How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

Size: px
Start display at page:

Download "How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network"

Transcription

1 Journal of Computatonal Informaton Systems 7:5 (2011) Avalable at Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen XUE 2, He HUANG 3 1 Insttute of Informaton Network Technology, Nanjng Unversty of Posts and Telecommuncatons, Nanjng , Chna 2 Department of Computer Scence, Texas Tech Unversty, Texas 79415, USA 3 School of Software, Bejng Unversty of Aeronautcs and Astronautcs, Bejng , Chna Abstract Internet traffc classfcaton based on flow statstcs usng machne learnng has attracted great attenton. Wreless mesh networks (WMNs) facltate the extenson of wreless local area networks nto wde areas and have emerged as a key technology for next-generaton wreless networkng. Onlne and accurate traffc classfcaton s a key challenge for wrless mesh network management. We propose an onlne wreless mesh network traffc classfcaton usng C4.5. We evaluate the effectveness of our proposed method through the experments on real mesh traffc traces. Experment results llustrate ths method can classfy onlne wreless mesh network traffc wth hgh accuracy. Keywords: Traffc Classfcaton; Wreless Mesh Network; Machne Learnng; Accuracy 1. Introducton The rapd development of P2P (Peer-to-Peer) applcatons have enrched the performance of Internet n recent years. The P2P traffc has occuped above 50% of the total Internet traffc, and the rato s stll growng [1]. The large amount of P2P traffc and the rapd growth on the usage of P2P applcatons have led to network congeston and traffc hndrance because of the excessve occupaton of the network bandwdth [2]. Therefore, accurate and onlne classfcaton of network traffc plays mportant roles n many areas such as traffc engneerng, QoS, and ntruson detecton etc. The earlest and smplest traffc classfcaton approach s port-based traffc classfcaton whch conssts n examnng the port numbers n TCP headers [3]. Ths method s no longer vald because of the naccuracy and ncompleteness of ts classfcaton results. Several payload-based analyss technques have been proposed to nspect the packets payload searchng for specfc sgnatures [4]. Although ths soluton does can acheve hgh classfcaton accuracy, t can t work wth encrypted traffc or newly P2P applcatons [5]. At the same tme, traffc classfcaton method based on flow statstcs shows effectve performance n ths feld. Substantal attenton has been nvested n data mnng technques and machne learnng algorthms usng flow features for traffc classfcaton. Correspondng author. Emal addresses: [email protected] (Chengje GU) / Copyrght 2011 Bnary Informaton Press May, 2011

2 1525 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) Wrelss mesh network s generally consdered as a type of ad-hoc networks due to the lack of wred nfrastructure that exsts n cellular or W-F networks through deployment of base statons or access ponts [6]. Recently, lots of attenton has been pad on wrelss mesh network as a fundamental technology whch s one of the most sought-after networks of next generaton [7]. Whle traffc classfcaton methods based on flow statstcs offer varous degrees of successes, there are several lmtatons. 1) The exstng classfers cannot classfy traffc effectvely, because they cannot always capture the ntal sub-flow when a communcatng node moves n wreless mesh network. 2) Many proposed classfers can t solve the onlne traffc classfcaton problems faultlessly. To address the above-mentoned problems, we take two aspects to mprove the accuracy and speed of the machne learnng methods for wreless mesh network traffc classfcaton. 1) We propose sub-flow selecton wth applcaton behavors, and the method solves a crtcal problem of how to select approprate sub-flows for achevng traffc classfcaton n wreless mesh network. 2) In order to acheve early detecton, we allow the classfer to classfy traffc flows early n the connecton usng the frst p packets of flow. Our onlne traffc classfcaton should be ndspensable to manage the network whch has a varety of moble nodes. The remander of ths paper s structured as follows. Related work s represented n Secton 2. Secton 3 descrbes the relatonshp between wreless mesh network and traffc calssfcaton. Our proposed onlne mesh network traffc classfcaton usng machne learnng s presented n ths secton 4. Secton 5 presents the expermental results and analyss. The conclusons and potental future work are lsted n Secton Related Work Machne learnng technque whch s a powerful tool n data separaton n many dscplnes ams to classfy data based on ether a pror knowledge or statstcal nformaton extracted from raw dataset. Ths method can be well suted wth Internet traffc classfcaton, as long as the traffc classfed nto categores that exhbt smlar characterstcs n parameters. Each ndvdual flow can be assocated wth a specfc applcaton accordng to ts flow features, and consequently traffc classfcaton s acheved wthout drect nspecton of each packet s header or payload by Machne Learnng (ML) algorthm. The flow features are statstcal patterns, such as packet sze, packet nter-arrval tme, and packet arrval order. Machne learnng algorthms are generally dvded nto supervsed learnng and unsupervsed learnng. Unsupervsed learnng essentally clusters flows wth smlar characterstcs together [8-10]. The advantage s that t does not requre tranng, and new applcatons can be classfed by examnng known applcatons n the same cluster. Erman et al. [8] compared the performance of unsupervsed machne learnng algorthms n traffc classfcaton. Snce our man focus s on evaluatng the predctve power of a bult/traned traffc classfer rather than on detectng new applcatons or flow clusterng. Also, Erman et al. [9] evaluated the performance of two clusterng algorthms, namely K-Means and DBSCAN, n Internet traffc classfcaton. The result ndcated that K-Means was one of the quckest and smplest algorthms for clusterng of Internet flows. Bernalle et al. [10] used a smple K-Means clusterng algorthm to perform classfcaton by usng only the frst fve packets of the flow, amng at applyng on the real-tme classfcaton. Supervsed learnng requres tranng data to be labeled n advance and produces a model that fts the tranng data [11-13]. Moore et al. [11] used a Nave Bayes classfer whch was a supervsed

3 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) machne learnng approach to classfyng nternet traffc. But only 65% accuracy rate, whch was not good enough to classfy Internet traffc. Wllams et al. [12] conducted a comparson of fve machne learnng algorthms whch were wdely used to classfy emprcal study of Internet traffc. Among these algorthms, C4.5 acheved the hghest accuracy n ther results. Auld [13] proposed supervsed machne learnng based on a Bayesan neural network to classfy the traffc wth hgher accuracy and better stablty, but t was not capable for real-tme applcatons. 3. Traffc Classfcaton n Wreless Mesh Network 3.1. Wreless Mesh Network As varous wreless networks evolve nto the next generaton to provde better servces, wreless mesh networks (WMNs) have emerged recently. In WMNs, nodes are comprsed of mesh routers and mesh clents. Each node operates not only as a host but also as a router, forwardng packets on behalf of other nodes that may not be wthn drect wreless transmsson range of ther destnatons [14]. A WMN s dynamcally self-organzed and self-confgured, wth the nodes n the network automatcally establshng and mantanng mesh connectvty among themselves [15]. Ths feature brngs many advantages to WMNs such as low up-front cost, easy network mantenance, robustness, and relable servce coverage. As llustrated n Fgure 1, WMNs consst of two types of nodes: mesh routers and mesh clents. Other than the routng capablty for gateway/repeater functons as n a conventonal wreless router, a wreless mesh router contans addtonal routng functons to support mesh networkng [16]. To further mprove the flexblty of mesh networkng, a mesh router s usually equpped wth multple wreless nterfaces bult on ether the same or dfferent wreless access technologes. Compared wth a conventonal wreless router, a wreless mesh router can acheve the same coverage wth much lower transmsson power through mult-hop communcatons. Optonally, the medum access control (MAC) protocol n a mesh router s enhanced wth better scalablty n a mult-hop mesh envronment [17]. Fg.1 WMNs Infrastructure Archtecture

4 1527 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) Traffc Classfcaton n Wreless Mesh Network Dfferent from other ad hoc networks, most applcatons of WMNs are broadband servces wth varous QoS requrements. Thus, n addton to end-to-end transmsson delay and farness, more performance metrcs such as delay jtter, aggregate and per-node throughput, and packet loss ratos, must be consdered by communcaton protocols. Traffc classfcaton of wreless mesh network should take nto account the factors of packet loss rato and connecton loss raton. Untl recently, most publshed works about onlne traffc classfcaton have reled on features of ntal sub-flow. Those works assume the ntal sub-flow s captured and avalable for traffc classfcaton. However, ths assumpton s not accepted n wreless mesh network because of seamless moblty. In the case of changng ts pont of attachment caused by movement of a node wth communcaton, those classfers begn to capture packets composng a flow at a pont n tme when the flow s already n progress. Consequently those classfers cannot capture the ntal sub-flow. Desrable classfer should thus be capable of traffc classfcaton based on not only ntal sub-flow but also varous types of sub-flow. 4. Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng 4.1. Sub-flow Selecton Internet traffc classfcaton schemes operate on the noton of network flows. A flow s defned to be as a seres of packet exchanges between two hosts, dentfable by the 5-tuple (source address, source port, destnaton address, destnaton port, transport protocol), wth flow termnaton determned by an assumed tmeout or by dstnct flow termnaton semantcs. For each flow, network montors can record statstcs such as duraton, bytes transferred, mean packet nterarrval tme, and mean packet sze. Sub-flow s N consecutve packets taken from a flow. An ntal sub-flow s the ntal N consecutve packets from the pont where communcaton establshed. The applcatons provde users wth varous types of servce. We defne these events of each applcaton as applcaton behavors that are expressble lke fnte state machne. Each applcaton starts from ntal behavor and accepts varous events, as nstructons changng behavors. Whenever the applcaton accepts the event, t changes to the next behavor and executes actons assocated wth the behavor. We assume that a sub-flow, taken from the transton pont of the applcaton behavor, s effectve for the achevement of the desrable classfer. The ratonale behnd possblty of the classfer s the followng. A sub-flow s N consecutve packets taken from a full-flow; therefore, two or more sub-flows can be taken from a flow. The sub-flow features have ablty to dstngush each applcaton, because the sub-flow contans a sequence exchangng control packets that are pre-defned messages n each applcaton. We devse the classfer that added the functon of sub-flow selecton wth applcaton behavors Machne Learnng Algorthm Machne Learnng s prevalng n traffc classfcaton because of ts beng ndependent from the port and payload nformaton. These are some dfferent machne learnng algorthms, such as C4.5, Support Vector Machne (SVM), Nave Bayesan and Random Forest. In order to dentfy wreless mesh network traffc, we choose the C4.5 whch has hgh TP rate and low FP [18]. C4.5 s a decson tree based dentfcaton algorthm. A decson tree s a herarchcal data structure for

5 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) mplementng a dvde-and-conquer strategy. It s an effcent non-parametrc method that can be used both for dentfcaton and regresson. In non-parametrc models, the nput space s dvded nto local regons defned by a dstance metrc. In a decson tree, the local regon s dentfed n a sequence of recursve splts n smaller number of steps. A decson tree s composed of nternal decson nodes and termnal leaves. Each node m mplements a test functon wth dscrete outcomes labelng the branches. Ths process starts at the root and s repeated untl a leaf node s ht. The value of a leaf consttutes the output Onlne Wreless Mesh Network Traffc Classfcaton Archtecture Classfers based on machne learnng use a tranng dataset that conssts of N tuples ( x, y ) and learn a mappng f ( x) y. In the traffc classfcaton context, examples of attrbutes nclude flow statstcs such as duraton and total number of packets. In our supervsed Internet traffc classfcaton system, Let X x1 x2 x n {,,, } be a set of flows. A flow nstance x s characterzed by a vector of attrbute values, x { xj 1 j m}, where m s the number of attrbutes, and x j s the value of the j th attrbute of the th flow. Also, let Y { y1, y2,, y q } be the set of traffc classes, where q s the number of classes of nterest. The y can be classes such as P2P, WWW, and FTP. Fg.2 Archtecture of Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng As llustrated n Fgure 2, the archtecture of onlne wreless mesh network traffc classfcaton usng machne learnng ncludes two portons: off-lne ML modelng and on-lne ML classfcaton. In the stage

6 1529 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) of off-lne ML modelng, traffc trace should be labeled to dfferent applcaton usng L7-Flter or Hand-classfcaton method. Tranng subsets are unformly sampled for the specfc ML classfcaton. Once the datasets are ready, the system carres out feature selecton to elmnate the redundant and rrelevant features to get optmal feature subset. In the stage of onlne ML classfcaton, the flows whch can be realtme collected are traned usng the selected ML classfer. Flow statstcs are computed n terms of each selected feature and stored them to the correspondng database n the flow preprocessng module. The sub-flow selecton module can mplement sub-flow selecton. The output classfer model produced by off-lne ML modelng s appled to classfy the captured traffc. Eventually, the classfcaton output would be appled to network actvtes such as network survellance, QoS. 5. Expermental Results and Analyss 5.1. Emprcal Traces Ths subsecton descrbes the emprcal traces n our work. We construct a pnt-szed wreless mesh network n Nanjng Unversty of Posts and Telecommuncatons. To facltate our work, we collect traces on the campus and resdental area. The Campus_Set was collected from 9 am to 10 am on June 28, The Resdental _Set was collected from 6 pm to 7 pm on June 28, To smplfy the presentaton, we group the applcatons by category. For example, the P2P category ncludes all dentfed P2P traffc from protocols ncludng PPlve, PPstream, BtTorrent, Gnutella, Xunle and KaZaA. Table 1 summarzes the applcatons found n the Campus traces and Resdental traces. Table 1 Statstcs of Emprcal Traces Type of Flow Applcaton Names Campus_Set Resdental _Set Num of flow Percent(%) Num of flow Percent(%) WWW http, https MAIL Imap, pop3, smtp BULK ftp DATABASE oracle, mysql SERVER dent,ntp,x11,dns P2P kazaa, bttorrent MEDIA real, meda player GAME half-lfe Total 32 applcatons Pror to the ML modelng, feature selecton can be executed off-lne. Feature selecton s an mportant step to machne learnng whch s the process of choosng a subset of orgnal features. It can optmze for hgher learnng accuracy wth lower computatonal complexty by removng rrelevant and redundant features. In order to fnd the best feature subset for traffc classfcaton, we use the Sequental Forward Selecton (SFS) method n the paper.

7 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) Evaluaton Metrcs To measure the performance of our proposed method, we use three metrcs: accuracy, precson and recall. accuracy n n TP 1 100% n TP FP 1 1 (1) Accuracy s the rato of the sum of all True Postves to the sum of all the True Postves and False Postves for all classes. We apply ths metrc to measure the accuracy of a classfer on the whole trace set. The latter two metrcs are to evaluate the qualty of classfcaton results for each applcaton class. TP precson 100% (2) TP FP Precson of an algorthm s the rato of True Postves over the sum of True Postves and False Postves or the percentage of flows that are properly attrbuted to a gven applcaton by ths algorthm. TP recall 100% (3) TP FN Recall s the rato of True Postves over the sum of True Postves and False Negatves or the percentage of flows n an applcaton class that are correctly dentfed Comparng Performance among Dfferent Technology We compare classfcaton accuracy of onlne wreless mesh network traffc classfcaton usng machne learnng wth the other classfcaton approaches solely based on port-based approach and payload-based approach. For our experments, we classfy network traffc usng flows from Campus_Set. Table 2 Classfcaton Performance among Dfferent Traffc Classfcaton Method Type of Flow Port-based Payload-based ML-based Recall Precson Recall Precson Recall Precson WWW MAIL BULK DATABASE SERVER P2P MEDIA GAME Accuracy s a crtcal requrement of traffc classfcaton that can be measured n terms of recall and precson, both of whch are mportant. As llustrated n table 2, we can see that the classfcaton precson whch uses port-based methods to classfy network traffc s 71.97%, 57.27% for WWW and P2P applcaton respectvely. At the same tme, the precson of payload-based classfcaton whch extracts payload sgnatures to dentfy specfc protocol s 77.26%, 64.79% for WWW and P2P applcaton respectvely. In

8 1531 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) addton, n order to classfy network traffc, we choose the machne learnng method usng C4.5 whch has 91.77%, 79.39% for WWW and P2P applcaton respectvely. Compared wth the other classfcaton approaches, ths method proposed n the paper can acheve hgher overall recall and precson. For a range of network applcatons, onlne wreless mesh network traffc classfcaton based on machne learnng can meet the key requrement, such as hgh accuracy Impact of Number of Packets for Statstcs on Classfcaton Accuracy A fundamental challenge n the desgn of the onlne wreless mesh network traffc classfcaton s to classfy a flow as soon as possble. Unlke offlne classfcaton where all flow statstcs are avalable a pror, we only have partal nformaton on the flow statstcs n the real-tme context. In order to classfy the network applcatons assocated wth a flow as early as possble, we follow the dea presented n Bernalle et al. [10] and conduct experments to determne the approprate packet number p. The statstcs nformaton of several packets n each flow could dstngush network traffc from Internet traffc accurately wth the least p. For our experments, we classfy network traffc usng flows from Campus_Set and Resdental_Set respectvely. Fg.3 Impact of Number of Packets for Statstcs on Classfcaton Accuracy The expermental result shown n Fgure 3 ndcates that ths method could acheve better accuracy when we choose 11 packets for statstcs. It s notceable that the statstcs of the frst 11 packets could classfy traffc wth hgh accuracy n Campus_Set and Resdental_Set. At the same tme, the classfcaton accuracy mproves margnally usng more than 11 packets. Consderng our goal to classfy wreless mesh network traffc as fast as possble wth hgh accuracy, we choose 11 packets for flow feature statstcs. 6. Concluson Wreless mesh networks (WMNs) are communcatons network made up of rado nodes organzed n a mesh topology. Wreless mesh networks traffc, beng aggregated from a large number of end users, changes nfrequently. It causes the most challengng problem n network traffc classfcaton. In ths paper, we propose onlne wreless mesh network traffc classfcaton usng machne learnng. We show that our method can acheve hgh classfcaton accuracy. Ths method s also sutable for onlne network traffc classfcaton. Our expermental results so far are promsng for ths research drecton n wreless mesh

9 C. Gu et al. /Journal of Computatonal Informaton Systems 7:5 (2011) network, and several opportuntes exst for future work. Supervsed machne learnng method s the requrement on a large number of labeled tranng samples. We can propose sem-supervsed classfcaton method to solve ths ssue for wreless mesh network traffc classfcaton. Acknowledgement Ths work s supported by Natonal Hgh-Tech Research and Development Plan (863) of Chna (No.2009AA01Z212, No.2009AA01Z202), Natural Scence Foundaton of Chna (No ), Natural Scence Foundaton of Jangsu Provnce (No.BK ), Hgh-Tech Research Plan of Jangsu Provnce (No.BG ). References [1] B.Marco, Mella, Antono Pescape and LucaSalgarell, Traffc classfcaton and ts applcatons to modern networks, Computer Networks, 53(6):759-76, [2] Soysal, Murat,Schmdt, Ece Guran.Machne learnng algorthms for accurate flow-based network traffc classfcaton: Evaluaton and comparson. Performance Evaluaton, 67(6): , [3] Karaganns T, Rodo A, Aloutsos M, Laffy K. Transport layer dentfcaton of P2P traffc. Proceedngs of the 2004 ACM SIGCOMM Internet Measurement Conference, pages , [4] Haffner P, Sen S, Spatscheck O, Wang D. ACAS: Automated Constructon of Applcaton Sgnatures. ACM SIGCOMM 05 Workshops, pages , [5] Moore AW, Papagannak K. Toward the accurate dentfcaton of network applcatons. Passve and Actve Measurement Workshop, pages 41 54, [6] Akyldz Ian F, Wang Xudong, Wang Weln.Wreless mesh networks: A survey. Computer Networks, 47(4): , [7] Zeng Guoka, Wang Bo, Dng Yong, Xao L. Effcent multcast algorthms for multchannel wreless mesh networks. IEEE Transactons on Parallel and Dstrbuted Systems, 21(1):86-99, [8] J.Erman, A.Mahant, M.Arltt, I.Cohen, and C.Wllamson. Offlne/realtme traffc classfcaton usng sem-supervsed learnng. Techncal report, Unversty of Calgary, [9] J.Erman, M. Arltt, and A. Mahant. Traffc classfcaton usng clusterng algorthms.proceedngs of SIGCOMM workshop on Mnng network data, pages , [10] Bernalle L, Teuxera R, Akodkenous I, Soule A, Slamatan K. Traffc classfcaton on the fly. ACM SIGCOMM Computer Communcaton Revew 36: 23 26, [11] A.W. Moore and D. Zuev. Internet traffc classfcaton usng bayesan analyss technques. Proceedngs of ACM SIGMETRICS nternatonal conference on Measurement and modelng of computer systems, pages 50-60, [12] N.Wllams, S. Zander, and G. Armtage. A prelmnary performance comparson of fve machne learnng algorthms for practcal p traffc flow classfcaton. ACM SIGCOMM Computer Communcaton Revew, 30(5):5-16, [13] T.Auld, A.W.Moore, and S.F. Gull. Bayesan neural networks for nternet traffc classfcaton. IEEE Transacton on Neural Network, 18(1): , [14] L Bo,Zhang Qan, Lu Jangchuan and Wang, Chonggang. Advances n wreless mesh networks. Moble Networks and Applcatons, 13(1):1-5, [15] Bejerano Ygal, Han Seung-Jae, Kumar Amt. Effcent load-balancng routng for wreless mesh networks Computer Networks, 51(10): , [16] Yanchao Zhang, Yuguang Fang. A secure authentcaton and bllng archtecture for wreless mesh networks. Wreless Networks. 13( 5): , [17] Ian Akyldz, Xudong Wang. Cross-layer desgn n wreless mesh networks. IEEE Transacton on Vehcular Technology. 57(2): , [18] Yongl Ma, Zongjue Qan, Guochu Shou, Yhong, Hu. Study of nformaton network traffc dentfcaton based on C4.5 algorthm. Internatonal Conference on Wreless Communcatons, Networkng and Moble Computng, 2008.

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Encrypted Internet Traffic Classification Method based on Host Behavior

Encrypted Internet Traffic Classification Method based on Host Behavior Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council Usng Supervsed Clusterng Technque to Classfy Receved Messages n 137 Call Center of Tehran Cty Councl Mahdyeh Haghr 1*, Hamd Hassanpour 2 (1) Informaton Technology engneerng/e-commerce, Shraz Unversty (2)

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Automated Network Performance Management and Monitoring via One-class Support Vector Machine

Automated Network Performance Management and Monitoring via One-class Support Vector Machine Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Searching for Interacting Features for Spam Filtering

Searching for Interacting Features for Spam Filtering Searchng for Interactng Features for Spam Flterng Chuanlang Chen 1, Yun-Chao Gong 2, Rongfang Be 1,, and X. Z. Gao 3 1 Department of Computer Scence, Bejng Normal Unversty, Bejng 100875, Chna 2 Software

More information

[email protected]@cityu.edu.hk [email protected], [email protected]

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna [email protected]@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa [email protected], [email protected], [email protected],

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Classification of Network Traffic via Packet-Level Hidden Markov Models

Classification of Network Traffic via Packet-Level Hidden Markov Models Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Comparison of Domain-Specific Lexicon Construction Methods for Sentiment Analysis

Comparison of Domain-Specific Lexicon Construction Methods for Sentiment Analysis , pp.152-156 http://d.do.org/10.14257/astl.2016.135.38 Comparson of Doman-Specfc Lecon Constructon Methods for Sentment Analyss Myeong So Km 1, Jong Woo Km 2,3 and Cu Jng 4 1 Department of Mathematcs,

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, [email protected]

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,[email protected]

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Network traffic analysis optimization for signature-based intrusion detection systems

Network traffic analysis optimization for signature-based intrusion detection systems Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information