LoSS Detection Using Parameter s Adjustment Based on Second Order Self- Similarity Statistical Model
|
|
- Blake Baldric Lewis
- 5 years ago
- Views:
Transcription
1 LoSS Detection Using Paraeter s Adjustent Based on Second Order Self- Siilarity Statistical Model Mohd Fo ad Rohani Faculty of Coputer Science and Inforation Systes, Universiti Tenologi Malaysia, 83 Sudai, Johor, Malaysia. foad@ut.y Ali Selaat Faculty of Coputer Science and Inforation Systes, Universiti Tenologi Malaysia, 83 Sudai, Johor, Malaysia. aselaat@ut.y Mohd Aizaini Maarof Faculty of Coputer Science and Inforation Systes, Universiti Tenologi Malaysia, 83 Sudai, Johor, Malaysia. aizaini@ut.y Houssain Kettani Departent of Electrical and Coputer Engineering and Coputer Science, Polytechnic University of Puerto Rico, San Juan, Puerto Rico 99, USA. hettani@pupr.edu Abstract This paper analyzes Loss of Self-Siilarity (LoSS) detection accuracy using paraeter s adjustent which includes different values of sapling level and correlation lag. This is iportant when considering exact and asyptotic self-siilar odels concurrently in the self-siilarity paraeter estiation ethod. Due to the needs of high accuracy and fast estiation, the Optiization Method (OM) based on Second Order Self-siilarity (SOSS) statistical odel was proposed in the previous wors to estiate self-siilarity paraeter. Consequently, Curve Fitting Error (CFE) value estiated fro OM is used to detect LoSS efficiently. This wor investigates the effect of the paraeter s adjustent for iproving the CFE accuracy and estiation tie speed. We have tested the ethod with real Internet traffics siulation that consists of noral and alicious pacets traffic. Our siulation results show that LoSS detection accuracy and estiation tie can be affected by the chosen of sapling level and correlation lag values.. Introduction The advance of attac tools and their availability on Internet have increased networ vulnerability to isuse and perforance traffic probles. Internet service providers are now faced with the challenging tas of continuous onitoring of their networ to ensure that security is aintained. Thus, onitoring Internet traffic especially to detect anoaly traffic is very iportant to assist security experts in analyzing and detecting alicious traffic behavior. The effort is needed by networ adinistrator in order to offer uninterrupted Internet services to the users. There are several odels that have been applied to detect anoaly traffic including statistical oents (or ean and standard deviation odel), ultivariate odel or tie series odel []. When dealing with huge aount of traffic pacets where behavior traffic eep changing unpredictably, anoaly detection using tie series odel is suggested since the odel can produce better results than others statistical odels []. Recent studies have shown that self-siilarity odel is widely used for Internet traffic odeling and analysis [3], [4], [5], [7], [8]. According to self-siilarity odel, the autocorrelation of inter arrival traffic pacets is assuing to exhibit hyperbolic decay and Long Range Dependent (LRD). This assuption is true for noral traffic but in the presence of alicious traffic such as Denial of Service (DoS) pacets, the self-siilarity distribution error [4] is introduced and perturbs the self-siilarity odel. Consequently, Loss of Self-siilarity (LoSS) is detected [],_[6],_[4] to /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
2 alert security analysts with the existence of uncontrolled self-siilarity structure in networ queue buffer [4], []. Thus, pacets queue buffer tie delay and pacets drop rates are drastically increased [4], [] hence degrading Quality of Service (QoS) perforance. Ipleentation of LoSS detection with Second Order Self-Siilarity (SOSS) statistical odel has been introduced due to high speed and accuracy needs [6]. Previous wors [], [6], however, have used fixed sapling tie series pacets which is insufficient to reveal self-siilarity distribution error correctly [], [3]. In this wor, we investigate LoSS detection accuracy and its dependency on two variables nown as sapling level and correlation lag. This is crucial when cobining the idea of exact and asyptotic selfsiilarity odels concurrently in the estiation ethod [9]. In our wor, we use Second Order Self-siilarity (SOSS) statistical odel and the Optiization Method (OM) [7] to estiate the self-siilarity paraeter. LoSS is detected if the Curve Fitting Error (CFE) estiated using OM exceeds the threshold value [6]. Anoaly traffic detection based on LoSS will suffer high false alar detection rate if iproper sapling level and insufficient correlation lag process are used in the estiation ethod [],_[3]. Thus, LoSS detection accuracy using different values of sapling levels and correlation lag are analyzed and the estiation tie processing speed is also investigated. This paper is organized as follows: Section discuses in brief the self-siilarity odel LoSS detection ethod. The experiental and epirical analyses are presented in Section 3. Finally, our conclusions and future wors are suarized in Section-4.. Self-Siilarity Model and LoSS Detection Method. SOSS Model and Estiation Method Let define a second-order stationary process X = { X( t), t > } with constant ean μ, finite variance σ and autocorrelation ρ ( ) as follow: μ σ μ = EXt [ ( )], = E[( Xt ( ) )] () ρ( ) E[( X( t) μ)( X( t ) μ)] / σ = + () ( ) ( ) Let X = { X ( t), t > } denotes the aggregate process of X at aggregation level >. Thus, we have: Let t ( ) X () t = X( w), t > (3) w = ( t ) + ( ) ρ ( ) denotes the autocorrelation function of ( ) X. X is called Exactly Second-Order Self-Siilar ( ) (ESOSS) if ρ( ) = ρ ( ) for all _ _. In ESOSS, the autocorrelation structure is preserved for all such that: ρ( ) = [( + ) + ( ) ] (4) where > and <β<. X is called Asyptotical Second-Order Self-Siilar (ASOSS) if li ρ ( ) ~ [( ) ( ) ] + + (5) where >, > and <β<. X is called Long-Range Dependent (LRD) if its autocorrelation function satisfies: ρ ( ) ~ c where, c> and <β<. There are several ethods to estiate H. In this paper we use OM that was developed in [7] which was proven relatively fast and accurate copared to other ethods such as the wavelet ethod. The OM defines Curve-Fitting Error (CFE) function as E K (β) such as: K E ( β)= ( ( ) ( )) K ρ ρ (6) n 4K = where ρ() denotes the autocorrelation function of the odel with paraeter β that we would lie to fit the data to, ρ n () is the saple autocorrelation function of the data, and K is the largest value of such that it iniize the edge effect for the calculation of ρ n (). If the iniu of E K (β) is less than -3, then the data fits the odel and the iniizer ˆβ is piced to be the estiate of the paraeter β [7].. LoSS Detection Using Paraetric Adjustent Let X(t) as a stochastic tie series data with second order stationary property. The autocovariance decay of X(t) and aggregated X () (t) should follow ESOSS odel which can be written in equation (7): li γ ( ) = γ( ) ~ C β (7) where is sapling level, is correlation lag, C o is constant and β is self-siilarity paraeter. In real Internet traffic, however, the self-siilarity processes are also considered as processes x(j) in the class X of those stationary processes that feature an asyptotic decay in autocovariance [9]. Thus, we /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
3 should consider ESOSS and ASOSS odels concurrently in order to estiate the self-siilarity paraeter for noral and abnoral traffic correctly. Let denotes autocovariance, variance and autocorrelation for aggregated process X () (t) as shown in equation (8), (9) and () [9]. li γ ( ) C β (8) li γ () ~ li ρ ( ) = li ~ C β (9) C ~ C γ ( ) γ () ~ β 3 C β () where C, C and C 3 are constants. The wors in [7], [8] have assued that noral Internet traffic follows ESOSS odel and its characteristics are shown in equations (8) to (). Equation () clearly deonstrates that autocorrelation decay does not affected by aggregation () paraeter. On the other hand, correlation lag () plays an iportant role to obtain high accuracy of self-siilarity paraeter (β) estiation. In the presence of alicious traffic such as DoS pacets, the high intensity of DoS pacets can disturb Internet traffic behavior and produce self-siilarity distribution error. Consequently, noral characteristics of equations (8) to () are not valid where LoSS is detected. Equation () shows that for abnoral traffic, the autocovariance and variance decay of C β and ' ( C β ) are not identical and not following noral self-siilarity pattern as in equation (). β γ ( ) C li ρ ( ) = li ' β γ () ( C ) ~ C 3 β () This shows that for detecting alicious traffic, aggregation and correlation lag are two paraeters that need to be considered for estiating the CFE value correctly in order to iprove LoSS detection accuracy. 3. Experiental and Epirical Analyses 3. Siulation Dataset We have siulated the FSKSMNet Internet traffic traces collected on Septeber 9, 6 at Faculty of Coputer Science and Inforation Systes (FCSIS) in order to evaluate the proposed LoSS detection approach [3]. The networ infrastructure consists of ten VLANs with BaseFX Fast Ethernet bacbone which is connected to university Gigabit bacbone. The siulation is divided into noral and abnoral traffic. Noral traffic is defined as Internet activities that strictly follow FCSIS networ policy. On the other hand, abnoral traffic contains siulated injection of DoS flooding pacets at controlled rate that includes TCP SYN and UDP flooding pacets. Each of siulation traces is about 3 inutes. Table shows the details of our siulated traffic protocols. The percentage protocol for noral traffic shows that alost 97% is doinated by TCP protocol while UDP is less than.5%. The ICMP, IGMP and others protocol are less than.5%. On the other hand, the siulated alicious traffic consists of 8% TCP SYN and 7% UDP flooding while noral protocols of TCP and UDP are 4% and 3%. The reainder is ICMP, IGMP and others which less than.5%. We use sapling level at icro sapling (i.e. below second) [], [3] that represents crucial engineering factor [] design for Internet odeling purpose. Different sapling levels for the traces used in our experients and their window size (or data length) are shown in Table. Trace Noral (.45p -.5p) Malicious (.46a-.6p) Table. FSKSMNet traffic siulation Tie Injection (SYN/UDP) None.55a (TCP SYN : 6s).5p (UDP flood : 6s) None Pacet s Count Protocol Noral DoS TCP UDP ICMP 5436 None IGMP 93 Others 55 TCP UDP ICMP 3599 IGMP 476 Others 99 None Table. Details sapling of siulation dataset Sapling Level (s) Noral (N) Window Size Malicious (M) Window Size N M N M N 7399 M 7399 N 8699 M N M N M N 739 M /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
4 3. LoSS Detection with Paraetric Adjustent The siulation result of CFE estiation using different values of sapling level and correlation lag for noral trace is illustrated in Figure. Figure clearly shows that the estiated CFE value for noral trace at all sapling levels and correlation lags are below the threshold. The result shows that sapling level and correlation lag do not influence uch on estiating the CFE value correctly for noral traffic that follows ESOSS odel. Different sapling level will produce different window pacets size while different correlation lag will give different estiation tie process. In certain fixed capturing tie duration, higher sapling level will produce saller window pacets size copared to lower sapling level. When window size pacet is too sall, it is possible to estiate the self-siilarity paraeter incorrectly due to insufficient data that do not fulfill the iniu window requireent [6]. On the other hand, the increasing of correlation lag value can increase the correlation tie speed processing. Thus, previous wors [8] on estiating self-siilarity paraeter for noral traffic use sall sapling level such as s or s and use sall correlation lag such as 5 [7]. as s, the sapling level is insufficient to reveal LoSS occurrences despite using large value of correlation lag. Consequently, LoSS detection accuracy can be iproved further by increasing higher sapling level such as larger than s and suitable correlation lag such as larger than is used. The details of CFE estiation are presented in Table 3. As shown in Table 3, at sapling level s none of LoSS is detected even though large correlation lag are used. This can be a possible reason for high false alar detection if LoSS is detected at s. On the other hand, by increasing sapling level to the higher value, LoSS detection accuracy can be iproved. For instance, at sapling level s if sall correlation lag is chosen lower than, LoSS is not detected but % detected if correlation lag larger than is used. At higher sapling such as larger than 5s, however, the accuracy of LoSS is % detected regardless the value of correlation lag used. This observation deonstrates that choosing a proper value of sapling and correlation lag is iportant in order to detect LoSS correctly..5. estiate threshold x -4 estiate threshold LoSS ( CFE ) LoSS ( CFE ) Aggregation ( s ) 7 5 Lag ( K ) Aggregation ( s ) Lag ( K ) Figure. LoSS detection for noral trace For alicious traffic, however, proper values of sapling level and correlation lag are needed in order to estiate LoSS correctly. Figure illustrates LoSS estiation based on CFE for alicious traffic trace. As shown in Figure, the accuracy of CFE estiation for alicious traffic is influenced by the sapling level and correlation lag values. At very sall sapling such Figure. LoSS detection for alicious trace Table 3. Details CFE estiation for alicious trace Trace Auto-correlation lag () (M) M M M M M M M /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
5 3.3 LoSS Detection Perforance Our siulation results show that for noral traffic that follows ESOSS odel, zero LoSS is detected despite a different set of sapling level (fro s to s) and correlation lag (fro 5 to 5) are used in the estiation. This deonstrates that paraeter s adjustent has less effect on the LoSS detection for noral traffic. This eans that sall sapling such as s or s as used in [8] and sall correlation lag such as 5 as used in [7] are sufficient to estiate selfsiilarity paraeter correctly. On the other hand, LoSS detection for alicious traffic trace has different accuracy when applying different value of sapling level and correlation. The details of LoSS detection perforance for alicious trace are shown in Table 4. The results deonstrate that a proper selection of paraeter adjustent is needed in order to reduce false alar LoSS detection. As shown in Table 4, zero LoSS is detected at sapling level s but significantly iproved to % detected at sapling level higher than 5s regardless any values of correlation lags are used. The results also show that LoSS detection accuracy for sapling level between s and 5s is very uch depending on the chosen of correlation lag value. For instance, sapling level s requires correlation lag above to detect LoSS successfully copared to sall correlation lag. Siilarly, sapling level s needs correlation lag above for LoSS is fully detected. Table 5. LoSS detection perforance for alicious trace Trace (M) Autocorrelation lag () M No No No No No No M 5 No No No No Yes Yes M No No Yes Yes Yes Yes M No Yes Yes Yes Yes Yes M 5 Yes Yes Yes Yes Yes Yes M 7 Yes Yes Yes Yes Yes Yes M Yes Yes Yes Yes Yes Yes The different between saller and higher sapling level is window size produced fro certain duration of capturing tie. A saller sapling produces a larger window size copared to a higher sapling level. In our siulation for 3 inutes traffic capturing, sapling level at s, s and s provide window size of 7399, 7399 and 739 pacets respectively. The advantage of sall sapling is less tie needed to fulfill iniu window requireent [6] for initialization process before paraeter estiation can be done correctly. On the other hand, LoSS can be possibly hidden under sall sapling level. Therefore, LoSS detection perforance can be iproved by cobining proper selection of sapling level and correlation lag values. Another paraeter to be considered for developing a reliable LoSS detection ethod is estiation tie factor. Figure 3 illustrates the processing tie for estiating LoSS detection using different values of sapling level and correlation lag. The result deonstrates that different window size pacet fro different sapling level has given different estiation tie processing. The longer window size pacet is used, the longer tie processing is needed. Elapse Tie ( s ) Elapse Tie ( s ) =s, w=7399 =s, w=7399 =5s, w= Lag ( ) (a) =5s, w=34798 =s, w=8699 =s, w= Lag ( ) (b) Figure 3. LoSS detection elapse estiation tie for alicious trace /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
6 As shown in Figure 3(a), sapling level s and s produce alost the longest and shortest estiation tie than others at all correlation lag values. Another iportant observation is that at each sapling level, the increasing of correlation lag will also increases the estiation tie processing. This can be seen in saller sapling level such as s in Figure 3(a) or at larger sapling level in Figure 3(b). The results show that correlation lag equal 5 taes less estiation tie copared to 5 at alost all sapling levels. Fro the siulation results, a general guideline in order to achieve an accurate LoSS detection using OM as well as to optiize estiation tie can be followed. If sall sapling level is used then correlation lag ust be assigned with bigger value. On the other hand, larger sapling level needs saller value of correlation lag that can sufficiently reveal the existence of selfsiilarity distribution error efficiently. Further efforts, however, should be done in order to deterine an optiize value of sapling level and correlation lag paraeters in order to optiize LoSS detection accuracy perforance. 4. Conclusions and Future Wors Paraeter s adjustent which includes sapling level and correlation lag are identified as a prie factor that can influence LoSS detection accuracy. The siulation results show that sapling level does not influence CFE estiation for noral traffic that follows ESOSS odel. The accuracy of the estiated CFE, however, is very uch depending on correlation lag paraeters. On the other hand, both paraeters sapling level and correlation lag have a significant effect on the CFE estiation accuracy for alicious traffic. Our results show that LoSS is possibly hidden either at sall sapling level or correlation lag which can contribute to false alar detection. The higher sapling level can increase LoSS detection accuracy provided the window size is sufficient. Siilarly, the increent of correlation lag can reduce overall detection perforance where the estiation tie is increased. Therefore, sapling level and correlation lag can affect the perforance of LoSS detection for both accuracy and speed. We plan to test the proposed analysis ethod to various Internet traffic datasets in future to study the reliability of the ethod. 6. Acnowledgents This wor was funded by Universiti Tenologi Malaysia and Ministry of Science and Innovation Malaysia. The authors are grateful to Dr. Sulaian Mohd Noor and Mr. Firoz for their helps in preparing the siulation of FSKSMNet dataset. 7. References [] Allen, W. H. and Marin, G.A., The LoSS technique for detecting new Denial of Service attacs, SoutheastCon, 4. Proceedings. IEEE, 6-9 March 4, pp [] Cairano-Gilfedder, C. and Clegg, R.G., A decade of Internet research -- advances in odels and practices, BT Technology Journal 3, vol.4, Oct. 5, pp [3] Crovella, M.E. and Bestavros, A. Self-siilarity in World Wide Web traffic: Evidence and possible causes networing, IEEE/ACM Transactions on Networing, Volue 5, Issue 6, Deceber 997, pp [4] Errailli, A., Narayan, O. and Willinger, W., Experiental queueing analysis with long-range dependent pacet traffic, Transactions on Networing, Vol(4), 996, pp [5] Feldann, A., Gilbert, A.C., Willinger, W. and Kurtz, T.G., The changing nature of networ traffic: scaling phenoena, ACM Coputer Counication, Vol.8(), April 998, pp [6] Idris, M. Y., Abdullah, A. H. and Maarof, M. A., Iterative window size estiation on self-siilarity easureent for networ traffic anoaly detection, International Journal of Coputing and Inforation Science, (IJCIS), Vol. (), 4, pp [7] Kettani, H., A Novel Approach to the Estiation of the Long-Range Dependence Paraeter, University of Wisconsin Madison : PhD. Thesis,. [8] Leland, W., Taqqu, M., Willinger, W. and Wilson, D., On the self-siilar nature of Ethernet traffic, Proceedings of ACM SIGCOMM, Vol. 3(4), 993, pp [9] Mazzini, G., Rovatti, R. and Setti, G., "On the Aggregation of Self-Siilar Processes," IEICE Transactions Fundaentals, Vol.E88 A (), October 5, pp [] Par, K., Ki, G. and Crovella, M., On the effect of traffic self-siilarity on networ perforance, Proceedings /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
7 of SPIE International Conference on Perforance and Control of Networ Systes, Noveber 997. [] Qayyu, A., Isla, M.H., Jail, M., "Taxonoy of statistical based anoaly detection techniques for intrusion detection," Eerging Technologies, 5. Proceedings of the IEEE Syposiu on, 7-8 Sept. 5, pp [] Rohani, M.F., Maarof, M.A., Selaat, A. and Kettani, H., Uncovering Anoaly Traffic Based on Loss of Self- Siilarity Behavior Using Second Order Statistical Model, International Journal of Coputer Science and Networ Security (IJCSNS), Vol.7(9), pp 6-, Septeber 7. [3] Rohani, M.F., Maarof, M.A., Selaat, A. and Kettani, H., Loss of Self-Siilarity Detection with Second Order Statistical Model and Multi-Level Aggregation Approach, Proceedings of the International Conference on Robotics, Vision, Inforation and Signal Processing ROVISP7, 8-3 Noveber 7, pp [4] Schleifer, W. and Mannle, M., Online error detection through observation of traffic self-siilarity, IEE Proceedings on Counications, 48(), Feb /8/$5. 8 IEEE Proceedings of the 3rd International Syposiu on Inforation Technology (ITSi8), pp. 6-9, Kuala Lupur, Malaysia, August 8.
Non-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationAnalyzing Simulation Results
Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationKeywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution
Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality
More informationProc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES
Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationWarning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network
565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association
More informationA New Approach to Solving Dynamic Traveling Salesman Problems
A New Approach to Solving Dynaic Traveling Salesan Probles Changhe Li 1 Ming Yang 1 Lishan Kang 1 1 China University of Geosciences(Wuhan) School of Coputer 4374 Wuhan,P.R.China lchwfx@yahoo.co,yanging72@gail.co,ang_whu@yahoo.co
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationQualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science
Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Tenerife, Canary Islands, Spain, Deceber 16-18, 2006 183 Qualitative Modelling of Tie Series Using Self-Organizing Maps:
More informationREDUCTION OF FINITE ELEMENT MODELS BY PARAMETER IDENTIFICATION
ISSN 139 14X INFORMATION TECHNOLOGY AND CONTROL, 008, Vol.37, No.3 REDUCTION OF FINITE ELEMENT MODELS BY PARAMETER IDENTIFICATION Riantas Barauskas, Vidantas Riavičius Departent of Syste Analysis, Kaunas
More informationResearch Article Note on Studying Change Point of LRD Traffic Based on Li s Detection of DDoS Flood Attacking
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 200, Article ID 962435, 4 pages doi:0.55/200/962435 Research Article Note on Studying Change Point of LRD Traffic Based on Li
More informationarxiv: v3 [cs.ds] 22 Mar 2016
A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn
More informationCHAPTER 19: Single-Loop IMC Control
When I coplete this chapter, I want to be able to do the following. Recognize that other feedback algoriths are possible Understand the IMC structure and how it provides the essential control features
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationPattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationDEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS
ISSN 1440-771X AUSTRALIA DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS An Iproved Method for Bandwidth Selection When Estiating ROC Curves Peter G Hall and Rob J Hyndan Working Paper 11/00 An iproved
More informationA Note on the Applied Use of MDL Approximations
A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention
More informationImpact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ
More informationMSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE
Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationExtension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels
Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique
More informationState Estimation Problem for the Action Potential Modeling in Purkinje Fibers
APCOM & ISCM -4 th Deceber, 203, Singapore State Estiation Proble for the Action Potential Modeling in Purinje Fibers *D. C. Estuano¹, H. R. B.Orlande and M. J.Colaço Federal University of Rio de Janeiro
More informationA NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC
Proceedings of IEEE Conference on Local Computer Networks, Tampa, Florida, November 2002 A NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC Houssain Kettani and John A. Gubner
More informationThe proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).
A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with
More informationInspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information
Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub
More informationAnalysis of Hu's Moment Invariants on Image Scaling and Rotation
Edith Cowan University Research Online ECU Publications Pre. 11 1 Analysis of Hu's Moent Invariants on Iage Scaling and Rotation Zhihu Huang Edith Cowan University Jinsong Leng Edith Cowan University 1.119/ICCET.1.548554
More informationHIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES
ICONIC 2007 St. Louis, O, USA June 27-29, 2007 HIGH RESOLUTION NEAR-FIELD ULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR ACHINES A. Randazzo,. A. Abou-Khousa 2,.Pastorino, and R. Zoughi
More informationANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER
IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel
More informationESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics
ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents
More informationStatistical Logic Cell Delay Analysis Using a Current-based Model
Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationDevice-to-Device Collaboration through Distributed Storage
Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern
More informationUsing a De-Convolution Window for Operating Modal Analysis
Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationFiltering and Fusion based Reconstruction of Angle of Attack
Filtering and Fusion based Reconstruction of Angle of Attack N Shantha Kuar Scientist, FMC Division NAL, Bangalore 7 E-ail: nskuar@css.nal.res.in Girija G Scientist, FMC Division NAL, Bangalore 7 E-ail:
More informationLogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting
LogLog-Beta and More: A New Algorith for Cardinality Estiation Based on LogLog Counting Jason Qin, Denys Ki, Yuei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-ail: jasonqin@teaaolco
More informationInternational Journal of Pure and Applied Mathematics Volume 37 No , IMPROVED DATA DRIVEN CONTROL CHARTS
International Journal of Pure and Applied Matheatics Volue 37 No. 3 2007, 423-438 IMPROVED DATA DRIVEN CONTROL CHARTS Wille Albers 1, Wilbert C.M. Kallenberg 2 1,2 Departent of Applied Matheatics Faculty
More informationTesting equality of variances for multiple univariate normal populations
University of Wollongong Research Online Centre for Statistical & Survey Methodology Working Paper Series Faculty of Engineering and Inforation Sciences 0 esting equality of variances for ultiple univariate
More informationDISSIMILARITY MEASURES FOR ICA-BASED SOURCE NUMBER ESTIMATION. Seungchul Lee 2 2. University of Michigan. Ann Arbor, MI, USA.
Proceedings of the ASME International Manufacturing Science and Engineering Conference MSEC June -8,, Notre Dae, Indiana, USA MSEC-7 DISSIMILARIY MEASURES FOR ICA-BASED SOURCE NUMBER ESIMAION Wei Cheng,
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationAn Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot
Vol. 34, No. 1 ACTA AUTOMATICA SINICA January, 2008 An Adaptive UKF Algorith for the State and Paraeter Estiations of a Mobile Robot SONG Qi 1, 2 HAN Jian-Da 1 Abstract For iproving the estiation accuracy
More informationEfficient dynamic events discrimination technique for fiber distributed Brillouin sensors
Efficient dynaic events discriination technique for fiber distributed rillouin sensors Carlos A. Galindez,* Francisco J. Madruga, and Jose M. Lopez-Higuera Photonics Engineering Group, Universidad de Cantabria,Edif.
More informationUse of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization
Use of PSO in Paraeter Estiation of Robot Dynaics; Part One: No Need for Paraeterization Hossein Jahandideh, Mehrzad Navar Abstract Offline procedures for estiating paraeters of robot dynaics are practically
More informationOn the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual
6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual
More informationAN OPTIMAL SHRINKAGE FACTOR IN PREDICTION OF ORDERED RANDOM EFFECTS
Statistica Sinica 6 016, 1709-178 doi:http://dx.doi.org/10.5705/ss.0014.0034 AN OPTIMAL SHRINKAGE FACTOR IN PREDICTION OF ORDERED RANDOM EFFECTS Nilabja Guha 1, Anindya Roy, Yaakov Malinovsky and Gauri
More informationFault Diagnosis of Planetary Gear Based on Fuzzy Entropy of CEEMDAN and MLP Neural Network by Using Vibration Signal
ITM Web of Conferences 11, 82 (217) DOI: 1.151/ itconf/2171182 IST217 Fault Diagnosis of Planetary Gear Based on Fuzzy Entropy of CEEMDAN and MLP Neural Networ by Using Vibration Signal Xi-Hui CHEN, Gang
More informationTesting the lag length of vector autoregressive models: A power comparison between portmanteau and Lagrange multiplier tests
Working Papers 2017-03 Testing the lag length of vector autoregressive odels: A power coparison between portanteau and Lagrange ultiplier tests Raja Ben Hajria National Engineering School, University of
More informationAn Inverse Interpolation Method Utilizing In-Flight Strain Measurements for Determining Loads and Structural Response of Aerospace Vehicles
An Inverse Interpolation Method Utilizing In-Flight Strain Measureents for Deterining Loads and Structural Response of Aerospace Vehicles S. Shkarayev and R. Krashantisa University of Arizona, Tucson,
More informationNonlinear Stabilization of a Spherical Particle Trapped in an Optical Tweezer
Nonlinear Stabilization of a Spherical Particle Trapped in an Optical Tweezer Aruna Ranaweera ranawera@engineering.ucsb.edu Bassa Baieh baieh@engineering.ucsb.edu Andrew R. Teel teel@ece.ucsb.edu Departent
More informationAn Improved Particle Filter with Applications in Ballistic Target Tracking
Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationStochastic Subgradient Methods
Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods
More informationarxiv: v2 [math.co] 3 Dec 2008
arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20
More informationKernel-Based Nonparametric Anomaly Detection
Kernel-Based Nonparaetric Anoaly Detection Shaofeng Zou Dept of EECS Syracuse University Eail: szou@syr.edu Yingbin Liang Dept of EECS Syracuse University Eail: yliang6@syr.edu H. Vincent Poor Dept of
More informationPORTMANTEAU TESTS FOR ARMA MODELS WITH INFINITE VARIANCE
doi:10.1111/j.1467-9892.2007.00572.x PORTMANTEAU TESTS FOR ARMA MODELS WITH INFINITE VARIANCE By J.-W. Lin and A. I. McLeod The University of Western Ontario First Version received Septeber 2006 Abstract.
More informationCorrelated Bayesian Model Fusion: Efficient Performance Modeling of Large-Scale Tunable Analog/RF Integrated Circuits
Correlated Bayesian odel Fusion: Efficient Perforance odeling of Large-Scale unable Analog/RF Integrated Circuits Fa Wang and Xin Li ECE Departent, Carnegie ellon University, Pittsburgh, PA 53 {fwang,
More informationAsynchronous Gossip Algorithms for Stochastic Optimization
Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu
More informationEstimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples
Open Journal of Statistics, 4, 4, 64-649 Published Online Septeber 4 in SciRes http//wwwscirporg/ournal/os http//ddoiorg/436/os4486 Estiation of the Mean of the Eponential Distribution Using Maiu Ranked
More informationInternet-Based Teleoperation of Carts Considering Effects of Time Delay via Continuous Pole Placement
Aerican Journal of Engineering and Applied Sciences Original Research Paper Internet-Based Teleoperation of Carts Considering Effects of Tie Delay via Continuous Pole Placeent Theophilus Okore-Hanson and
More informationbe the original image. Let be the Gaussian white noise with zero mean and variance σ. g ( x, denotes the motion blurred image with noise.
3rd International Conference on Multiedia echnology(icm 3) Estiation Forula for Noise Variance of Motion Blurred Iages He Weiguo Abstract. he ey proble in restoration of otion blurred iages is how to get
More informationEstimating Entropy and Entropy Norm on Data Streams
Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer
More informationSensorless Control of Induction Motor Drive Using SVPWM - MRAS Speed Observer
Journal of Eerging Trends in Engineering and Applied Sciences (JETEAS) 2 (3): 509-513 Journal Scholarlink of Eerging Research Trends Institute in Engineering Journals, 2011 and Applied (ISSN: 2141-7016)
More informationExplicit Approximate Solution for Finding the. Natural Frequency of the Motion of Pendulum. by Using the HAM
Applied Matheatical Sciences Vol. 3 9 no. 1 13-13 Explicit Approxiate Solution for Finding the Natural Frequency of the Motion of Pendulu by Using the HAM Ahad Doosthoseini * Mechanical Engineering Departent
More informationAdaptive Congestion Control in ATM Networks
Aaptive Congestion Control in ATM Networks Farza Habibipour, Mehi Galily, Masou Faris, Ali Yazian Iran Telecounication Research Center, Ministry of ICT, Tehran, IRAN habibipor@itrc.ac.ir Abstract. In this
More informationGeneral Properties of Radiation Detectors Supplements
Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent
More informationSolving initial value problems by residual power series method
Theoretical Matheatics & Applications, vol.3, no.1, 13, 199-1 ISSN: 179-9687 (print), 179-979 (online) Scienpress Ltd, 13 Solving initial value probles by residual power series ethod Mohaed H. Al-Sadi
More informationCh 12: Variations on Backpropagation
Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith
More informationAn Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period
An Approxiate Model for the Theoretical Prediction of the Velocity... 77 Central European Journal of Energetic Materials, 205, 2(), 77-88 ISSN 2353-843 An Approxiate Model for the Theoretical Prediction
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationSupport recovery in compressed sensing: An estimation theoretic approach
Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de
More informationMathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse
Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith
More informationRobustness Experiments for a Planar Hopping Control System
To appear in International Conference on Clibing and Walking Robots Septeber 22 Robustness Experients for a Planar Hopping Control Syste Kale Harbick and Gaurav S. Sukhate kale gaurav@robotics.usc.edu
More informationGenetic Quantum Algorithm and its Application to Combinatorial Optimization Problem
Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr
More informationLONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES
Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,
More informationSUPERIOR-ORDER CURVATURE-CORRECTED PROGRAMMABLE VOLTAGE REFERENCES
SUPEIO-ODE CUATUE-COECTED POGAMMABLE OLTAGE EFEENCES Cosin Popa e-ail: cosin@golanapubro Faculty of Electronics and Telecounications, University Politehnica of Bucharest, B dul Iuliu Maniu 1-3, Bucuresti,
More informationSmoothing Framework for Automatic Track Initiation in Clutter
Soothing Fraework for Autoatic Track Initiation in Clutter Rajib Chakravorty Networked Sensor Technology (NeST) Laboratory Faculty of Engineering University of Technology, Sydney Broadway -27,Sydney, NSW
More informationEnsemble Based on Data Envelopment Analysis
Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationData Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution
Data Streaing Algoriths for Efficient and Accurate Estiation of Flow Size Distribution Abhishek Kuar Minho Sung Jun (Ji) Xu College of Coputing Georgia Institute of Technology {akuar,hsung,jx}@cc.gatech.edu
More informationA method to determine relative stroke detection efficiencies from multiplicity distributions
A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,
More informationMULTISTEP YULE-WALKER ESTIMATION OF AUTOREGRESSIVE MODELS YOU TINGYAN
MULTISTEP YULE-WALKER ESTIMATION OF AUTOREGRESSIVE MODELS YOU TINGYAN NATIONAL UNIVERSITY OF SINGAPORE 2010 MULTISTEP YULE-WALKER ESTIMATION OF AUTOREGRESSIVE MODELS YOU TINGYAN (B.Sc. Nanjing Noral University)
More informationExamining the Effects of Site Selection Criteria for Evaluating the Effectiveness of Traffic Safety Countermeasures
Exaining the Effects of Site Selection Criteria for Evaluating the Effectiveness of Traffic Safety Countereasures Doinique Lord* Associate Professor and Zachry Developent Professor I Zachry Departent of
More informationELEMENTARY MARKOV QUEUEING SYSTEMS WITH UNRELIABLE SERVER
Nuber 4. Volue IV. Deceber 2009 EMENTARY MARKOV QUEUEING SYSTEMS WITH UNRIABLE SERVER Michal Dorda Suary:This paper presents soe exaples of eleentary Marov unreliable queueing systes and their atheatical
More informationNetwork Traffic Characteristic
Network Traffic Characteristic Hojun Lee hlee02@purros.poly.edu 5/24/2002 EL938-Project 1 Outline Motivation What is self-similarity? Behavior of Ethernet traffic Behavior of WAN traffic Behavior of WWW
More informationImproving Ground Based Telescope Focus through Joint Parameter Estimation. Maj J. Chris Zingarelli USAF AFIT/ENG
Iproving Ground Based Telescope Focus through Joint Paraeter Estiation Maj J Chris Zingarelli USAF AFIT/ENG Lt Col Travis Blake DARPA/TTO - Space Systes Dr Stephen Cain USAF AFIT/ENG Abstract-- Space Surveillance
More informationIdentical Maximum Likelihood State Estimation Based on Incremental Finite Mixture Model in PHD Filter
Identical Maxiu Lielihood State Estiation Based on Increental Finite Mixture Model in PHD Filter Gang Wu Eail: xjtuwugang@gail.co Jing Liu Eail: elelj20080730@ail.xjtu.edu.cn Chongzhao Han Eail: czhan@ail.xjtu.edu.cn
More informationImpulsive Control of a Mechanical Oscillator with Friction
9 Aerican Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June -, 9 ThC8. Ipulsive Control of a Mechanical Oscillator with Friction Yury Orlov, Raul Santiesteban, and Luis T. Aguilar Abstract
More informationNonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy
Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo
More informationGene Selection for Colon Cancer Classification using Bayesian Model Averaging of Linear and Quadratic Discriminants
Gene Selection for Colon Cancer Classification using Bayesian Model Averaging of Linear and Quadratic Discriinants Oyebayo Ridwan Olaniran*, Mohd Asrul Affendi Abdullah Departent of Matheatics and Statistics,
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationLeonardo R. Bachega*, Student Member, IEEE, Srikanth Hariharan, Student Member, IEEE Charles A. Bouman, Fellow, IEEE, and Ness Shroff, Fellow, IEEE
Distributed Signal Decorrelation and Detection in Sensor Networks Using the Vector Sparse Matrix Transfor Leonardo R Bachega*, Student Meber, I, Srikanth Hariharan, Student Meber, I Charles A Bouan, Fellow,
More informationAs a model for an ATM switch we consider the overow frequency of a queue that
BUFFER OVERFLOW ASYMPTOTICS FOR A BUFFER HANDLING MANY TRAFFIC SOURCES COSTAS COURCOUBETIS, University of Crete RICHARD WEBER, University of Cabridge Abstract As a odel for an ATM switch we consider the
More informationToward PDN Resource Estimation: A Law of General Power Density
Toward PDN Resource Estiation: A Law of General Power Density Kwangok Jeong ECE Departent, UC San Diego La Jolla, CA 9293, USA kjeong@ucsd.edu Andrew B. Kahng ECE and CSE Departents, UC San Diego La Jolla,
More informationMinimum Entropy-Based Cascade Control for Governing Hydroelectric Turbines
Entropy 04, 6, 336-348; doi:0.3390/e606336 Article OPEN ACCE entropy IN 099-4300 www.dpi.co/journal/entropy Miniu Entropy-Based Cascade Control for Governing Hydroelectric Turbines Mifeng Ren,, Di Wu,
More informationResearch Article Integer-Valued Moving Average Models with Structural Changes
Matheatical Probles in Engineering, Article ID 21592, 5 pages http://dx.doi.org/10.1155/2014/21592 Research Article Integer-Valued Moving Average Models with Structural Changes Kaizhi Yu, 1 Hong Zou, 2
More information