ λ N + + N WErr λ λ N + + N

6 Tale 2: Results o g-pam for est o. of attrutes (2893 total messages, 6.6% spam, 0-fold cross valdato, attrutes ragg from 50 to 700 y a step of 50) Flter Cofgurato λ No. of pam pam Weghted Basele TCR attr. Recall Precso Accuracy W. Acc. (a) are % 96.85% % % 4.63 () stop-lst % 97.3% % % 4.96 (c) lemmatzer % 99.02% % % 5.4 (d) lemmatzer + stop-lst % 99.49% % % 5.66 (a) are % 99.46% 99.49% % 3.73 () stop-lst % 99.47% 99.40% % 3.62 (c) lemmatzer % 99.45% % % 3.82 (d) lemmatzer + stop-lst % 99.47% % % 3.94 (a) are % 99.43% 99.92% % 0.23 () stop-lst % 99.43% 99.92% % 0.23 (c) lemmatzer % 00.00% % % 2.86 (d) lemmatzer + stop-lst % 00.00% % % 2.86 Whe usg accuracy or error rate (weghted or ot), t s mportat to compare to a smplstc asele approach, to avod msterpretg the ofte hgh accuracy ad low error rate scores. As asele, we use the case where o flter s preset: legtmate messages are (correctly) ever locked, ad spam messages (mstakely) always pass the flter. The weghted accuracy ad error rate of the asele are: WAcc λ N λ N + N WErr N λ N + N To compare easly wth the asele, we troduce the total cost rato (TCR ): WErr TCR WErr λ N + Greater TCR dcates etter performace. For TCR <, ot usg the flter s etter. If cost s proportoal to wasted tme, TCR measures how much tme s wasted to delete maually all spam messages whe o flter s preset ( N ), compared to the tme wasted to delete maually ay spam messages that passed the flter ( ) plus the tme eeded to recover from mstakely locked legtmate messages ( λ ). Tale 2 lsts spam recall, spam precso, weghted accuracy, asele weghted accuracy, ad TCR, for varous cofguratos of the flter, ad for the umer of attrutes that led to the hghest TCR wth each cofgurato. Fgures 4 6 show TCR for dfferet umers of attrutes, ad λ, 9, 999. I all cases, te-fold cross valdato was used, ad average WAcc s reported. TCR s computed as WErr dvded y the average WErr. Icreasg the umer of attrutes eyod a certa pot geerally degrades performace, ecause attrutes wth low MI do ot dscrmate well etwee the two categores. At all three λ values, the hghest TCR scores were otaed wth the lemmatzer ealed. The stop-lst had a addtoal postve effect for λ ad λ 9, ut ot for λ 999. The dffereces, however, are ot always statstcally sgfcat. For λ, pared sgle-taled t-tests o WAcc etwee all flter cofguratos of tale 2 cofrm oly that cofguratos () ad (d) are etter tha (a) at p < All four cofguratos, however, are sgfcatly etter tha the asele at p < For λ 9, oe of

7 TCR o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst umer of retaed attrutes Fgure 4: TCR at t 0. 5 ( λ ) Fgure 5: TCR at t 0. 9 ( λ 9 ) TCR o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst umer of retaed attrutes TCR o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst umer of retaed attrutes TCR lamda, 00 attrutes lamda 9, 00 attrutes lamda 999, 300 attrutes 0.0 0% 20% 30% 40% 50% 60% 70% 80% 90% 00% sze of trag corpus (00% s 2603 messages) Fgure 6: TCR at t ( λ 999 ) Fgure 7: TCR for varale trag corpus sze, wth lemmatzer ad stop-lst the hypotheses of tale 2, e.g. that cofgurato (d) s etter tha (a), are statstcally sgfcat at p < 0.05, ut all cofguratos are, aga, sgfcatly etter tha the asele at p < For λ 999, the flter acheves TCR > oly wth the lemmatzer ealed. The stop-lst has essetally o effect, ad oth cofguratos (c) ad (d) are sgfcatly etter tha the asele at p < Overall, for λ ad λ 9 the flter demostrates a stale ehavor, wth TCR costatly greater tha. For λ 999, however, the flter acheves TCR > oly for oe partcular umer of attrutes (300), ecause the error s pealzed so heavly that a sgle locked legtmate message s eough for WAcc to exceed WAcc (the flter makes o such error at 300 attrutes). I a real applcato, t s ulkely that oe would e ale to p-pot precsely the optmal umer of attrutes, whch casts douts over the applcalty of the flter for λ 999. Eve more worryg, for λ 999, are the results of a secod seres of expermets we performed, ths tme varyg the sze of the trag corpus. At every te-fold repetto, g-pam was dvded to te parts, wth oe part reserved for testg. From each oe of the remag e parts, oly x % was used for trag, wth x ragg from 0 to 00 y 0. Fgure 7 shows the resultg TCR scores for λ, 0.9, All expermets were coducted wth the lemmatzer ad stop-lst ealed, ad wth the est umers of attrutes, as tale 2.

8 Ulke λ ad λ 9, for λ 999 the flter reached TCR > oly wth 00% of the trag corpus, ad oe caot easly assume that TCR would rema > gve more trag. (We attrute the tal peak of TCR to the fact that wth very lttle trag the classfer teds to classfy all messages to the most frequet category, legtmate, whch protects t from makg a costly error). These fdgs suggest that whe λ 999, the flter s ot safe eough to use. 6 Coclusos Our cost-sestve evaluato suggests that, despte ts hgh spam recall ad precso, the Nave Bayesa flter s ot vale whe locked messages are deleted (a stuato we modelled wth λ 999 ). Wth addtoal safety ets, however, lke re-sedg to prvate addresses, the cost of lockg a legtmate message s lower (we used λ ad λ 9), ad the flter has a stale sgfcat postve cotruto. We pla to mplemet at-spam flters ased o alteratve mache learg algorthms, ad compare them to the Nave Bayesa flter. We expect automatc at-spam flterg to ecome a mportat memer of a emergg famly of juk-flterg tools for the Iteret, whch wll clude tools to remove advertsemets (Kushmerck, 999), ad lock hostle or porographc materal (Forsyth, 996; pertus, 997). Refereces. Apte, C., ad Damerau, F. Automated earg of Decso Rules for Text Categorzato. ACM Trasactos o Iformato ystems, 2(3):233 25, Cohe, W.W. earg Rules that Classfy E-Mal. Proceedgs of the AAAI prg ymposum o Mache earg Iformato Access, taford, Calfora, Craor,.F., ad amaccha, B.A. pam! Commucatos of ACM, 4(8):74 83, Daga, I., Karov, Y., ad Roth, D. Mstake-Drve earg Text Categorzato. Proceedgs of the 2 d Coferece o Emprcal Methods Natural aguage Processg, pages 55 63, Provdece, Rhode Islad, Domgos, P., ad Pazza, M. Beyod Idepedece: Codtos for the Optmalty of the mple Bayesa Classfer. Proceedgs of the 3 th It. Coferece o Mache earg, pp. 05 2, Bar, Italy, Duda, R.O., ad Hart, P.E. Bayes Decso Theory. Chapter 2 Patter Classfcato ad cee Aalyss, pp Joh Wley, Hall, R.J. How to Avod Uwated Emal. Commucatos of ACM, 4(3):88 95, Kushmerck, N. earg to Remove Iteret Advertsemets. Proceedgs of the 3 rd Iteratoal Coferece o Autoomous Agets, pp. 75 8, eattle, Washgto, ag, K. Newsweeder: earg to Flter Netews. Proceedgs of the 2 th It. Coferece o Mache earg, pp , taford, Calfora, agley, P., Waye, I., ad Thompso, K.. A Aalyss of Bayesa Classfers. Proceedgs of the 0 th Natoal Coferece o AI, pp , a Jose, Calfora, ews, D. Feature electo ad Feature Extracto for Text Categorzato. Proceedgs of the DARPA Workshop o peech ad Natural aguage, pp , Harrma, New York, ews, D. Trag Algorthms for ear Text Classfers. Proceedgs of the 9 th Aual Iteratoal ACM-IGIR Coferece o Research ad Developmet Iformato Retreval, pp , Kostaz, Germay, ews, D. ad Kowles, K.A. Threadg Electroc Mal: A Prelmary tudy. Iformato Processg ad Maagemet, 33(2):209 27, Mtchell, T.M. Mache earg. McGraw-Hll, 997.

9 5. Paye, T.R. ad Edwards, P. Iterface Agets that ear: A Ivestgato of earg Issues a Mal Aget Iterface. Appled Artfcal Itellgece, (): 32, aham, M., Dumas,., Heckerma, D., ad Horvtz, E. A Bayesa Approach to Flterg Juk E- Mal. I earg for Text Categorzato Papers from the AAAI Workshop, pp , Madso Wscos. AAAI Techcal Report W-98-05, easta, F. Mache earg Automated Text Categorsato. Techcal Reeport B4-3, Isttuto d Elaorazoe dell'iformazoe, Cosglo Nazoale delle Rcerche, Psa, pertus, E. mokey: Automatc Recogto of Hostle Messages. Proceedgs of the 4 th Natoal Coferece o AI ad the 9 th Coferece o Iovatve Applcatos of AI, pp , Provdece, Rhode Islad, 997.

Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1

Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1 Learg to Flter Spam E-Mal: A Comparso of a Nave Bayesa ad a Memory-Based Approach 1 Io Adroutsopoulos, Georgos Palouras, Vagels Karkaletss, Georgos Sakks, Costate D. Spyropoulos ad Paagots Stamatopoulos

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Measuring the Quality of Credit Scoring Models

Measuring the Quality of Credit Scoring Models Measur the Qualty of Credt cor Models Mart Řezáč Dept. of Matheatcs ad tatstcs, Faculty of cece, Masaryk Uversty CCC XI, Edurh Auust 009 Cotet. Itroducto 3. Good/ad clet defto 4 3. Measur the qualty 6

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 [email protected]

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

The paper presents Constant Rebalanced Portfolio first introduced by Thomas

The paper presents Constant Rebalanced Portfolio first introduced by Thomas Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

AP Statistics 2006 Free-Response Questions Form B

AP Statistics 2006 Free-Response Questions Form B AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

A probabilistic part-of-speech tagger for Swedish

A probabilistic part-of-speech tagger for Swedish A probablstc part-of-speech tagger for Swedsh eter Nlsso Departmet of Computer Scece Uversty of Lud Lud, Swede [email protected] Abstract Ths paper presets a project for mplemetg ad evaluatg a probablstc

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Entropy-Based Link Analysis for Mining Web Informative Structures

Entropy-Based Link Analysis for Mining Web Informative Structures Etropy-Based Lk Aalyss for Mg Web Iformatve Structures Hug-Yu Kao, Sha-Hua L *, Ja-Mg Ho *, Mg-Sya Che Electrcal Egeerg Departmet Natoal Tawa Uversty Tape, Tawa, ROC E-Mal: {[email protected], [email protected]}

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:[email protected]

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:[email protected] Abstract here s some very mportat meag the study of realtme

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data Usg Data Mg Techques to Predct Product Qualty from Physcochemcal Data A. Nachev 1, M. Hoga 1 1 Busess Iformato Systems, Cares Busess School, NUI, Galway, Irelad Abstract - Product qualty certfcato s sometmes

More information

The Popularity Parameter in Unstructured P2P File Sharing Networks

The Popularity Parameter in Unstructured P2P File Sharing Networks The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN

More information

GRADUATION PROJECT REPORT

GRADUATION PROJECT REPORT SPAM Flter School of Publc Admtrato Computer Stude Program GRADUATION PROJECT REPORT 2007-I-A02 SPAM Flter Project group leader: Project group member: Supervor: Aeor: Academc year (emeter): MCCS390 Graduato

More information

CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel

CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel CHAPTER 3 Smple Lear Regresso USING STATISTICS @ Suflowers Apparel 3 TYPES OF REGRESSION MODELS 3 DETERMINING THE SIMPLE LINEAR REGRESSION EQUATION The Least-Squares Method Vsual Exploratos: Explorg Smple

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Near Neighbor Distribution in Sets of Fractal Nature

Near Neighbor Distribution in Sets of Fractal Nature Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

Efficient Compensation for Regulatory Takings. and Oregon s Measure 37

Efficient Compensation for Regulatory Takings. and Oregon s Measure 37 Effcet Compesato for Regulatory Takgs ad Orego s Measure 37 Jack Scheffer Ph.D. Studet Dept. of Agrcultural, Evrometal ad Developmet Ecoomcs The Oho State Uversty 2120 Fyffe Road Columbus, OH 43210-1067

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha [email protected] Abstract Moey lauderg

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information