CRIMINAL MAPPING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL

Size: px
Start display at page:

Download "CRIMINAL MAPPING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL"

Transcription

1 Voume No. 4 June 202 ISSN The Internatona Journa of Computer Scence & Appcaton TIJCSA RESEARCH AER Avaabe Onne at CRIMINAL MAING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL Uttam Mande Y.Srnva J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM Unverty GITAM Unverty J.N.T.Unverty Vakhapatnam Vakhapatnam Kaknada [email protected] [email protected] [email protected] Abtract: The Crme rate and crmna actvte have ncreaed enormouy n the pat few decade. Crme preventon and crmna dentfcaton are the prmary ue before the poce peronne nce property and ve protecton are the bac concern of the poce but to combat the crme the avaabty of poce peronne mted and on the other hand the number of crmna are ncreang dratcay. Hence to upport the aw keeper data about the crmna crmna htory together wth crmna atttude w be very much beneftted. Th paper am toward the contructon of new methodooge baed on Data mnng concept and erve a a decon upport ytem. Gven a et of avaabe cue from the forenc ab and the cue coected at the crme pot a methodoogy preented to map the evdence and dentfy a crmna. Key word: Data mnng Generaed Gauan Mxture mode Crme crmna mappng crmna dentfcaton forenc fnger prnt. Introducton TIJCSA A Rght Reerved 22

2 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 The ever changng fe tye dere toward uxure envronmenta condton have drven the human toward the crmna actvte [] Many ubc and rvate agence are workng rgorouy to uphod aw and order. Wth the ncreae n the crmna actvte to combat the crme a data bae about the crmna to be mantaned [2]. Coverng the compete nformaton about the crmna and th data houd be made avaabe wth a the poce peron.a the crmna actvte have extended t wng at dfferent ocaton nformaton exchange between the poce taton at dfferent ocaton w be of great advantage [3] Th mechanm houd be hepfu n nformaton harng and thereby hapng toward a meanngfu crme anay. To upport effectve methodooge that hep n crmna nvetgaton for evauatng the phyca cue and determnng the dfferent tratege to be adopted for nvetgaton are to be formuated. Therefore the phyca evdence obtaned from the wtne and the forenc report hep toward the better crmna anay. Hence n th paper a databae generated from the crmna data avaabe from dfferent poce taton of Andhra radeh. The databae created by conderng two bac fact v. avaabty of wtne at the crmna port and the report from the forenc ab that are coected from the cue pot [4]. The data mnng concept are expoted for mnng the kehood of the crmna baed on the feature/ wtne avaabe. Cuterng performng baed on the type of crme. The crme actvte condered n th paper are Murder Rot kdnap and robbery. Baed on the feature decrbed about the crmna a face generated and the generated face compared wth that of the extng face for fndng the kehood of the crmna [6]. Thee dentte are further mapped wth the forenc cue to formuate a unque dentty. Data mnng technque hep to expore the enormou data and makng t pobe n reachng the utmate goa of crmna anay by ung the concept of cuterng and cafcaton. In th paper the concept of cuterng carred out bang on the type of crme. The ret of paper organed a foow ecton -2 of the paper dea wth feature n ecton- 3 deta about the crme dentfcaton preented Cuterng technque dcued n ecton - 4 the Generaed Gauan Mxture mode preented aong wth updated equaton ung EM agorthm expermentaton hghghted n ecton- 5 the ecton 6 of the paper focu on the concuon 2. Acquton of Feature from the wtne: Any crme nvetgaton hghght prmary on two ue Wtne avaabe and 2 Cue avaabe and reatng thee feature wth that of the data avaabe regardng the crmna. The TIJCSA A Rght Reerved 23

3 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 crme data bae condered n th paper ncude are robbery 2 murder 3 kdnappng 4 rot. For the dentfcaton of any crme we need to have an dea about cue varabe 2 crmna reatng/dentfcaton. Crme cue pay a vta roe n the proper dentfcaton of crmna. The cue hep the teppng tone toward the crme anay and crmna reatng the mappng of the crmna baed on the cue wth data avaabe n the data bae by the ue of ntegent knowedge mappng. 3. Crme Identfcaton ung Crme nk The varou crme nk that were condered ncude Crme ocaton pace: retaurant theater road raway taton hop/god hop ma houe apartment 2 Crmna attrbutehar but eyebrow noe teeth beard age group mutache anguage known 3 Crmna pychoogca behavor can be recogned by type of kng We have condered the type of kng a mooth remova of part harh whch attrbute to the pychoogca behavor of the crmna 4 Modu operand object ued for crme to 2Rope 3Stck 4Knfe Thee crmna nk hep to anaye the dataet there by makng the crme nvetgator to pane for dentfcaton of the crmna. In th paper we have condered bnary cuterng to cuter the data bae baed on type of crme and the cafcaton carred out from the feature avaabe. 3. Bnary cuterng: In order to mpfy the anay proce the huge dataet avaabe to be cutered. The cuterng n th paper baed on the type of crme. A data et generated from the databae avaabe from the Andhra radeh poce department and a tabe created by conderng the FIR report The varou fed condered ncudng the crmna dentfcaton number crmna attrbute crmna pychoogca behavor crme ocaton tme of crme day/nght wtne /cue the data et generated by ung the bnary data of & 0 ndcatng the preence of attrbute TIJCSA A Rght Reerved 24

4 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 and 0 ndcatng the abence of attrbute then cuterng of the bnary data done a propoed by Tao H 2005 ung the bnary cuterng Crme are categored n many way here we have gven weght to each type of crme where weghng cheme condered n the manner a the reatve crme w be gven wth near vaue after appyng cuterng agorthm on th type of crme feature we have got four cuter of crme data they are robbery kdnap murder and rot Fg categore of crme 4. Generaed Gauan Mxture mode The robabty Denty functon the Generaed Gauan mxture mode gven by f µσ e 2 Γ + A σ Z µ A σ TIJCSA A Rght Reerved 25

5 & Appcaton TIJCSA ISSN Vo. No. 4 June TIJCSA A Rght Reerved 26 The nta etmate are updated ung the EM agorthm and the fna updated parameter are gven by A σ σ σ Γ > Γ N N t t / 3/ Γ Γ + θ µ θ σ + N N N k t t N γ θ θ µ γ

6 & Appcaton TIJCSA ISSN Vo. No. 4 June Expermentaton The feature are taken a nput from forenc cue and fnger prnt are condered for th purpoe. The fnger prnt avaabe at pot are compared wth that of the databae compared for the reevancy n crmna. we have condered two varant Aumng the fngerprnt are obtaned at the crme pot In order to ratfy a crmna baed on the fnger prnt we have condered the bood group of the crmna f avaabe to map the unquene of the crmna In order to dentfy a crmna baed on the fnger prnt we have ued a Generaed Gauan Mxture Mode The Feature obtaned from the fnger prnt are condered and the robabty Denty Functon cacuated Th DF matched wth that of the extng crmna to dentfy a crmna In order to dentfy a crmna baed on the fnger prnt we have ued a Generaed Gauan Mxture Mode The Feature obtaned from the fnger prnt are condered and the robabty Denty Functon cacuated Th DF matched wth that of the extng crmna to dentfy a crmna The man reaon for utng Generaed Gauan Mxture Mode that any fngerprnt may be contanng two type of feature Ø Ø Macro feature Mcro feature Macro feature are thoe feature whch can be dentfed drecty uch a Core and Rdge TIJCSA A Rght Reerved 27

7 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 In the tuaton where the macro feature are not avaabe mcro feature w be of great ue.mcro feature ncude vaey deta pont whroo crong Thee feature are mapped and DF are obtaned the tet equence are compared and the crmna ratfed Thee feature are mapped and DF are obtaned the tet equence are compared and the crmna ratfed Fg 2 howng the nput gven to mode Fngerprnt avaabe at crme pot Fnger prnt match wth Crmna fnger prnt TIJCSA A Rght Reerved 28

8 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 Fg 3 Fg 4 Fg 34 howng the output of Fngerprnt mappng wth crmna databae Fg 5 :the nap hot of data et TIJCSA A Rght Reerved 29

9 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 When more than one upect gven The mode ue the other cue ke bood or any other cue for further fterng the t of crmna. 6. Concuon: If the wtne not avaabe at the crme ncdent and f the forenc report are avaabe then n uch cae dentfcaton of the crmna a condered n th paper. The crmna fnger prnt are mapped wth that of the avaabe from the data bae. and f there a map the crmna can be dentfed..if the data avaabe from the wtne not uffcent aong wth the forenc report we conder bood ampe and type of kng n order to ratfy crmna. Th paper preent a nove methodoogy of dentfyng a crmna n the preence of cue by the forenc expert. In thee tuaton n th paper we have tred to dentfy the crmna by mappng the crmna ung the Generaed Gauan mxture mode.. Reference:.Care of Berrew Q.C Data mnng: The new weapon n the war on terrorm retrved from the Internet on Cate H. Fred Lega Standard for Data Mnng retreved from the nternet on Cfton Chrtopher 20. Encycopeda Brtannca: data mnng Retreved from the web on Jeff and Harper Jm Effectve Counterterrorm and the Lmted Roe of redctve Data Mnng retreved from the web U.M. Fayyad and R. Uthuruamy Evovng Data Mnng nto Souton for Inght Comm. ACM Aug pp W. Chang et a. An Internatona erpectve on Fghtng Cybercrme roc. t NSF/NIJ Symp. Integence and Securty Informatc LNCS 2665 Sprnger-Verag 2003 pp TIJCSA A Rght Reerved 30

10 & Appcaton TIJCSA ISSN Vo. No. 4 June H. Kargupta K. Lu and J. Ryan rvacy-sentve Dtrbuted Data Mnng from Mut- arty Data roc. t NSF/NIJ Symp. Integence and Securty Informatc LNCS 2665 Sprnger-Verag 2003 pp Apr M.Chau J.J. Xu and H. Chen Extractng Meanngfu Entte from oce Narratve Report roc.nat Conf. Dgta Government Reearch Dgta Government Reearch Center 2002 pp A. Gray. Sa and S. MacDone Software Forenc: Extendng Authorhp Anay Technqueto Computer rogram roc. 3rd Bannua Conf.Int Aoc. Forenc Lngutc Int Aoc. Forenc Lngutc 997 pp R.V. Hauck et a. Ung Copnk to Anaye Crmna-Jutce Data Computer Mar pp T. Senator et a. The FnCEN Artfca Integence Sytem: Identfyng otenta Money Launderng from Report of Large Cah Tranacton AI Maganevo.6 no pp W. Lee S.J. Stofo and W. Mok A Data Mnng Framework for Budng Intruon detecton Mode roc. 999 IEEE Symp. Securty and rvacy IEEE CS re 999 pp O. de Ve et a. Mnng E-Ma Content for Author Identfcaton Forenc SIGMOD Record vo. 30 no pp G. Wang H. Chen and H. Atabakhh Automatcay Detectng Deceptve Crmna Identte Comm. ACM Mar pp S. Waerman and K. Faut Soca Network Anay:Method and Appcaton Cambrdge Unv. re TIJCSA A Rght Reerved 3

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University

More information

FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL

FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University

More information

JOINT IMPORTANCE MEASURES IN NETWORK SYSTEM

JOINT IMPORTANCE MEASURES IN NETWORK SYSTEM V CHACKO ANOHARAN JOINT IPORTANCE EASRES IN NETWORK SYSTE RT&A # 04 (3) (Vo) 0 December JOINT IPORTANCE EASRES IN NETWORK SYSTE V Chaco and anoharan Deartment of Stattc StThoma Coege Thrur-68000Keraa Inda

More information

An Ensemble Classification Framework to Evolving Data Streams

An Ensemble Classification Framework to Evolving Data Streams Internatona Journa of Scence and Research (IJSR) ISSN (Onne): 39-7064 An Ensembe Cassfcaton Framework to Evovng Data Streams Naga Chthra Dev. R MCA, (M.Ph), Sr Jayendra Saraswathy Maha Vdyaaya, Coege of

More information

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: [email protected] Abtract:

More information

Development and use of prediction models in Building Acoustics as in EN 12354. 1 Introduction. 2 EN 12354, part 1 & 2. 2.2 Lightweight single elements

Development and use of prediction models in Building Acoustics as in EN 12354. 1 Introduction. 2 EN 12354, part 1 & 2. 2.2 Lightweight single elements evelopment and ue of predcton model n Buldng Acoutc a n EN 1354 Eddy TNO Scence and Indutry, P.O. Box 155, N-600 A elft, The Netherland, [email protected] Improvng the acoutc clmate n buldng an mportant

More information

s-domain Circuit Analysis

s-domain Circuit Analysis S-Doman naly -Doman rcut naly Tme doman t doman near rcut aplace Tranform omplex frequency doman doman Tranformed rcut Dfferental equaton lacal technque epone waveform aplace Tranform nvere Tranform -

More information

ARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( )

ARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( ) COMAID:5 JID:COMAID AID:5 /FLA [mg; v 79; Prn:/0/009; 4:0] P -) Computer Aded Geometrc Degn ) Content lt avalable at ScenceDrect Computer Aded Geometrc Degn wwwelevercom/locate/cagd Fat approach for computng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Multi-agent System for Custom Relationship Management with SVMs Tool

Multi-agent System for Custom Relationship Management with SVMs Tool Mut-agent System for Custom Reatonshp Management wth SVMs oo Yanshan Xao, Bo Lu, 3, Dan Luo, and Longbng Cao Guangzhou Asan Games Organzng Commttee, Guangzhou 5063, P.R. Chna Facuty of Informaton echnoogy,

More information

ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C.

ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C. ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C Bob Hardy Thunder Scentfc Corporaton, Albuquerque, NM, USA Abtract:

More information

THE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko

THE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko Internatonal Journal "Informaton Theore & Applcaton" Vol5 / 28 253 TE ANALYSIS AND OTIMIATION OF SURVIVABILITY OF MLS NETWORS Mohammadreza Moavar, Yur aychenko Abtract: The problem of MLS network urvvablty

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

How To Understand Propect Theory And Mean Variance Analysis

How To Understand Propect Theory And Mean Variance Analysis Invetment Management and Fnancal Innovaton, Volume 6, Iue 1, 2009 Enrco De Gorg (Swtzerland ), Thorten Hen (Swtzerland) Propect theory and mean-varance analy: doe t make a dfference n wealth management?

More information

Cardiovascular Event Risk Assessment Fusion of Individual Risk Assessment Tools Applied to the Portuguese Population

Cardiovascular Event Risk Assessment Fusion of Individual Risk Assessment Tools Applied to the Portuguese Population Cardovascuar Event Rsk Assessment Fuson of Indvdua Rsk Assessment Toos Apped to the Portuguese Popuaton S. Paredes, T. Rocha, P. de Carvaho, J. Henrques, J. Moras*, J. Ferrera, M. Mendes Abstract Cardovascuar

More information

2) A single-language trained classifier: one. classifier trained on documents written in

2) A single-language trained classifier: one. classifier trained on documents written in Openng the ega terature Porta to mutngua access E. Francescon, G. Perugne ITTIG Insttute of Lega Informaton Theory and Technooges Itaan Natona Research Counc, Forence, Itay Te: +39 055 43999 Fax: +39 055

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

An Integrated Semantically Correct 2.5D Object Oriented TIN. Andreas Koch

An Integrated Semantically Correct 2.5D Object Oriented TIN. Andreas Koch An Integrated Semantcally Correct 2.5D Object Orented TIN Andreas Koch Unverstät Hannover Insttut für Photogrammetre und GeoInformaton Contents Introducton Integraton of a DTM and 2D GIS data Semantcs

More information

Multifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm

Multifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm Journal of Computatonal Informaton Sytem 7:2 (211) 385-393 Avalable at http://www.jofc.com Multfuncton Phaed Array Radar Reource Management: Real-me Schedulng Algorm Janbn LU 1,, Hu XIAO 2, Zemn XI 1,

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Mathematical model of service quality performance s computing of multiservice network

Mathematical model of service quality performance s computing of multiservice network Mathematca mode of erce quaty performance computng of muterce networ Tuemoa Gufarda, Internatona academy of bune, maty, Kazahtan btract Th artce deoted to effectene of muterce networ functonng n order

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

EESE: Nationwide Nanotechnology Ethics Education Development

EESE: Nationwide Nanotechnology Ethics Education Development : Natonwde Nanotechnoogy thc ducaton Deveopment 3/15/7 ducaton ward: -978 Prof rty Center for Hgh Technoogy atera; Prof Chare Fedderman choo of ngneerng; Unverty of New exco ducatona Goa 1 Pot tranfer

More information

Prediction of Success or Fail of Students on Different Educational Majors at the End of the High School with Artificial Neural Networks Methods

Prediction of Success or Fail of Students on Different Educational Majors at the End of the High School with Artificial Neural Networks Methods Predcton of Success or Fa of on Dfferent Educatona Maors at the End of the Hgh Schoo th Artfca Neura Netors Methods Sayyed Mad Maznan, Member, IACSIT, and Sayyede Azam Aboghasempur Abstract The man obectve

More information

Lecture #21. MOS Capacitor Structure

Lecture #21. MOS Capacitor Structure Lecture #21 OUTLINE The MOS apactor Electrotatc Readng: oure Reader EE130 Lecture 21, Slde 1 MOS apactor Structure MOS capactor (croectonal vew _ TE x EE130 Lecture 21, Slde 2 Typcal MOS capactor and trantor

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Quantitative Evaluation of Porosity in Aluminum Die Castings by Fractal Analysis of Perimeter

Quantitative Evaluation of Porosity in Aluminum Die Castings by Fractal Analysis of Perimeter Materal Tranacton, Vol. 49, No. 4 (28) pp. 782 to 786 #28 The Japan Inttute of Metal Quanttatve Evaluaton of Poroty n Alumnum De Catng by Fractal Analy of Permeter Yohhko Hanga 1 and Sochro Ktahara 2 1

More information

Some Numerical Methods for Temperature and Mass Transfer Simulation on the Dehydration of Herbs

Some Numerical Methods for Temperature and Mass Transfer Simulation on the Dehydration of Herbs Internatona Journa of Computer and Eectrca Engneerng, Vo., No. 4, Augut, 793-863 Some Numerca Meod for Temperature and Ma Tranfer Smuaton on e Dehydraton of Her Md. Rau Iam, Memer, IACSIT and Norma Aa

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: [email protected] 1/Introducton The

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Modeling ISP Tier Design

Modeling ISP Tier Design Modelng ISP Ter Degn We Da School of Informaton and Computer Scence Unverty of Calforna, Irvne Irvne, CA, US [email protected] Scott Jordan School of Informaton and Computer Scence Unverty of Calforna, Irvne

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

The Design of Reliable Trust Management Systems for Electronic Trading Communities

The Design of Reliable Trust Management Systems for Electronic Trading Communities The Degn of Relale Trut Management Sytem for Electronc Tradng Communte Chryantho Dellaroca Sloan School of Management Maachuett Inttute of Technology Room E53-315 Camrdge, MA 02139 [email protected] Atract:

More information

Basic Principle of Buck-Boost

Basic Principle of Buck-Boost Bac Prncple of Buck-Boot he buck-boot a popular non-olated nvertng power tage topology, ometme called a tep-up/down power tage. Power upply degner chooe the buck-boot power tage becaue the requred output

More information

The Shrinking Hand: Why Information Technology Leads to Smaller Firms

The Shrinking Hand: Why Information Technology Leads to Smaller Firms Th paper can e downoaded wthout charge from the Soca Scence Reearch Network eectronc rary at: http://rn.com/atract=1601193 It ha een puhed n reved form n The Internatona Journa of the Economc of Bune,

More information

Swing-Free Transporting of Two-Dimensional Overhead Crane Using Sliding Mode Fuzzy Control

Swing-Free Transporting of Two-Dimensional Overhead Crane Using Sliding Mode Fuzzy Control Swng-Free Transportng of Two-Dmensona Overhead Crane Usng Sdng Mode Fuzzy Contro Dantong Lu, Janqang, Dongn Zhao, and We Wang Astract An adaptve sdng mode fuzzy contro approach s proposed for a two-dmensona

More information

Netherlands Published online: 27 Jun 2013.

Netherlands Published online: 27 Jun 2013. Th artcle wa downloaded by: [Bblotheek TU Delft] On: 04 Noveber 2013, At: 08:09 Publher: Routledge Infora Ltd Regtered n England and Wale Regtered Nuber: 1072954 Regtered offce: Morter Houe, 37-41 Morter

More information

A Novel Architecture Design of Large-Scale Distributed Object Storage System

A Novel Architecture Design of Large-Scale Distributed Object Storage System Internatonal Journal of Grd Dtrbuton Computng Vol.8, No.1 (2015), pp.25-32 http://dx.do.org/10.14257/gdc.2015.8.1.03 A Novel Archtecture Degn of Large-Scale Dtrbuted Obect Storage Sytem Shan Yng 1 and

More information

An Integrated Resource Management and Scheduling System for Grid Data Streaming Applications

An Integrated Resource Management and Scheduling System for Grid Data Streaming Applications An Integrated eource Management and Schedulng Sytem for Grd Data Streamng Applcaton Wen Zhang, Junwe Cao 2,3*, Yheng Zhong,3, Lanchen Lu,3, and Cheng Wu,3 Department of Automaton, Tnghua Unverty, Bejng

More information

Optimum Design of Magnetic Inductive Energy Harvester and its AC-DC Converter

Optimum Design of Magnetic Inductive Energy Harvester and its AC-DC Converter Otmum Degn of Magnetc nductve Energy Harveter and t AC-DC Converter Qan Sun, Sumeet Patl, Stehen Stoute, Nan-Xang Sun, Brad Lehman Deartment of Electrcal and Comuter Engneerng Northeatern Unverty Boton,

More information

ESSAYS IN RENEWABLE ENERGY AND EMISSIONS TRADING

ESSAYS IN RENEWABLE ENERGY AND EMISSIONS TRADING ESSAYS IN RENEWABLE ENERGY AND EMISSIONS TRADING By JOSHUA D. KNEIFEL A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE

More information

Mall Cell Network - Power, Memory and Networking

Mall Cell Network - Power, Memory and Networking Slow admon and power control for mall cell network va dtrbuted optmzaton Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah To cte th veron: Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah. Slow admon and power control

More information

Advances in Military Technology Vol. 10, No. 1, June 2015

Advances in Military Technology Vol. 10, No. 1, June 2015 AM Avance n Mltary echnology Vol., No., June 5 Mechancal an Computatonal Degn for Control of a -PUS Parallel Robot-bae Laer Cuttng Machne R. Zavala-Yoé *, R. Ramírez-Menoza an J. Ruz-García ecnológco e

More information

Measuring adverse selection in managed health care

Measuring adverse selection in managed health care Ž. Journal of Health Economc 19 2000 829 854 www.elever.nlrlocatereconbae Meaurng advere electon n managed health care Rchard G. Frank a,), Jacob Glazer b, Thoma G. McGure c a HarÕard UnÕerty, HarÕard

More information

Dynamic Control of Data Streaming and Processing in a Virtualized Environment

Dynamic Control of Data Streaming and Processing in a Virtualized Environment > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynamc Control of Data Streamng and Proceng n a Vrtualzed Envronment Junwe Cao, Senor Member, IEEE, Wen Zhang,

More information

REVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, 233-244, 2012.

REVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, 233-244, 2012. REVISA INVESIGACIÓN OPERACIONAL VOL., 33, NO. 3, 33-44,. ORDERING POLICY FOR INVENORY MANAGEMEN WHEN DEMAND IS SOCK- DEPENDEN AND A EMPORARY PRICE DISCOUN IS LINKED O ORDER UANIY Nta H. Shah Department

More information

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add. chapter 8 Vctm assstance 385 Tool 8.3 Protecton, assstance and human rghts Overvew Ths tool dscusses the human rghts consderatons whch must be borne n mnd n protectng and assstng vctms of traffckng. Recommended

More information

Pixel Bar Charts: A New Technique for Visualizing Large Multi-Attribute Data Sets without Aggregation

Pixel Bar Charts: A New Technique for Visualizing Large Multi-Attribute Data Sets without Aggregation Pxel Bar Chart: A New Technque or Vualzng Large Mult-Attrbute Data Set wthout Aggregaton Danel Kem*, Mng C. Hao, Julan Lach*, Mechun Hu, Umehwar Dayal Hewlett Packar Reearch Laboratore, Palo Alto, CA Abtract

More information

Robust biometric-based user authentication scheme for wireless sensor networks

Robust biometric-based user authentication scheme for wireless sensor networks Robut bometrc-baed uer autentcaton ceme for wrele enor network Debao He* cool of Matematc and tattc Wuan nverty Wuan Cna Emal: [email protected] Abtract: Wrele enor network (WN) are appled wdely a varety of

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Predicting Advertiser Bidding Behaviors in Sponsored Search by Rationality Modeling

Predicting Advertiser Bidding Behaviors in Sponsored Search by Rationality Modeling Predctng Advertser Bddng Behavors n Sponsored Search by Ratonaty Modeng Hafeng Xu Centre for Computatona Mathematcs n Industry and Commerce Unversty of Wateroo Wateroo, ON, Canada [email protected] Dy

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Coordinate System for 3-D Model Used in Robotic End-Effector

Coordinate System for 3-D Model Used in Robotic End-Effector AU JT 8(: 8 (Apr Codnate Sytem f D Model Ued n Robot EndEffer ulfqar Al Soomro Shool of Advaned Stude, Aan Inttute of Tehnology Pathum Than, Thaland Abtrat Th paper reve the onept of odnate ytem on new

More information

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 1 2011 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

Detecting Suspicion Information on the Web Using Crime Data Mining Techniques International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 3, No. 1, 2014, Page: 32-41, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com Detecting Suspicion

More information

Hospital care organisation in Italy: a theoretical assessment of the reform

Hospital care organisation in Italy: a theoretical assessment of the reform Dartmento d Scenze Economche Unvertà d Breca Va S. Fautno 7/b 5 BESCIA Tel. 3 98885 Fax. 3 988837 e-mal: [email protected] otal care organaton n Italy: a theoretcal aement of the reform oella evagg Abtract.

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

Comparison of workflow software products

Comparison of workflow software products Internatona Conference on Computer Systems and Technooges - CompSysTech 2006 Comparson of worfow software products Krasmra Stoova,Todor Stoov Abstract: Ths research addresses probems, reated to the assessment

More information

The issue of whether the Internet will permanently destroy the news media is currently a

The issue of whether the Internet will permanently destroy the news media is currently a Wll the Internet etroy the New Meda? or Can Onlne Advertng Market Save the Meda? by Suan Athey, Emlo Calvano and Johua S. Gan * Frt raft: October, 009 Th Veron: November, 00 PRELIMINARY PLEASE O NOT QUOTE

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics Usng an Adaptve Fuzzy Logc System to Optmse Knowledge Dscovery n Proteomcs James Malone, Ken McGarry and Chrs Bowerman School of Computng and Technology Sunderland Unversty St. Peter s Way, Sunderland,

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Using Content-Based Filtering for Recommendation 1

Using Content-Based Filtering for Recommendation 1 Usng Content-Based Flterng for Recommendaton 1 Robn van Meteren 1 and Maarten van Someren 2 1 NetlnQ Group, Gerard Brandtstraat 26-28, 1054 JK, Amsterdam, The Netherlands, [email protected] 2 Unversty of

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

GRADIENT METHODS FOR BINARY INTEGER PROGRAMMING

GRADIENT METHODS FOR BINARY INTEGER PROGRAMMING Proceedns of the 4st Internatona Conference on Computers & Industra Enneern GRADIENT METHODS FOR BINARY INTEGER PROGRAMMING Chen-Yuan Huan¹, Ta-Chun Wan² Insttute of Cv Avaton, Natona Chen Kun Unversty,

More information

A Resources Allocation Model for Multi-Project Management

A Resources Allocation Model for Multi-Project Management A Resources Aocaton Mode for Mut-Proect Management Hamdatou Kane, Aban Tsser To cte ths verson: Hamdatou Kane, Aban Tsser. A Resources Aocaton Mode for Mut-Proect Management. 9th Internatona Conference

More information

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA From: FLAIRS-02 Proceeding. Copyright 2002, AAAI (www.aaai.org). A right reerved. Sytem Refinement in Practice Uing a Forma Method to Modify Rea Life Knowedge Rainer Knauf and Ika Phiippow Imenau Technica

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

XAC08-6 Professional Project Management

XAC08-6 Professional Project Management 1 XAC08-6 Professona Project anagement Ths Lecture: Tte s so manager shoud ncude a s management pan a document that gudes any experts agree Some faure project to Ba, ba, ba, ba Communcaton anagement Wee

More information

SIMPLIFYING NDA PROGRAMMING WITH PROt SQL

SIMPLIFYING NDA PROGRAMMING WITH PROt SQL SIMPLIFYING NDA PROGRAMMING WITH PROt SQL Aeen L. Yam, Besseaar Assocates, Prnceton, NJ ABSRACf The programmng of New Drug Appcaton (NDA) Integrated Summary of Safety (ISS) usuay nvoves obtanng patent

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

On-Line Trajectory Generation: Nonconstant Motion Constraints

On-Line Trajectory Generation: Nonconstant Motion Constraints 2012 IEEE Internatona Conference on Robotcs and Automaton RverCentre, Sant Pau, Mnnesota, USA May 14-18, 2012 On-Lne Trajectory Generaton: Nonconstant Moton Constrants Torsten Kröger Abstract A concept

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information