CRIMINAL MAPPING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL
|
|
|
- Lambert Pearson
- 10 years ago
- Views:
Transcription
1 Voume No. 4 June 202 ISSN The Internatona Journa of Computer Scence & Appcaton TIJCSA RESEARCH AER Avaabe Onne at CRIMINAL MAING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL Uttam Mande Y.Srnva J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM Unverty GITAM Unverty J.N.T.Unverty Vakhapatnam Vakhapatnam Kaknada [email protected] [email protected] [email protected] Abtract: The Crme rate and crmna actvte have ncreaed enormouy n the pat few decade. Crme preventon and crmna dentfcaton are the prmary ue before the poce peronne nce property and ve protecton are the bac concern of the poce but to combat the crme the avaabty of poce peronne mted and on the other hand the number of crmna are ncreang dratcay. Hence to upport the aw keeper data about the crmna crmna htory together wth crmna atttude w be very much beneftted. Th paper am toward the contructon of new methodooge baed on Data mnng concept and erve a a decon upport ytem. Gven a et of avaabe cue from the forenc ab and the cue coected at the crme pot a methodoogy preented to map the evdence and dentfy a crmna. Key word: Data mnng Generaed Gauan Mxture mode Crme crmna mappng crmna dentfcaton forenc fnger prnt. Introducton TIJCSA A Rght Reerved 22
2 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 The ever changng fe tye dere toward uxure envronmenta condton have drven the human toward the crmna actvte [] Many ubc and rvate agence are workng rgorouy to uphod aw and order. Wth the ncreae n the crmna actvte to combat the crme a data bae about the crmna to be mantaned [2]. Coverng the compete nformaton about the crmna and th data houd be made avaabe wth a the poce peron.a the crmna actvte have extended t wng at dfferent ocaton nformaton exchange between the poce taton at dfferent ocaton w be of great advantage [3] Th mechanm houd be hepfu n nformaton harng and thereby hapng toward a meanngfu crme anay. To upport effectve methodooge that hep n crmna nvetgaton for evauatng the phyca cue and determnng the dfferent tratege to be adopted for nvetgaton are to be formuated. Therefore the phyca evdence obtaned from the wtne and the forenc report hep toward the better crmna anay. Hence n th paper a databae generated from the crmna data avaabe from dfferent poce taton of Andhra radeh. The databae created by conderng two bac fact v. avaabty of wtne at the crmna port and the report from the forenc ab that are coected from the cue pot [4]. The data mnng concept are expoted for mnng the kehood of the crmna baed on the feature/ wtne avaabe. Cuterng performng baed on the type of crme. The crme actvte condered n th paper are Murder Rot kdnap and robbery. Baed on the feature decrbed about the crmna a face generated and the generated face compared wth that of the extng face for fndng the kehood of the crmna [6]. Thee dentte are further mapped wth the forenc cue to formuate a unque dentty. Data mnng technque hep to expore the enormou data and makng t pobe n reachng the utmate goa of crmna anay by ung the concept of cuterng and cafcaton. In th paper the concept of cuterng carred out bang on the type of crme. The ret of paper organed a foow ecton -2 of the paper dea wth feature n ecton- 3 deta about the crme dentfcaton preented Cuterng technque dcued n ecton - 4 the Generaed Gauan Mxture mode preented aong wth updated equaton ung EM agorthm expermentaton hghghted n ecton- 5 the ecton 6 of the paper focu on the concuon 2. Acquton of Feature from the wtne: Any crme nvetgaton hghght prmary on two ue Wtne avaabe and 2 Cue avaabe and reatng thee feature wth that of the data avaabe regardng the crmna. The TIJCSA A Rght Reerved 23
3 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 crme data bae condered n th paper ncude are robbery 2 murder 3 kdnappng 4 rot. For the dentfcaton of any crme we need to have an dea about cue varabe 2 crmna reatng/dentfcaton. Crme cue pay a vta roe n the proper dentfcaton of crmna. The cue hep the teppng tone toward the crme anay and crmna reatng the mappng of the crmna baed on the cue wth data avaabe n the data bae by the ue of ntegent knowedge mappng. 3. Crme Identfcaton ung Crme nk The varou crme nk that were condered ncude Crme ocaton pace: retaurant theater road raway taton hop/god hop ma houe apartment 2 Crmna attrbutehar but eyebrow noe teeth beard age group mutache anguage known 3 Crmna pychoogca behavor can be recogned by type of kng We have condered the type of kng a mooth remova of part harh whch attrbute to the pychoogca behavor of the crmna 4 Modu operand object ued for crme to 2Rope 3Stck 4Knfe Thee crmna nk hep to anaye the dataet there by makng the crme nvetgator to pane for dentfcaton of the crmna. In th paper we have condered bnary cuterng to cuter the data bae baed on type of crme and the cafcaton carred out from the feature avaabe. 3. Bnary cuterng: In order to mpfy the anay proce the huge dataet avaabe to be cutered. The cuterng n th paper baed on the type of crme. A data et generated from the databae avaabe from the Andhra radeh poce department and a tabe created by conderng the FIR report The varou fed condered ncudng the crmna dentfcaton number crmna attrbute crmna pychoogca behavor crme ocaton tme of crme day/nght wtne /cue the data et generated by ung the bnary data of & 0 ndcatng the preence of attrbute TIJCSA A Rght Reerved 24
4 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 and 0 ndcatng the abence of attrbute then cuterng of the bnary data done a propoed by Tao H 2005 ung the bnary cuterng Crme are categored n many way here we have gven weght to each type of crme where weghng cheme condered n the manner a the reatve crme w be gven wth near vaue after appyng cuterng agorthm on th type of crme feature we have got four cuter of crme data they are robbery kdnap murder and rot Fg categore of crme 4. Generaed Gauan Mxture mode The robabty Denty functon the Generaed Gauan mxture mode gven by f µσ e 2 Γ + A σ Z µ A σ TIJCSA A Rght Reerved 25
5 & Appcaton TIJCSA ISSN Vo. No. 4 June TIJCSA A Rght Reerved 26 The nta etmate are updated ung the EM agorthm and the fna updated parameter are gven by A σ σ σ Γ > Γ N N t t / 3/ Γ Γ + θ µ θ σ + N N N k t t N γ θ θ µ γ
6 & Appcaton TIJCSA ISSN Vo. No. 4 June Expermentaton The feature are taken a nput from forenc cue and fnger prnt are condered for th purpoe. The fnger prnt avaabe at pot are compared wth that of the databae compared for the reevancy n crmna. we have condered two varant Aumng the fngerprnt are obtaned at the crme pot In order to ratfy a crmna baed on the fnger prnt we have condered the bood group of the crmna f avaabe to map the unquene of the crmna In order to dentfy a crmna baed on the fnger prnt we have ued a Generaed Gauan Mxture Mode The Feature obtaned from the fnger prnt are condered and the robabty Denty Functon cacuated Th DF matched wth that of the extng crmna to dentfy a crmna In order to dentfy a crmna baed on the fnger prnt we have ued a Generaed Gauan Mxture Mode The Feature obtaned from the fnger prnt are condered and the robabty Denty Functon cacuated Th DF matched wth that of the extng crmna to dentfy a crmna The man reaon for utng Generaed Gauan Mxture Mode that any fngerprnt may be contanng two type of feature Ø Ø Macro feature Mcro feature Macro feature are thoe feature whch can be dentfed drecty uch a Core and Rdge TIJCSA A Rght Reerved 27
7 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 In the tuaton where the macro feature are not avaabe mcro feature w be of great ue.mcro feature ncude vaey deta pont whroo crong Thee feature are mapped and DF are obtaned the tet equence are compared and the crmna ratfed Thee feature are mapped and DF are obtaned the tet equence are compared and the crmna ratfed Fg 2 howng the nput gven to mode Fngerprnt avaabe at crme pot Fnger prnt match wth Crmna fnger prnt TIJCSA A Rght Reerved 28
8 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 Fg 3 Fg 4 Fg 34 howng the output of Fngerprnt mappng wth crmna databae Fg 5 :the nap hot of data et TIJCSA A Rght Reerved 29
9 & Appcaton TIJCSA ISSN Vo. No. 4 June 202 When more than one upect gven The mode ue the other cue ke bood or any other cue for further fterng the t of crmna. 6. Concuon: If the wtne not avaabe at the crme ncdent and f the forenc report are avaabe then n uch cae dentfcaton of the crmna a condered n th paper. The crmna fnger prnt are mapped wth that of the avaabe from the data bae. and f there a map the crmna can be dentfed..if the data avaabe from the wtne not uffcent aong wth the forenc report we conder bood ampe and type of kng n order to ratfy crmna. Th paper preent a nove methodoogy of dentfyng a crmna n the preence of cue by the forenc expert. In thee tuaton n th paper we have tred to dentfy the crmna by mappng the crmna ung the Generaed Gauan mxture mode.. Reference:.Care of Berrew Q.C Data mnng: The new weapon n the war on terrorm retrved from the Internet on Cate H. Fred Lega Standard for Data Mnng retreved from the nternet on Cfton Chrtopher 20. Encycopeda Brtannca: data mnng Retreved from the web on Jeff and Harper Jm Effectve Counterterrorm and the Lmted Roe of redctve Data Mnng retreved from the web U.M. Fayyad and R. Uthuruamy Evovng Data Mnng nto Souton for Inght Comm. ACM Aug pp W. Chang et a. An Internatona erpectve on Fghtng Cybercrme roc. t NSF/NIJ Symp. Integence and Securty Informatc LNCS 2665 Sprnger-Verag 2003 pp TIJCSA A Rght Reerved 30
10 & Appcaton TIJCSA ISSN Vo. No. 4 June H. Kargupta K. Lu and J. Ryan rvacy-sentve Dtrbuted Data Mnng from Mut- arty Data roc. t NSF/NIJ Symp. Integence and Securty Informatc LNCS 2665 Sprnger-Verag 2003 pp Apr M.Chau J.J. Xu and H. Chen Extractng Meanngfu Entte from oce Narratve Report roc.nat Conf. Dgta Government Reearch Dgta Government Reearch Center 2002 pp A. Gray. Sa and S. MacDone Software Forenc: Extendng Authorhp Anay Technqueto Computer rogram roc. 3rd Bannua Conf.Int Aoc. Forenc Lngutc Int Aoc. Forenc Lngutc 997 pp R.V. Hauck et a. Ung Copnk to Anaye Crmna-Jutce Data Computer Mar pp T. Senator et a. The FnCEN Artfca Integence Sytem: Identfyng otenta Money Launderng from Report of Large Cah Tranacton AI Maganevo.6 no pp W. Lee S.J. Stofo and W. Mok A Data Mnng Framework for Budng Intruon detecton Mode roc. 999 IEEE Symp. Securty and rvacy IEEE CS re 999 pp O. de Ve et a. Mnng E-Ma Content for Author Identfcaton Forenc SIGMOD Record vo. 30 no pp G. Wang H. Chen and H. Atabakhh Automatcay Detectng Deceptve Crmna Identte Comm. ACM Mar pp S. Waerman and K. Faut Soca Network Anay:Method and Appcaton Cambrdge Unv. re TIJCSA A Rght Reerved 3
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University
FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL
FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University
JOINT IMPORTANCE MEASURES IN NETWORK SYSTEM
V CHACKO ANOHARAN JOINT IPORTANCE EASRES IN NETWORK SYSTE RT&A # 04 (3) (Vo) 0 December JOINT IPORTANCE EASRES IN NETWORK SYSTE V Chaco and anoharan Deartment of Stattc StThoma Coege Thrur-68000Keraa Inda
An Ensemble Classification Framework to Evolving Data Streams
Internatona Journa of Scence and Research (IJSR) ISSN (Onne): 39-7064 An Ensembe Cassfcaton Framework to Evovng Data Streams Naga Chthra Dev. R MCA, (M.Ph), Sr Jayendra Saraswathy Maha Vdyaaya, Coege of
PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS
Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: [email protected] Abtract:
Development and use of prediction models in Building Acoustics as in EN 12354. 1 Introduction. 2 EN 12354, part 1 & 2. 2.2 Lightweight single elements
evelopment and ue of predcton model n Buldng Acoutc a n EN 1354 Eddy TNO Scence and Indutry, P.O. Box 155, N-600 A elft, The Netherland, [email protected] Improvng the acoutc clmate n buldng an mportant
s-domain Circuit Analysis
S-Doman naly -Doman rcut naly Tme doman t doman near rcut aplace Tranform omplex frequency doman doman Tranformed rcut Dfferental equaton lacal technque epone waveform aplace Tranform nvere Tranform -
ARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( )
COMAID:5 JID:COMAID AID:5 /FLA [mg; v 79; Prn:/0/009; 4:0] P -) Computer Aded Geometrc Degn ) Content lt avalable at ScenceDrect Computer Aded Geometrc Degn wwwelevercom/locate/cagd Fat approach for computng
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Multi-agent System for Custom Relationship Management with SVMs Tool
Mut-agent System for Custom Reatonshp Management wth SVMs oo Yanshan Xao, Bo Lu, 3, Dan Luo, and Longbng Cao Guangzhou Asan Games Organzng Commttee, Guangzhou 5063, P.R. Chna Facuty of Informaton echnoogy,
ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C.
ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C Bob Hardy Thunder Scentfc Corporaton, Albuquerque, NM, USA Abtract:
THE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko
Internatonal Journal "Informaton Theore & Applcaton" Vol5 / 28 253 TE ANALYSIS AND OTIMIATION OF SURVIVABILITY OF MLS NETWORS Mohammadreza Moavar, Yur aychenko Abtract: The problem of MLS network urvvablty
A Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
How To Understand Propect Theory And Mean Variance Analysis
Invetment Management and Fnancal Innovaton, Volume 6, Iue 1, 2009 Enrco De Gorg (Swtzerland ), Thorten Hen (Swtzerland) Propect theory and mean-varance analy: doe t make a dfference n wealth management?
Cardiovascular Event Risk Assessment Fusion of Individual Risk Assessment Tools Applied to the Portuguese Population
Cardovascuar Event Rsk Assessment Fuson of Indvdua Rsk Assessment Toos Apped to the Portuguese Popuaton S. Paredes, T. Rocha, P. de Carvaho, J. Henrques, J. Moras*, J. Ferrera, M. Mendes Abstract Cardovascuar
2) A single-language trained classifier: one. classifier trained on documents written in
Openng the ega terature Porta to mutngua access E. Francescon, G. Perugne ITTIG Insttute of Lega Informaton Theory and Technooges Itaan Natona Research Counc, Forence, Itay Te: +39 055 43999 Fax: +39 055
Tuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
An Integrated Semantically Correct 2.5D Object Oriented TIN. Andreas Koch
An Integrated Semantcally Correct 2.5D Object Orented TIN Andreas Koch Unverstät Hannover Insttut für Photogrammetre und GeoInformaton Contents Introducton Integraton of a DTM and 2D GIS data Semantcs
Multifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm
Journal of Computatonal Informaton Sytem 7:2 (211) 385-393 Avalable at http://www.jofc.com Multfuncton Phaed Array Radar Reource Management: Real-me Schedulng Algorm Janbn LU 1,, Hu XIAO 2, Zemn XI 1,
Statistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
Mathematical model of service quality performance s computing of multiservice network
Mathematca mode of erce quaty performance computng of muterce networ Tuemoa Gufarda, Internatona academy of bune, maty, Kazahtan btract Th artce deoted to effectene of muterce networ functonng n order
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
EESE: Nationwide Nanotechnology Ethics Education Development
: Natonwde Nanotechnoogy thc ducaton Deveopment 3/15/7 ducaton ward: -978 Prof rty Center for Hgh Technoogy atera; Prof Chare Fedderman choo of ngneerng; Unverty of New exco ducatona Goa 1 Pot tranfer
Prediction of Success or Fail of Students on Different Educational Majors at the End of the High School with Artificial Neural Networks Methods
Predcton of Success or Fa of on Dfferent Educatona Maors at the End of the Hgh Schoo th Artfca Neura Netors Methods Sayyed Mad Maznan, Member, IACSIT, and Sayyede Azam Aboghasempur Abstract The man obectve
Lecture #21. MOS Capacitor Structure
Lecture #21 OUTLINE The MOS apactor Electrotatc Readng: oure Reader EE130 Lecture 21, Slde 1 MOS apactor Structure MOS capactor (croectonal vew _ TE x EE130 Lecture 21, Slde 2 Typcal MOS capactor and trantor
Trivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
Quantitative Evaluation of Porosity in Aluminum Die Castings by Fractal Analysis of Perimeter
Materal Tranacton, Vol. 49, No. 4 (28) pp. 782 to 786 #28 The Japan Inttute of Metal Quanttatve Evaluaton of Poroty n Alumnum De Catng by Fractal Analy of Permeter Yohhko Hanga 1 and Sochro Ktahara 2 1
Some Numerical Methods for Temperature and Mass Transfer Simulation on the Dehydration of Herbs
Internatona Journa of Computer and Eectrca Engneerng, Vo., No. 4, Augut, 793-863 Some Numerca Meod for Temperature and Ma Tranfer Smuaton on e Dehydraton of Her Md. Rau Iam, Memer, IACSIT and Norma Aa
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM
GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: [email protected] 1/Introducton The
Extending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
Modeling ISP Tier Design
Modelng ISP Ter Degn We Da School of Informaton and Computer Scence Unverty of Calforna, Irvne Irvne, CA, US [email protected] Scott Jordan School of Informaton and Computer Scence Unverty of Calforna, Irvne
Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications
CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary
Conversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
The Design of Reliable Trust Management Systems for Electronic Trading Communities
The Degn of Relale Trut Management Sytem for Electronc Tradng Communte Chryantho Dellaroca Sloan School of Management Maachuett Inttute of Technology Room E53-315 Camrdge, MA 02139 [email protected] Atract:
Basic Principle of Buck-Boost
Bac Prncple of Buck-Boot he buck-boot a popular non-olated nvertng power tage topology, ometme called a tep-up/down power tage. Power upply degner chooe the buck-boot power tage becaue the requred output
The Shrinking Hand: Why Information Technology Leads to Smaller Firms
Th paper can e downoaded wthout charge from the Soca Scence Reearch Network eectronc rary at: http://rn.com/atract=1601193 It ha een puhed n reved form n The Internatona Journa of the Economc of Bune,
Swing-Free Transporting of Two-Dimensional Overhead Crane Using Sliding Mode Fuzzy Control
Swng-Free Transportng of Two-Dmensona Overhead Crane Usng Sdng Mode Fuzzy Contro Dantong Lu, Janqang, Dongn Zhao, and We Wang Astract An adaptve sdng mode fuzzy contro approach s proposed for a two-dmensona
Netherlands Published online: 27 Jun 2013.
Th artcle wa downloaded by: [Bblotheek TU Delft] On: 04 Noveber 2013, At: 08:09 Publher: Routledge Infora Ltd Regtered n England and Wale Regtered Nuber: 1072954 Regtered offce: Morter Houe, 37-41 Morter
A Novel Architecture Design of Large-Scale Distributed Object Storage System
Internatonal Journal of Grd Dtrbuton Computng Vol.8, No.1 (2015), pp.25-32 http://dx.do.org/10.14257/gdc.2015.8.1.03 A Novel Archtecture Degn of Large-Scale Dtrbuted Obect Storage Sytem Shan Yng 1 and
An Integrated Resource Management and Scheduling System for Grid Data Streaming Applications
An Integrated eource Management and Schedulng Sytem for Grd Data Streamng Applcaton Wen Zhang, Junwe Cao 2,3*, Yheng Zhong,3, Lanchen Lu,3, and Cheng Wu,3 Department of Automaton, Tnghua Unverty, Bejng
Optimum Design of Magnetic Inductive Energy Harvester and its AC-DC Converter
Otmum Degn of Magnetc nductve Energy Harveter and t AC-DC Converter Qan Sun, Sumeet Patl, Stehen Stoute, Nan-Xang Sun, Brad Lehman Deartment of Electrcal and Comuter Engneerng Northeatern Unverty Boton,
ESSAYS IN RENEWABLE ENERGY AND EMISSIONS TRADING
ESSAYS IN RENEWABLE ENERGY AND EMISSIONS TRADING By JOSHUA D. KNEIFEL A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE
Mall Cell Network - Power, Memory and Networking
Slow admon and power control for mall cell network va dtrbuted optmzaton Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah To cte th veron: Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah. Slow admon and power control
Advances in Military Technology Vol. 10, No. 1, June 2015
AM Avance n Mltary echnology Vol., No., June 5 Mechancal an Computatonal Degn for Control of a -PUS Parallel Robot-bae Laer Cuttng Machne R. Zavala-Yoé *, R. Ramírez-Menoza an J. Ruz-García ecnológco e
Measuring adverse selection in managed health care
Ž. Journal of Health Economc 19 2000 829 854 www.elever.nlrlocatereconbae Meaurng advere electon n managed health care Rchard G. Frank a,), Jacob Glazer b, Thoma G. McGure c a HarÕard UnÕerty, HarÕard
Dynamic Control of Data Streaming and Processing in a Virtualized Environment
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynamc Control of Data Streamng and Proceng n a Vrtualzed Envronment Junwe Cao, Senor Member, IEEE, Wen Zhang,
REVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, 233-244, 2012.
REVISA INVESIGACIÓN OPERACIONAL VOL., 33, NO. 3, 33-44,. ORDERING POLICY FOR INVENORY MANAGEMEN WHEN DEMAND IS SOCK- DEPENDEN AND A EMPORARY PRICE DISCOUN IS LINKED O ORDER UANIY Nta H. Shah Department
Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.
chapter 8 Vctm assstance 385 Tool 8.3 Protecton, assstance and human rghts Overvew Ths tool dscusses the human rghts consderatons whch must be borne n mnd n protectng and assstng vctms of traffckng. Recommended
Pixel Bar Charts: A New Technique for Visualizing Large Multi-Attribute Data Sets without Aggregation
Pxel Bar Chart: A New Technque or Vualzng Large Mult-Attrbute Data Set wthout Aggregaton Danel Kem*, Mng C. Hao, Julan Lach*, Mechun Hu, Umehwar Dayal Hewlett Packar Reearch Laboratore, Palo Alto, CA Abtract
Robust biometric-based user authentication scheme for wireless sensor networks
Robut bometrc-baed uer autentcaton ceme for wrele enor network Debao He* cool of Matematc and tattc Wuan nverty Wuan Cna Emal: [email protected] Abtract: Wrele enor network (WN) are appled wdely a varety of
The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.
Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance
Performance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Predicting Advertiser Bidding Behaviors in Sponsored Search by Rationality Modeling
Predctng Advertser Bddng Behavors n Sponsored Search by Ratonaty Modeng Hafeng Xu Centre for Computatona Mathematcs n Industry and Commerce Unversty of Wateroo Wateroo, ON, Canada [email protected] Dy
Capacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
Coordinate System for 3-D Model Used in Robotic End-Effector
AU JT 8(: 8 (Apr Codnate Sytem f D Model Ued n Robot EndEffer ulfqar Al Soomro Shool of Advaned Stude, Aan Inttute of Tehnology Pathum Than, Thaland Abtrat Th paper reve the onept of odnate ytem on new
2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
1 2011 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Detecting Suspicion Information on the Web Using Crime Data Mining Techniques
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 3, No. 1, 2014, Page: 32-41, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com Detecting Suspicion
Hospital care organisation in Italy: a theoretical assessment of the reform
Dartmento d Scenze Economche Unvertà d Breca Va S. Fautno 7/b 5 BESCIA Tel. 3 98885 Fax. 3 988837 e-mal: [email protected] otal care organaton n Italy: a theoretcal aement of the reform oella evagg Abtract.
A FEATURE SELECTION AGENT-BASED IDS
A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,
Comparison of workflow software products
Internatona Conference on Computer Systems and Technooges - CompSysTech 2006 Comparson of worfow software products Krasmra Stoova,Todor Stoov Abstract: Ths research addresses probems, reated to the assessment
The issue of whether the Internet will permanently destroy the news media is currently a
Wll the Internet etroy the New Meda? or Can Onlne Advertng Market Save the Meda? by Suan Athey, Emlo Calvano and Johua S. Gan * Frt raft: October, 009 Th Veron: November, 00 PRELIMINARY PLEASE O NOT QUOTE
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics
Usng an Adaptve Fuzzy Logc System to Optmse Knowledge Dscovery n Proteomcs James Malone, Ken McGarry and Chrs Bowerman School of Computng and Technology Sunderland Unversty St. Peter s Way, Sunderland,
A Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
Using Content-Based Filtering for Recommendation 1
Usng Content-Based Flterng for Recommendaton 1 Robn van Meteren 1 and Maarten van Someren 2 1 NetlnQ Group, Gerard Brandtstraat 26-28, 1054 JK, Amsterdam, The Netherlands, [email protected] 2 Unversty of
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
GRADIENT METHODS FOR BINARY INTEGER PROGRAMMING
Proceedns of the 4st Internatona Conference on Computers & Industra Enneern GRADIENT METHODS FOR BINARY INTEGER PROGRAMMING Chen-Yuan Huan¹, Ta-Chun Wan² Insttute of Cv Avaton, Natona Chen Kun Unversty,
A Resources Allocation Model for Multi-Project Management
A Resources Aocaton Mode for Mut-Proect Management Hamdatou Kane, Aban Tsser To cte ths verson: Hamdatou Kane, Aban Tsser. A Resources Aocaton Mode for Mut-Proect Management. 9th Internatona Conference
Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA
From: FLAIRS-02 Proceeding. Copyright 2002, AAAI (www.aaai.org). A right reerved. Sytem Refinement in Practice Uing a Forma Method to Modify Rea Life Knowedge Rainer Knauf and Ika Phiippow Imenau Technica
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
XAC08-6 Professional Project Management
1 XAC08-6 Professona Project anagement Ths Lecture: Tte s so manager shoud ncude a s management pan a document that gudes any experts agree Some faure project to Ba, ba, ba, ba Communcaton anagement Wee
SIMPLIFYING NDA PROGRAMMING WITH PROt SQL
SIMPLIFYING NDA PROGRAMMING WITH PROt SQL Aeen L. Yam, Besseaar Assocates, Prnceton, NJ ABSRACf The programmng of New Drug Appcaton (NDA) Integrated Summary of Safety (ISS) usuay nvoves obtanng patent
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
Simple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
On-Line Trajectory Generation: Nonconstant Motion Constraints
2012 IEEE Internatona Conference on Robotcs and Automaton RverCentre, Sant Pau, Mnnesota, USA May 14-18, 2012 On-Lne Trajectory Generaton: Nonconstant Moton Constrants Torsten Kröger Abstract A concept
RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
