An Evaluation of Naive Bayesian Anti-Spam Filtering
|
|
|
- Vernon Eaton
- 10 years ago
- Views:
Transcription
1 Proceedgs of the workshop o Mache earg the New Iformato Age, G. Potamas, V. Moustaks ad M. va omere (eds.), th Europea Coferece o Mache earg, Barceloa, pa, pp. 9-7, A Evaluato of Nave Bayesa At-pam Flterg Io Adroutsopoulos, Joh Koutsas, Kostatos V. Chadros, George Palouras ad Costate D. pyropoulos oftware ad Kowledge Egeerg aoratory Natoal Cetre for cetfc Research Demokrtos 53 0 Ag. Paraskev, Athes, Greece phoe: fax: E-mal: {oadr, jkouts, kostel, palourg, costass}@t.demokrtos.gr Astract It has recetly ee argued that a Nave Bayesa classfer ca e used to flter usolcted ulk e-mal ( spam ). We coduct a thorough evaluato of ths proposal o a corpus that we make pulcly avalale, cotrutg towards stadard echmarks. At the same tme we vestgate the effect of attrute-set sze, trag-corpus sze, lemmatzato, ad stop-lsts o the flter s performace, ssues that had ot ee prevously explored. After troducg approprate cost-sestve evaluato measures, we reach the cocluso that addtoal safety ets are eeded for the Nave Bayesa at-spam flter to e vale practce. Itroducto Usolcted ulk e-mal, electroc messages posted ldly to thousads of recpets, s ecomg alarmgly commo. Although most users fd these postgs called spam aoyg ad delete them mmedately, the low cost of e-mal s a strog ctemet for drect marketers advertsg aythg from vacatos to get-rch schemes. A 997 study (Craor & amaccha, 998) foud that 0% of the comg e-mal to a corporate etwork was spam. Apart from wastg tme, spam costs moey to users wth dal-up coectos, wastes adwdth, ad may expose uder-aged recpets to usutale (e.g. porographc) cotet. ome at-spam flters are already avalale. These rely mostly o maually costructed pattermatchg rules that eed to e tued to each user s comg messages, a task requrg tme ad expertse. Furthermore, the characterstcs of spam (e.g. products advertsed, frequet terms) chage over tme, requrg the rules to e mataed. A system that would lear automatcally to separate spam from other legtmate messages would, therefore, preset sgfcat advatages. everal mache learg algorthms have ee appled to text categorzato (e.g. Apte & Damerau, 994; ews, 996; Daga et al., 997; see easta, 999, for a survey). These algorthms lear to classfy documets to fxed categores, ased o ther cotet, after eg traed o maually categorzed documets. Algorthms of ths kd have also ee used to thread e-mal (ews & Kowles, 997), classfy e-mal to folders (Cohe, 996; Paye & Edwards, 997), detfy terestg ews artcles (ag, 995), etc. To the est of our kowledge, however, oly oe attempt has ever ee made to apply a mache learg algorthm to at-spam flterg (aham et al., 998). aham et al. traed a Nave Bayesa classfer (Duda & Hart, 973; Mtchell 997) o maually categorzed legtmate ad spam messages, reportg mpressve precso ad recall o usee messages. It may e surprsg that text categorzato ca e effectve at-spam flterg: ulke other text categorzato tasks, t s the act of ldly mass-malg a message that makes t spam, ot ts actual cotet. Nevertheless, t seems that the laguage of spam costtutes a dstctve gere, ad that spam messages are ofte aout topcs rarely metoed legtmate messages, makg t possle to tra a text classfer for at-spam flterg. ee, for example, Cosult ad for related resources ad legal ssues.
2 Text categorzato research has eefted from pulcly avalale maually categorzed documet collectos, lke the Reuters corpus (ews, 992), that have ee used as echmarks. Creatg smlar resources for at-spam flterg s ot straghtforward, ecause a user s comg e-mal stream caot e made pulc wthout volatg hs/her prvacy. A useful approxmato of such a stream, however, ca e made y mxg spam messages wth messages extracted from spam-free pulc archves of malg lsts. Towards that drecto, we test aham et al. s approach o a mxture of spam messages ad messages set va the gust lst, 2 a moderated (hece, spam-free) lst aout the professo ad scece of lgustcs. The resultg corpus, dued g-pam, s made pulcly avalale for others to use as a echmark. 3 The gust messages are, of course, more topc-specfc tha most users comg e-mal. They are less stadardzed, however, tha oe mght expect (e.g. they cota jo postgs, software avalalty aoucemets, eve flame-lke resposes), to the extet that useful prelmary coclusos aout atspam flterg of a user s comg e-mal ca e reached wth g-pam, at least utl etter pulc corpora ecome avalale. Wth a more drect terpretato, our expermets ca e see as a study o at-spam flters for ope umoderated malg lsts or ewsgroups. Ulke aham et al., we use te-fold cross-valdato whch makes our results less proe to radom varato. Our expermets also shed more lght o the ehavor of Nave Bayesa at-spam flterg y vestgatg the effect of attrute-set sze, trag-corpus sze, lemmatzato, ad stop-lsts, ssues ot covered y aham et al. s study. Furthermore, we show how evaluato measures that corporate a decso-theoretc oto of cost ca e employed. Our results cofrm aham et al. s hgh precso ad recall. A cost-sestve evaluato, however, suggests that complemetary safety ets are eeded for the Nave Bayesa flter to e vale. ecto 2 dscusses Nave Bayesa classfcato; secto 3 lsts aham et al. s results; secto 4 descres our flterg system, the g-pam corpus, ad our results; secto 5 troduces cost-sestve evaluato measures; ad secto 6 cocludes. 2 Nave Bayesa classfcato Each message s represeted y a vector attrutes x, x, x2, x3, x, where x,, x are the values of X,, X. Followg aham et al., we use ary attrutes: X f some characterstc represeted y X s preset the message; otherwse X 0. I our expermets, attrutes correspod to words,.e. each attrute shows f a partcular word (e.g. adult ) s preset. To select amog all possle attrutes, we follow aham et al. ad compute the mutual formato ( MI ) of each caddate attrute X wth the category-deotg varale C : X x, C c) MI( X ; C) X x, C c) log X x) C ) x { 0,}, c { spam, legtmate} c The attrutes wth the hghest MI s are selected. Proaltes are estmated as frequecy ratos from the trag corpus (see Mtchell, 996, for etter estmators that we pla to corporate future). From Bayes theorem ad the theorem of total proalty, gve the vector documet d, the proalty that d elogs to category c s: x x,, x of a l P ( C c X x) C c) X x C c) k { spam, legtmate} C k) X x C k) The proaltes P ( X C) are practcally mpossle to estmate drectly (the possle values of X are too may, ad there are data-sparseess prolems). The Nave Bayesa classfer makes the smplfyg assumpto that X, l, X are codtoally depedet gve the category C. The: 2 Archved at 3 The g-pam corpus s avalale from
3 P ( C c X x) C c) X C k) x k { spam, legtmate} C c) X x C k) where X C) ad P (C) ca e easly estmated as relatve frequeces from the trag corpus. everal studes have foud the Nave Bayesa classfer to e surprsgly effectve (agley et al., 992; Domgos & Pazza, 996), despte the fact that ts depedece assumpto s usually oversmplstc. Mstakely lockg a legtmate message (classfyg t as spam) s geerally more severe tha lettg a spam message pass the flter (classfyg a spam message as legtmate). et ad deote the two error types. Assumg that s λ tmes more costly tha, we classfy a message as spam f: C spam X x) > λ C legtmate X x) To the extet that the depedece assumpto holds ad the proalty estmates are accurate, a classfer adoptg ths crtero acheves optmal results (Duda & Hart, 973). I our case, P ( C spam X x) C legtmate X x), whch leads to a alteratve reformulato of the crtero: λ t P ( C spam X x) > t, wth t, λ + λ t aham et al. set the threshold t to ( λ 999 );.e. lockg a legtmate message s as ad as lettg 999 spam messages pass the flter. uch a hgh value of λ s reasoale whe locked messages are dscarded wthout further processg, as most users would cosder losg a legtmate message uacceptale. Alteratve cofguratos are possle, however, where lower values of λ are reasoale. Istead of deletg a locked message, t could e retured to the seder, wth a request to re-sed t to a prvate u-fltered e-mal address of the recpet (see also Hall, 998). The prvate address would ever e advertsed (e.g. o we pages), makg t ulkely to receve spam drectly; ad the request to re-sed could clude a frequetly chagg rddle (e.g. Iclude the suject the captal of Frace. ) to esure that reples are ot set y spam-geeratg roots. I that case, λ 9 ( t 0. 9 ) seems reasoale: lockg a legtmate message s pealzed mldly more tha lettg a spam message pass, to model the fact that re-sedg a locked message volves more work (y the seder) tha maually deletg a spam message. Eve λ ( t 0. 5 ) may e acceptale, f the recpet does ot care aout extra work mposed o the seder. 3 Prevous results Tale summarzes aham et al. s results. If ad are the umers of ad errors, ad, are the umers of correctly treated legtmate ad spam messages, the spam recall ( R ) ad spam precso ( P ) are: R + P + I the secod expermet of tale, caddate attrutes cluded ot oly word-attrutes, ut also attrutes showg f partcular had-pcked phrases (e.g. e over 2 ) were preset. I the thrd ad fourth expermets, o-textual caddate attrutes were added, showg f messages had maually chose propertes (e.g. attachmets). aham et al. s phrasal ad o-textual attrutes troduce a maual cofgurato stage, as oe has to select maually phrases ad o-textual characterstcs to e treated as caddate attrutes. ce our target was to explore fully automatc at-spam flterg, we have lmted ourselves to word-attrutes.
4 Tale : Resuls of aham et al. (500 attrutes, threshold 0.999, λ 999 ) Attrutes Total Messages Testg Messages % pam pam Precso pam Recall words oly % 97.% 94.3% words + phrases % 97.6% 94.3% words + phrases + o-textual % 00.0% 98.3% words + phrases + o-textual ~20% 92.3% 80.0% 4 Expermets wth g-pam Our expermets were all performed o the g-pam corpus, whch cossts of: 242 gust messages, otaed y radomly dowloadg dgests from the archves, separatg ther messages, ad removg text added y the lst s server. 48 spam messages, receved y the frst author. Attachmets, HTM tags, ad duplcate spam messages receved o the same day were ot cluded. pam s 6.6% of the corpus, a fgure close to the spam rates of the authors, aham et al. s fourth expermet, ad rates reported elsewhere (Craor & amaccha, 998). Our mplemetato of the Nave Bayesa flter (developed o GATE), cludes a lemmatzer that coverts each word to ts ase form, ad a stop-lst that removes from messages the 00 most frequet words of the Brtsh Natoal Corpus (BNC). 4 The two modules ca e ealed or dsaled, allowg ther effect to e measured. To reduce radom varato, te-fold cross-valdato was employed, ad averaged scores are reported. I a frst seres of expermets, the umer of retaed attrutes (hghest MI ) raged from 50 to 700 y 50, for all comatos of ealed/dsaled lemmatzer ad stop-lst. Three thresholds were tred: t ( λ 999 ), t 0. 9 ( λ 9 ), ad t 0. 5 ( λ ). As dscussed secto 2, these represet three scearos: deletg locked messages; ssug a re-sed request ad accoutg for the seder s extra work; ad ssug a re-sed request gorg the seder s extra work. Fgures 3 show that the flter acheved mpressve spam recall ad precso at all three thresholds, verfyg that sese the fdgs of aham et al. I all cases, lemmatzato seems to mprove results. The stop-lst has a postve effect for λ ad λ 9, ut ts effect looks eglgle for λ 999. Wthout a sgle evaluato measure, however, to e used stead of spam precso ad recall, t s dffcult to check f the effects of the lemmatzer ad the stop-lst are statstcally sgfcat. For λ 999, lockg a legtmate message s much more severe tha lettg a spam message pass the flter. Hece, t seems reasoale to assume that the est cofgurato s the oe that maxmzes spam precso. Ths s acheved wth 300 attrutes ad the lemmatzer ealed (00% spam precso, 63% spam recall; here, the effect of the stop-lst s eglgle). For λ ad λ 9, however, t s hard to tell whch cofgurato (comato of precso ad recall) s est. Aga, a sgle measure s eeded; ad t must e sestve to our cost. We dscuss ths ext. 5 4 GATE, cludg the lemmatzer, s avalale from BNC frequecy lsts are avalale from ftp://ftp.tr.to.ac.uk/pu/c. 5 The F-measure, used formato retreval ad extracto to come recall ad precso, s usutale to our purposes, ecause ts weghtg factor caot e easly related to our oto of cost.
5 spam precso spam precso o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst spam recall o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst spam recall Fgure : pam precso ad recall at t 0.5 ( λ ) Fgure 2: pam precso ad recall at t 0.9 ( λ 9 ) 0.99 spam precso o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst spam recall Fgure 3: pam precso ad recall at t ( λ 999 ) 5 Cost-sestve evaluato measures I classfcato tasks, two commoly used evaluato measures are accuracy ( Acc ) ad error rate ( Err Acc ). I our case: Acc N + + N Err N + + N N ad N are the umers of legtmate ad spam messages to e classfed. Accuracy ad error rate assg equal weghts to the two error types ( ad ). Whe selectg the threshold of the classfer (secto 2), however, we assumed that s λ tmes more costly tha. To make accuracy ad error rate sestve to ths cost, we treat each legtmate message as f t were λ messages: whe a legtmate message s msclassfed, ths couts as λ errors; ad whe t s classfed correctly, ths couts as λ successes. Ths leads to weghted accuracy (WAcc ) ad weghted error rate ( WErr WAcc ): WAcc λ λ N + + N WErr λ λ N + + N
6 Tale 2: Results o g-pam for est o. of attrutes (2893 total messages, 6.6% spam, 0-fold cross valdato, attrutes ragg from 50 to 700 y a step of 50) Flter Cofgurato λ No. of pam pam Weghted Basele TCR attr. Recall Precso Accuracy W. Acc. (a) are % 96.85% % % 4.63 () stop-lst % 97.3% % % 4.96 (c) lemmatzer % 99.02% % % 5.4 (d) lemmatzer + stop-lst % 99.49% % % 5.66 (a) are % 99.46% 99.49% % 3.73 () stop-lst % 99.47% 99.40% % 3.62 (c) lemmatzer % 99.45% % % 3.82 (d) lemmatzer + stop-lst % 99.47% % % 3.94 (a) are % 99.43% 99.92% % 0.23 () stop-lst % 99.43% 99.92% % 0.23 (c) lemmatzer % 00.00% % % 2.86 (d) lemmatzer + stop-lst % 00.00% % % 2.86 Whe usg accuracy or error rate (weghted or ot), t s mportat to compare to a smplstc asele approach, to avod msterpretg the ofte hgh accuracy ad low error rate scores. As asele, we use the case where o flter s preset: legtmate messages are (correctly) ever locked, ad spam messages (mstakely) always pass the flter. The weghted accuracy ad error rate of the asele are: WAcc λ N λ N + N WErr N λ N + N To compare easly wth the asele, we troduce the total cost rato (TCR ): WErr TCR WErr λ N + Greater TCR dcates etter performace. For TCR <, ot usg the flter s etter. If cost s proportoal to wasted tme, TCR measures how much tme s wasted to delete maually all spam messages whe o flter s preset ( N ), compared to the tme wasted to delete maually ay spam messages that passed the flter ( ) plus the tme eeded to recover from mstakely locked legtmate messages ( λ ). Tale 2 lsts spam recall, spam precso, weghted accuracy, asele weghted accuracy, ad TCR, for varous cofguratos of the flter, ad for the umer of attrutes that led to the hghest TCR wth each cofgurato. Fgures 4 6 show TCR for dfferet umers of attrutes, ad λ, 9, 999. I all cases, te-fold cross valdato was used, ad average WAcc s reported. TCR s computed as WErr dvded y the average WErr. Icreasg the umer of attrutes eyod a certa pot geerally degrades performace, ecause attrutes wth low MI do ot dscrmate well etwee the two categores. At all three λ values, the hghest TCR scores were otaed wth the lemmatzer ealed. The stop-lst had a addtoal postve effect for λ ad λ 9, ut ot for λ 999. The dffereces, however, are ot always statstcally sgfcat. For λ, pared sgle-taled t-tests o WAcc etwee all flter cofguratos of tale 2 cofrm oly that cofguratos () ad (d) are etter tha (a) at p < All four cofguratos, however, are sgfcatly etter tha the asele at p < For λ 9, oe of
7 TCR o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst umer of retaed attrutes Fgure 4: TCR at t 0. 5 ( λ ) Fgure 5: TCR at t 0. 9 ( λ 9 ) TCR o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst umer of retaed attrutes TCR o lemmatzer, o stop-lst o lemmatzer, top-00 stop-lst wth lemmatzer, o stop-lst umer of retaed attrutes TCR lamda, 00 attrutes lamda 9, 00 attrutes lamda 999, 300 attrutes 0.0 0% 20% 30% 40% 50% 60% 70% 80% 90% 00% sze of trag corpus (00% s 2603 messages) Fgure 6: TCR at t ( λ 999 ) Fgure 7: TCR for varale trag corpus sze, wth lemmatzer ad stop-lst the hypotheses of tale 2, e.g. that cofgurato (d) s etter tha (a), are statstcally sgfcat at p < 0.05, ut all cofguratos are, aga, sgfcatly etter tha the asele at p < For λ 999, the flter acheves TCR > oly wth the lemmatzer ealed. The stop-lst has essetally o effect, ad oth cofguratos (c) ad (d) are sgfcatly etter tha the asele at p < Overall, for λ ad λ 9 the flter demostrates a stale ehavor, wth TCR costatly greater tha. For λ 999, however, the flter acheves TCR > oly for oe partcular umer of attrutes (300), ecause the error s pealzed so heavly that a sgle locked legtmate message s eough for WAcc to exceed WAcc (the flter makes o such error at 300 attrutes). I a real applcato, t s ulkely that oe would e ale to p-pot precsely the optmal umer of attrutes, whch casts douts over the applcalty of the flter for λ 999. Eve more worryg, for λ 999, are the results of a secod seres of expermets we performed, ths tme varyg the sze of the trag corpus. At every te-fold repetto, g-pam was dvded to te parts, wth oe part reserved for testg. From each oe of the remag e parts, oly x % was used for trag, wth x ragg from 0 to 00 y 0. Fgure 7 shows the resultg TCR scores for λ, 0.9, All expermets were coducted wth the lemmatzer ad stop-lst ealed, ad wth the est umers of attrutes, as tale 2.
8 Ulke λ ad λ 9, for λ 999 the flter reached TCR > oly wth 00% of the trag corpus, ad oe caot easly assume that TCR would rema > gve more trag. (We attrute the tal peak of TCR to the fact that wth very lttle trag the classfer teds to classfy all messages to the most frequet category, legtmate, whch protects t from makg a costly error). These fdgs suggest that whe λ 999, the flter s ot safe eough to use. 6 Coclusos Our cost-sestve evaluato suggests that, despte ts hgh spam recall ad precso, the Nave Bayesa flter s ot vale whe locked messages are deleted (a stuato we modelled wth λ 999 ). Wth addtoal safety ets, however, lke re-sedg to prvate addresses, the cost of lockg a legtmate message s lower (we used λ ad λ 9), ad the flter has a stale sgfcat postve cotruto. We pla to mplemet at-spam flters ased o alteratve mache learg algorthms, ad compare them to the Nave Bayesa flter. We expect automatc at-spam flterg to ecome a mportat memer of a emergg famly of juk-flterg tools for the Iteret, whch wll clude tools to remove advertsemets (Kushmerck, 999), ad lock hostle or porographc materal (Forsyth, 996; pertus, 997). Refereces. Apte, C., ad Damerau, F. Automated earg of Decso Rules for Text Categorzato. ACM Trasactos o Iformato ystems, 2(3):233 25, Cohe, W.W. earg Rules that Classfy E-Mal. Proceedgs of the AAAI prg ymposum o Mache earg Iformato Access, taford, Calfora, Craor,.F., ad amaccha, B.A. pam! Commucatos of ACM, 4(8):74 83, Daga, I., Karov, Y., ad Roth, D. Mstake-Drve earg Text Categorzato. Proceedgs of the 2 d Coferece o Emprcal Methods Natural aguage Processg, pages 55 63, Provdece, Rhode Islad, Domgos, P., ad Pazza, M. Beyod Idepedece: Codtos for the Optmalty of the mple Bayesa Classfer. Proceedgs of the 3 th It. Coferece o Mache earg, pp. 05 2, Bar, Italy, Duda, R.O., ad Hart, P.E. Bayes Decso Theory. Chapter 2 Patter Classfcato ad cee Aalyss, pp Joh Wley, Hall, R.J. How to Avod Uwated Emal. Commucatos of ACM, 4(3):88 95, Kushmerck, N. earg to Remove Iteret Advertsemets. Proceedgs of the 3 rd Iteratoal Coferece o Autoomous Agets, pp. 75 8, eattle, Washgto, ag, K. Newsweeder: earg to Flter Netews. Proceedgs of the 2 th It. Coferece o Mache earg, pp , taford, Calfora, agley, P., Waye, I., ad Thompso, K.. A Aalyss of Bayesa Classfers. Proceedgs of the 0 th Natoal Coferece o AI, pp , a Jose, Calfora, ews, D. Feature electo ad Feature Extracto for Text Categorzato. Proceedgs of the DARPA Workshop o peech ad Natural aguage, pp , Harrma, New York, ews, D. Trag Algorthms for ear Text Classfers. Proceedgs of the 9 th Aual Iteratoal ACM-IGIR Coferece o Research ad Developmet Iformato Retreval, pp , Kostaz, Germay, ews, D. ad Kowles, K.A. Threadg Electroc Mal: A Prelmary tudy. Iformato Processg ad Maagemet, 33(2):209 27, Mtchell, T.M. Mache earg. McGraw-Hll, 997.
9 5. Paye, T.R. ad Edwards, P. Iterface Agets that ear: A Ivestgato of earg Issues a Mal Aget Iterface. Appled Artfcal Itellgece, (): 32, aham, M., Dumas,., Heckerma, D., ad Horvtz, E. A Bayesa Approach to Flterg Juk E- Mal. I earg for Text Categorzato Papers from the AAAI Workshop, pp , Madso Wscos. AAAI Techcal Report W-98-05, easta, F. Mache earg Automated Text Categorsato. Techcal Reeport B4-3, Isttuto d Elaorazoe dell'iformazoe, Cosglo Nazoale delle Rcerche, Psa, pertus, E. mokey: Automatc Recogto of Hostle Messages. Proceedgs of the 4 th Natoal Coferece o AI ad the 9 th Coferece o Iovatve Applcatos of AI, pp , Provdece, Rhode Islad, 997.
Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1
Learg to Flter Spam E-Mal: A Comparso of a Nave Bayesa ad a Memory-Based Approach 1 Io Adroutsopoulos, Georgos Palouras, Vagels Karkaletss, Georgos Sakks, Costate D. Spyropoulos ad Paagots Stamatopoulos
Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS
A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS
Average Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
A Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
An IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
Green Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],
1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
APPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
The Time Value of Money
The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto
Classic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
CHAPTER 2. Time Value of Money 6-1
CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show
Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]
An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
Maintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
Efficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
Numerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
On Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
Settlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
of the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
Measuring the Quality of Credit Scoring Models
Measur the Qualty of Credt cor Models Mart Řezáč Dept. of Matheatcs ad tatstcs, Faculty of cece, Masaryk Uversty CCC XI, Edurh Auust 009 Cotet. Itroducto 3. Good/ad clet defto 4 3. Measur the qualty 6
Constrained Cubic Spline Interpolation for Chemical Engineering Applications
Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel
Integrating Production Scheduling and Maintenance: Practical Implications
Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk
Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework
World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos
10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.
On formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal
Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 [email protected]
ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion
2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of
The paper presents Constant Rebalanced Portfolio first introduced by Thomas
Itroducto The paper presets Costat Rebalaced Portfolo frst troduced by Thomas Cover. There are several weakesses of ths approach. Oe s that t s extremely hard to fd the optmal weghts ad the secod weakess
Credibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
AP Statistics 2006 Free-Response Questions Form B
AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad
Bayesian Network Representation
Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory
Speeding up k-means Clustering by Bootstrap Averaging
Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg
Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM
28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara
Report 52 Fixed Maturity EUR Industrial Bond Funds
Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:
The Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
A probabilistic part-of-speech tagger for Swedish
A probablstc part-of-speech tagger for Swedsh eter Nlsso Departmet of Computer Scece Uversty of Lud Lud, Swede [email protected] Abstract Ths paper presets a project for mplemetg ad evaluatg a probablstc
Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
Reinsurance and the distribution of term insurance claims
Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace
DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
Banking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
Entropy-Based Link Analysis for Mining Web Informative Structures
Etropy-Based Lk Aalyss for Mg Web Iformatve Structures Hug-Yu Kao, Sha-Hua L *, Ja-Mg Ho *, Mg-Sya Che Electrcal Egeerg Departmet Natoal Tawa Uversty Tape, Tawa, ROC E-Mal: {[email protected], [email protected]}
How To Balance Load On A Weght-Based Metadata Server Cluster
WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:[email protected]
RUSSIAN ROULETTE AND PARTICLE SPLITTING
RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate
Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
Robust Realtime Face Recognition And Tracking System
JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:[email protected] Abstract here s some very mportat meag the study of realtme
Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines
(ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005
The simple linear Regression Model
The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg
Using Data Mining Techniques to Predict Product Quality from Physicochemical Data
Usg Data Mg Techques to Predct Product Qualty from Physcochemcal Data A. Nachev 1, M. Hoga 1 1 Busess Iformato Systems, Cares Busess School, NUI, Galway, Irelad Abstract - Product qualty certfcato s sometmes
The Popularity Parameter in Unstructured P2P File Sharing Networks
The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN
GRADUATION PROJECT REPORT
SPAM Flter School of Publc Admtrato Computer Stude Program GRADUATION PROJECT REPORT 2007-I-A02 SPAM Flter Project group leader: Project group member: Supervor: Aeor: Academc year (emeter): MCCS390 Graduato
CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel
CHAPTER 3 Smple Lear Regresso USING STATISTICS @ Suflowers Apparel 3 TYPES OF REGRESSION MODELS 3 DETERMINING THE SIMPLE LINEAR REGRESSION EQUATION The Least-Squares Method Vsual Exploratos: Explorg Smple
Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
Automated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
Near Neighbor Distribution in Sets of Fractal Nature
Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel
Numerical Comparisons of Quality Control Charts for Variables
Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa
Efficient Compensation for Regulatory Takings. and Oregon s Measure 37
Effcet Compesato for Regulatory Takgs ad Orego s Measure 37 Jack Scheffer Ph.D. Studet Dept. of Agrcultural, Evrometal ad Developmet Ecoomcs The Oho State Uversty 2120 Fyffe Road Columbus, OH 43210-1067
Performance Attribution. Methodology Overview
erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace
Suspicious Transaction Detection for Anti-Money Laundering
Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha [email protected] Abstract Moey lauderg
Study on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
