A New Method of Transductive SVM-Based Network Intrusion Detection

Size: px
Start display at page:

Download "A New Method of Transductive SVM-Based Network Intrusion Detection"

Transcription

1 A New Method of Transductive SVM-Based Network Intrusion Detection Manfu Yan and Zhifang Liu 2 Departent of Matheatics, Tangshan Teacher s Coege, Tangshan Hebei, China 3005@tstc.edu.cn 2 Network Technoogy Center, Tangshan Teacher s Coege, Tangshan Hebei, China zf@tstc.edu.cn Abstract. Based on the existing Transductive SVM and via introducing sooth function P( Δ, λ) to construct sooth cored unconstrained optiization probe, this artice wi buid the optiization ode accessibe to degenerate soutions to generate an iproved transductive SVM, introduce siuated anneaing to degenerate the optiization probe, and appy such a Support Vector Cassifier to generate a new ethod of network intrusion detection. Keywords: optiization; unconstrained probe; transductive SVM; network intrusion detection; siuated anneaing. Introduction Network intrusion detection is a safe echanis with dynaic onitoring, prevention or resistance against network intrusion []. The network-intrusion detection syste can be used to discover and identify the behavior and attept of intrusion in the syste via onitoring and anayzing the network fow and syste audit records to give out an aar of intrusion in order to faciitate the adinister to take effective easures to end the oophoes of the syste and fi up the syste [2]. Network intrusion detection is used to separate user behavior s nora data of fro its abnora data, which essentiay can be regarded as the cassification. The data to describe the behaviors of users is of uti-index as usua. Therefore, it can be expressed with an n-diensiona vector. In this way, the network-intrusion detection probe can be suarized as data group for nora or abnora behavior of users, i.e. two kinds of cassification probes of n-diensiona vector, which can hep create the detection ethods and syste via the support vector cassifier. But studies and practices indicate that as to the network-intrusion detection probe, the ethods and syste buit by the use of ordinary SVM (e.g. C-SVM) are not desirabe in the precision of detection. Thus, we try to appy the transductive support vector cassifier to create the detection ethods and introduce the siuated anneaing ethod to degenerate the optiized ode. 2 The Iproveent of Transductive Support Vector Machine Generay, for Support Vector Machine, it is set up by given trainingset T = {( x, y), L,( x, y) } () D. Li, Y. Liu, and Y. Chen (Eds.): CCTA 200, Part I, IFIP AICT 344, pp , 20. IFIP Internationa Federation for Inforation Processing 20

2 88 M. Yan and Z. Liu Here, x n i X = R, yi Y = {, }, i =,2, L,. We noray ca the Inductive Support Vector Machine [3]. Vapnik has discussed a kind of sorting agorith for Transductive Support Vector Machine, it is different fro Inductive Support Vector Machine. It provides a utua independent set, which foows oint distribution, besides the given trainingset T. { } S = x,,, x (2) n Here x X = R. For TSVM, we want to find a optiized function f( x, w 0) fro a particuar function set F = f ( x, w), so that the risk { } ( ) ( ( i, i, )) R w = L y f x w (3) i = is iniized. Here w is a genera paraeter of the function, L( y, f ( x, w )) represents the oss due to estiation of y by f ( x, w ), that is to say, here we interested in the function vaue of f( x, w0 ) on given fixed points x, not a the function vaues within i the fied of definition. 2. Unconstraint Probe Initiay, the optiization of TSVM is [4] in w C ξ w H, b R, y R, ξξ, i C 2 2 ξ i= = s.t. yi( ( w xi) b) ξi, i,,, (4) = (5) (( ) ) y w x b ξ, =,,, (6) ξi 0, i =,,, (7) ξ 0, =,,, (8) We woud ike to sipify initia probe (4)ü(8) in this section, it is reduced to unconstraint probe. Theore. Consider the soution for (4)ü8), it ust satisfy (( ) ) y w x b 0 (9) for a x Prove: Suppose the soution for the probe is ( w, b, ξ, ξ, y,, y ) if for soe x, ( w x ) b 0, then y = Since when y =, y (( ) ) (( w x b 0, ξ y w x) b), as iniized obective function, it ust satisfy ξ = 0 or 0 ξ y( ( w x) b) = <

3 A New Method of Transductive SVM-Based Network Intrusion Detection 89 y =, (( ) ) When y w x b 0, ξ, which is arge than then obective function vaue when y =. Siiary, for soe x, ( w x ) 0 b, then y = Naey, for a x, y( ( w x) b) 0, Based upon the theore above, we can change the constraint (6) and (8) of probe (4) (8) into ξ ( ( w x ) b ), =,2, L =, However, for variabe ξ i, i=, L,, we got ξ ( yi (( w xi ) b) ), i =,2, L, () = (0) Here, function () is singe variabe function, Δ, Δ 0; ( Δ ) = 0, Δ < 0 Base on this, we coud convert probe (4) ü(8) into unconstraint optiization. (2) in w C ( y (( w x ) b)) C ( ( w x ) b) wb, 2 2 i i i= = (3) 2.2 Sooth Unconstraint Probe Since unconstraint probe(3) is not sooth it is not abe to be soved by reguar optiization ethod. As a resut, we think about odifying the second and third part of obective function for probe (3), so that it becoes sooth, in order to construct a sooth unconstraint probe that is siiar to unsooth and unconstraint probe (3). Because of that, we introduce an approxiate function for unsooth function ( Δ) λδ P ( Δ, λ) = Δ n( e ), (4) λ Here, paraeter λ >0, obviousy the function above is sooth; we coud prove it as we. When λ, function P ( Δ, λ) converges at ( Δ) such that the second part of unconstraint optiization (3) is transfored into C P( yi(( w xi) b), λ). (5) i= and the third part is transfored to = C P( ( w x ) b, λ) (6)

4 90 M. Yan and Z. Liu The unsooth ter Δ is sti inside (6), so we decide to use foowing function to approxiate Δ soothy. 2μΔ P ( Δ, μ) = Δ n( e ) (7) μ We coud deduce soe the foowing theore by aking use of the properties of P ( Δ, λ ) : Now, unconstraint probe (3) approxiates optiization probe in w C P( y(( wx ) b), ) C P( P(( wx ) b, μ), λ). wb, 2 2 i i λ i= = (8) When λμis, arge enough, the soution of sooth unconstraint probe (8) wi ost approxiate unsooth unconstraint probe (3). 2.3 Sooth Unconstraint Probe with Kerne If we take account of inear partition of input space, we coud introduce a apping fro input space X to Hibert space H and kerne function X H Φ : (9) x X =Φ ( x) K( x, x ) = ( Φ( x) Φ ( x )), (20) Appy odue w on obective function of probe (4)---(8), we got optiization probe in wbξξ,,, ξi ξ i= = (2) w C C s.t. y (( w x ) b) ξ, i=, L,, (22) i i i y (( w x ) b) ξ, =, L,, (23) ξi 0, ξ 0, i=, L,, =, L,. (24) We know that if ββis, the soution of dua probe for probe(4)ü(8), then the soution of initia probe(2)ü(24) to W coud approxiatey represented as iβi i β αi αi i α α i= = i= = (25) W= y X y X = ( ) Φ ( x) ( ) Φ( x ). We coud ater probe (2)ü(24) to foowing probe, by aking use of above expression

5 A New Method of Transductive SVM-Based Network Intrusion Detection 9 in ( α ) ( ) ααα,,, α, b, ξξ,, i αi α α C ξi C ξ i= = i= = (26) i( ( αk αk) ( k, i) ( αk αk) ( k, i) ) ξi, =,,, k= k= L (27) y K x x K x x b i k k k k k k k k = = L (28) y ( ( α α ) K( x, x ) ( α α ) K( x, x ) b) ξ, i =,,, ξi 0, i =, L,, (29) ξ 0, =, L,, (30) Here we use ( αi αi) ( α α ) to repace w. i= = The ethod is siiar to that of previous section we coud transfor probe (26)ü(30) into sooth unconstraint optiization probe by introducing sooth function P ( Δ, λ) and P ( Δ, μ). in ααα,,, α, b, ξξ,, ( αi αi) ( α α ) i= = ( i( ( αk αk) ( k, i) ( αk αk) ( k, i) ), λ) i= k= k= C P y K x x K x x b (3) k k k i k k k = k= k= C P( P ( ( α α ) K( x, x ) ( α α ) K( x, x ) b), μ), λ) When λμ, is arge enough, above probe is siiar to probe(26) ü(30) consequenty, we coud create decision function after we got the optiu soution ( α, α, α, α, b, ξ, ξ, )of this probe. ( ) = sgn( αk αk) ( k, ) ( αk αk) ( k, ) ), k= k= (32) f x K x x K x x b Additionay, using this decision function to decide the category of the points in test set S. 2.4 Concusion Iproveent of TSVM a) Assue known trainingset T = {( x, y), L,( x, y) }, here n xi X = R, yi = {, }, i=, L, ; known test set S = { x,, L x n }, here xi X = R ; b) Choose suitabe paraeter C and C, choose suitabe kerne function K( x, x ); construct and find the unconstraint probe (3), thus got optiu soution ( ααα,,, α, b ); c) Create decision function:

6 92 M. Yan and Z. Liu ( ) = sgn( αk αk) ( k, ) ( αk αk) ( k, ) ) k= k= f x K x x K x x b Thereby, for any test point beongs to S, the decision function wi provide the category for it. 3 New Method on Network Intrusion Detection As the obective function of probe 3 has a continuous gradient and hesse atrix, as we as unconstrained, it can be soved by basic agorith to unconstrained probe. However its obective function is not convex function thus a nuber of oca optia soutions ay exist, and through the genera unconstrained agorith ay not acquire goba optia soution. In the foowing goba optia agorith siuated anneaing agorith wi be introduced to sove probe (3), and the ode wi be introduced to network intrusion detection. 3. Siuated Anneaing Agorith First, we wi introduce siuated anneaing agorith. Siuated anneaing agorith is a kind of rando search ethod known as Monte Caro ethod, which aows the obective function to have rando changes in the increasing direction. Therefore, siuated anneaing agorith can up out of oca iniu point. This agorith was proposed by Metropois as eary as 953, originated fro siuation to soid anneaing process. The anneaing process starts at a certain high enough teperature, and aost every rando otion are acceptabe under this teperature. Then the teperature decreases sowy according to soe cooing rue and tends to zero. Enough tie is needed for the syste to reach a stabe state at each teperature point, and finay paces in a state with owest energy, to obtain a reative goba optia soution to the optiization probe. In which, one soution x k to the optiization probe and its target vaue f(x k ) correspond to a soid icrostate k and its energy E k respectivey. The teperature T in the anneaing process is a contro paraeter decreasing by the agorith process. The agorith adopts Metropois acceptance criteria. In each step of the agorith, a new candidate soution generates randoy. If the new soution decreases the obective function, it is acceptabe; otherwise whether to accept it wi be decided in for of exponentia probabiity. Probabiity P to accept the new soution is: exp( Δf / T ) Δf > 0, p = (33) Δf 0. In which, Δf is the variation of obective function caused by rando disturbance and T represents teperature. Fro forua (33) we can see that for a given Δf, when T is reativey high, acceptance probabiity to the new soution which increases the function is arger than the probabiity when T is reativey ow. Thus the entire agorith keeps the iterative process of generate new soution udge accept or discard ti find the optia soution finay. The specific agorith is as foows: Agorith A. Siuated anneaing agorith a) Suppose k=0, T= T 0, in which T 0 is the initia teperature. Paraeter L and initia vaue x 0 are given;

7 A New Method of Transductive SVM-Based Network Intrusion Detection 93 b) Generate a new candidate x k by rando disturbance of x k ; c) Cacuate Δf = f(x k ) - f(x k ); d) If Δf 0, accept the new soution x k =x k. If the stop criteria is satisfied, the agorith stops and x= x k ; otherwise give a rando vaue λ in the range of 0 to obeying unifor distribution. If exp(-δf/t)>λ, accept the new soution x k =x k ; e) Suppose k=k, if k L, up to step b); f) Decrease T 0 according to teperature cooing rue. Suppose x 0 =x k and k=0, and up to step b). In the above agorith, paraeters we need to seect incude the initia teperature vaue T 0. Siuated anneaing agorith requires a arge enough T 0 to ensure uping out of the oca optia soutions, that is to ensure exp(-δf/t 0 ). Seection of a too arge T 0 wi cause a too ong agorith period, whie a too sa T 0 wi cause the agorith traps in the oca optia soution too eary. The other paraeters need to be seected are iteration ties L under each teperature, initia soution x 0. Besides the decreasing rue of teperature T aso needs to be known, generay taken as T k =βt k,0<β<; and the fina vaue of teperature, actuay the fina teperature vaue often chose as cose to Network Intrusion Detection As the widespread use of network, og data is very arge. Soe network attacks such as DNS spoofing, denia of service, port scanning, etc. are generay very difficut to be directy discovered. Using data ining technoogy, nora and abnora action ode can be acquired fro assive ogs, and then detect intrusion action [5]. Data ining technoogy coony used in intrusion detection syste incudes neura network, genetic agorith [6] and so on. There are aso researchers using support vector achine to conduct soe tests on actua intrusion detection [7]. In essence, intrusion detection is actuay a cassification probe, that is to separate the nora action data and abnora action data of users through detection. In which the data describing user action is often uti-index. The feasibiity of using support vector achine to conduct intrusion detection has been verified in [7]. As we focuses ony on behavior of the current user, thus hereby we attept to use iproved deduction support vector achine to discuss the new ethod of network intrusion detection. Data adopted in the test is a batch of network connection record set [8]. This batch of origina data is a recovered connection inforation based on the data obtained in IDS evauation by U.S. Defense Advanced Research Proects Agency (DARPA) in 998 [9], incuding 7 weeks network traffic with about 5 iion connection records, in which there were a arge nuber of nora network traffic and various attacks, thus has a strong representative. As the aount of data is significanty arge, here we ony seect attacks of DOS type to conduct our experients, and deterine the diension nuber of the probe is 8 according to detection attribute set needed by DOS type attack provided by [9]. 200 nora connection inforation data are extracted fro the origina data set as the positive-type set, and 200 DOS type attack connection

8 94 M. Yan and Z. Liu inforation data are extracted as the negative-type set, then the positive-type point set and negative-type point set are randoy separated into training set and test set according to soe ratio (6:4). C-support vector achine [0] and iproved deduction support vector achine are used respectivey to sove the cassification probe of the above coposition. When soving optiization probe in the iproved deduction support vector achine, siuated anneaing agorith introduced in ast section is used. Both odes adopt RBF kerne function. During the test, the paraeter C, C, as we as σ in RBF kerne function adopt utipe vaues respectivey. Given different cobinations of these paraeters, test the perforance of the two agoriths under different cobinations. Tabe 6. is a test resut under one group of the cobinations as C=C=00 and σ=2, in which detection accuracy is the ratio of correcty detected sapes in the test set to the tota nuber of sapes in the test set; fase positive rate is the ratio of nora sapes that are istaken detected to abnora sapes to tota nuber of nora sapes; detection rate is the ratio of detected abnora sapes to tota nuber of abnora sapes. Tabe. Resut coparison Detection Resut C SVC Agorith2.4 Detection Accuracy 79.9% 8.2% Fase Positive Rate 0.54% 0.47% Detection Rate 77.5% 80.% Data in the tabe indicate that, usage of iproved deduction support vector achine can obtain higher detection accuracy. Certainy, the test resut depends on rationa seection of paraeters. In practica appications, cross vaidation or LOO error ethod (can refer to [3]) can be adopted to deterine optia paraeters. 4 Concusion and Perspective With reference to the resuts of the said discussion, the detection precision of iproved transductive SVM instead of C-SVM is higher, indicating that ony by studying and creating SVM intentionay according to the particuarity of probes when using SVM to sove practica probes can it achieve ore desirabe effects of appication. As for soving the network intrusion probe, the resuts of detection can depend on the proper seection of paraeters besides the seection and study of the varieties of SVM. And in fact, it is avaiabe to adopt the cross vaidation or LOO err (see [3]) to deterine the optiized paraeter, which is aso one of the directions to study on transductive SVM in the future. Besides SVM, neura net and genetic agorith can be appied to conduct the network intrusion detection via the data extraction technoogy. And it is required to ake a study of these technoogies appied to the detection on network intrusion and ake coparisons between the, and even copare the with the detection ethods of other technoogies to further arguent the advantages of these new ethods, a of which are the probes requiring further studies on theory and practice.

9 A New Method of Transductive SVM-Based Network Intrusion Detection 95 References [] Jiang, J., et a.: Study and Review on Network Intrusion Detection. Journa of Software (200) [2] Nei, Y., et a.: Network Inforation Safety Technoogy. Science Press, Beiing (200) [3] Deng, N., Tian, Y.: Support Vector Machine - A New Method in Data Mining, pp , pp Science Press, Beiing (2004) (in Chinese) [4] Yan, M.: Support Vector Machines for Cassification and Its Appication. China Agricutura University, Beiing (2005) (Doctor s Degree Paper) [5] Lee, W., Stofo, S.: Data ining approaches for intrusion detection [EB/OL] ( / ), [6] Baainath, B., Raghavan, S.V.: Intrusion detection through earning behavior ode. Coputer Counication 24(2), (200) [7] Li, H., et a.: SVM-based Network Intrusion Detection. Journa of Coputer Research and Deveopent 40(6), 6 (2003) [8] [9] Lee, W., Stofo, S., Mok, K.W.: A dataining fraework for buiding intrusion detection edes. In: The 999 IEEE Syposiu on Security and Privary, Oakand, CA (999) [0] Deng, N., Tian, Y.: Support Vector Machine Theory, Agorith and Expansion, pp Science Press, Beiing (2009)

A REGULARIZED GMRES METHOD FOR INVERSE BLACKBODY RADIATION PROBLEM

A REGULARIZED GMRES METHOD FOR INVERSE BLACKBODY RADIATION PROBLEM Wu, J., Ma. Z.: A Reguarized GMRES Method for Inverse Backbody Radiation Probe THERMAL SCIENCE: Year 3, Vo. 7, No. 3, pp. 847-85 847 A REGULARIZED GMRES METHOD FOR INVERSE BLACKBODY RADIATION PROBLEM by

More information

Research on the Nonlinear Governor of Diesel Engine with Variable Structure Control Theory

Research on the Nonlinear Governor of Diesel Engine with Variable Structure Control Theory Research on the Noninear Governor of Diese Engine with Variabe Structure Contro Theory Xiao-Bing Mao schoo of energy and power engineering wuhan university of technoogy Wuhan, China aoxiaobing@.co Kai-Sheng

More information

Approximate dynamic programming using model-free Bellman Residual Elimination

Approximate dynamic programming using model-free Bellman Residual Elimination Approxiate dynaic prograing using ode-free Bean Residua Eiination The MIT Facuty has ade this artice openy avaiabe. Pease share how this access benefits you. Your story atters. Citation As Pubished Pubisher

More information

TRACKING CONTROL FOR WHEELED MOBILE ROBOTS USING NEURAL NETWORK MODEL ALGORITHM CONTROL

TRACKING CONTROL FOR WHEELED MOBILE ROBOTS USING NEURAL NETWORK MODEL ALGORITHM CONTROL Journa of Theoretica and Appied Inforation Technoogy 3 st Deceber. Vo. 46 No. 5 - JATIT & LLS. A rights reserved. ISSN: 99-8645 www.jatit.org E-ISSN: 87-395 TRACKING CONTROL FOR WHEELED OBILE ROBOTS USING

More information

SPEECH RECOGNITION USING LPC AND HMM APPLIED FOR CONTROLLING MOVEMENT OF MOBILE ROBOT

SPEECH RECOGNITION USING LPC AND HMM APPLIED FOR CONTROLLING MOVEMENT OF MOBILE ROBOT Seinar asiona Teknoogi Inforasi 200 SPEECH RECOGITIO USIG LPC AD HMM APPLIED FOR COTROLLIG MOVEMET OF MOBILE ROBOT Thiang ) Wanto ) ) Eectrica Engineering Departent Petra Christian university Siwaankerto

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

SVM: Terminology 1(6) SVM: Terminology 2(6)

SVM: Terminology 1(6) SVM: Terminology 2(6) Andrew Kusiak Inteigent Systems Laboratory 39 Seamans Center he University of Iowa Iowa City, IA 54-57 SVM he maxima margin cassifier is simiar to the perceptron: It aso assumes that the data points are

More information

AN INVESTIGATION ON SEISMIC ANALYSIS OF SHALLOW TUNEELS IN SOIL MEDIUM

AN INVESTIGATION ON SEISMIC ANALYSIS OF SHALLOW TUNEELS IN SOIL MEDIUM The 4 th October -7, 8, Beijing, China AN INVESTIGATION ON SEISMIC ANALYSIS OF SHALLOW TUNEELS IN SOIL MEDIUM J. Boouri Bazaz and V. Besharat Assistant Professor, Dept. of Civi Engineering, Ferdowsi University,

More information

PID Control of VAV System based on Elman Neural Network

PID Control of VAV System based on Elman Neural Network Jie-ia Li, Yang Chen, Rui Qu ID Contro of VAV Syste based on Ean Neura Network Jie-ia Li, 2 Yang Chen, 3 Rui Qu Schoo of Inforation and Contro Engineering, Shenyang Jianzhu University, Shenyang, Liaoning,China,

More information

Location-Pricing Problem in the Closed-loop Supply Chain Network Design under Uncertainty

Location-Pricing Problem in the Closed-loop Supply Chain Network Design under Uncertainty Location-Pricing Probe in the Cosed-oop Suppy Chain Netork Design under Uncertainty F. Joai, A. Zabihian, R. Tavakkoi-Moghadda, P. Meari Abstract This paper presents a bi-obective credibiity-based fuzzy

More information

Performance Evaluation of Space-Time Block Coding Using a Realistic Mobile Radio Channel Model *

Performance Evaluation of Space-Time Block Coding Using a Realistic Mobile Radio Channel Model * Perforance Evauation of Space-Tie Bock Coding Using a Reaistic obie Radio Channe ode H. Carrasco Espinosa, J.. egado Penín Javier R. Fonoosa epartent of Signa Theory Counications Universitat Poitècnica

More information

Part B: Many-Particle Angular Momentum Operators.

Part B: Many-Particle Angular Momentum Operators. Part B: Man-Partice Anguar Moentu Operators. The coutation reations deterine the properties of the anguar oentu and spin operators. The are copete anaogous: L, L = i L, etc. L = L ± il ± L = L L L L =

More information

Lagrangean relaxation for minimizing the weighted number of late jobs on parallel machines p.1/18. PMS 2002 Valencia, Spain

Lagrangean relaxation for minimizing the weighted number of late jobs on parallel machines p.1/18. PMS 2002 Valencia, Spain Lagrangean reaxation for iniizing the weighted nuber of ate obs on parae achines PMS 00 Vaencia Spain Stéphane DauzèrePérès and Marc Sevaux dauze@en.fr sevaux@univvaenciennes.fr Ecoe des Mines de Nantes

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

AN ANALYTICAL ESTIMATION OF THE CORIOLIS METER'S CHARACTERISTICS BASED ON MODAL SUPERPOSITION. J. Kutin *, I. Bajsić

AN ANALYTICAL ESTIMATION OF THE CORIOLIS METER'S CHARACTERISTICS BASED ON MODAL SUPERPOSITION. J. Kutin *, I. Bajsić Fow Measureent and Instruentation 1 (00) 345 351 doi:10.1016/s0955-5986(0)00006-7 00 Esevier Science Ltd. AN ANALYTICAL ESTIMATION OF THE CORIOLIS METER'S CHARACTERISTICS BASED ON MODAL SUPERPOSITION J.

More information

Involutions and representations of the finite orthogonal groups

Involutions and representations of the finite orthogonal groups Invoutions and representations of the finite orthogona groups Student: Juio Brau Advisors: Dr. Ryan Vinroot Dr. Kaus Lux Spring 2007 Introduction A inear representation of a group is a way of giving the

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

Multi-events Earthquake Early Warning algorithm

Multi-events Earthquake Early Warning algorithm subitted to Geophys. J. Int. Muti-events Earthquake Eary Warning agorith using a Bayesian approach S. Wu 1, M. Yaada 2, K. Taaribuchi 3 and J.L. Beck 1 1 Caifornia Institute of Technoogy, Pasadena, Caifornia,

More information

Transforms, Convolutions, and Windows on the Discrete Domain

Transforms, Convolutions, and Windows on the Discrete Domain Chapter 3 Transfors, Convoutions, and Windows on the Discrete Doain 3. Introduction The previous two chapters introduced Fourier transfors of functions of the periodic and nonperiodic types on the continuous

More information

A Simple Framework of Conservative Algorithms for the Coupled Nonlinear Schrödinger Equations with Multiply Components

A Simple Framework of Conservative Algorithms for the Coupled Nonlinear Schrödinger Equations with Multiply Components Coun. Theor. Phys. 61 (2014) 703 709 Vo. 61, o. 6, June 1, 2014 A Sipe Fraework of Conservative Agoriths for the Couped oninear Schrödinger Equations with Mutipy Coponents QIA u ( ), 1,2, SOG Song-He (

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Chapter 7. Dimensional Analysis, Similitude, and Modeling

Chapter 7. Dimensional Analysis, Similitude, and Modeling Chapter 7 Diensiona Anaysis, Siiitude, and Modeing Introduction HISTORICAL CONTEXT John Seaton (174-179) first used scae odes for systeatic experientation. Wiia Froude (1810-1871) first proposed aws for

More information

HOW OFTEN SHOULD YOU CLEAN YOUR ROOM? INTRODUCTION

HOW OFTEN SHOULD YOU CLEAN YOUR ROOM? INTRODUCTION HOW OFTEN SHOULD YOU CLEAN YOUR ROOM? KIMBALL MARTIN AND KRISHNAN SHANKAR ABSTRACT. We introduce and study a cobinatoria optiization probe otivated by the question in the tite. In the sipe case where you

More information

An Approach to Worst-Case Circuit Analysis

An Approach to Worst-Case Circuit Analysis Eena Nicuescu, Dorina-Mioara Purcaru and Mariuscristian Nicuescu An Approach to Worst-Case Circuit Anaysis ELENA NICULESCU*, DORINA-MIOARA PURCARU* and MARIUS- CRISTIAN NICULESCU** Eectronics and Instruentation

More information

Modified Gaussian Sum Filtering Methods for INS/GPS Integration

Modified Gaussian Sum Filtering Methods for INS/GPS Integration Journa of Goba Positioning Systes (27) Vo.6, No.: 65-73 Modified Gaussian Su Fitering Methods for INS/GPS Integration Yukihiro Kubo, akuya Sato and Sueo Sugioto Departent of Eectrica and Eectronic Engineering,

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Dual-beard sampling method for fibre length measurements

Dual-beard sampling method for fibre length measurements Indian Journa of Fibre & Textie Research Vo. 39, March 14, pp. 7-78 Dua-beard saping ethod for fibre ength easureents H Y Wu & F M Wang a Coege of Texties, Donghua University, Shanghai, China Received

More information

Design and System Modeling of a Tri-Axial Microaccelerometer Using Piezoelectric Thin Films

Design and System Modeling of a Tri-Axial Microaccelerometer Using Piezoelectric Thin Films Ferroeectrics, 85:, 69 74, 009 Reprints avaiae directy fro the puisher DOI:.80/00509090888764 URL: http://dx.doi.org/.80/00509090888764 69 Jyh-Cheng Yu et a. 009 Tayor & Francis ISSN: 005-09 print / 56-5

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

APPENDIX B. Some special functions in low-frequency seismology. 2l +1 x j l (B.2) j l = j l 1 l +1 x j l (B.3) j l = l x j l j l+1

APPENDIX B. Some special functions in low-frequency seismology. 2l +1 x j l (B.2) j l = j l 1 l +1 x j l (B.3) j l = l x j l j l+1 APPENDIX B Soe specia functions in ow-frequency seisoogy 1. Spherica Besse functions The functions j and y are usefu in constructing ode soutions in hoogeneous spheres (fig B1). They satisfy d 2 j dr 2

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

On Unbounded Delays in Asynchronous Parallel Fixed-Point Algorithms

On Unbounded Delays in Asynchronous Parallel Fixed-Point Algorithms On Unbounded Deays in Asynchronous Parae Fixed-Point Agoriths Robert Hannah and Wotao Yin Departent of Matheatics, University of Caifornia, Los Angees, CA 90095, USA Septeber 3, 206 Abstract The need for

More information

Appendix A: MATLAB commands for neural networks

Appendix A: MATLAB commands for neural networks Appendix A: MATLAB commands for neura networks 132 Appendix A: MATLAB commands for neura networks p=importdata('pn.xs'); t=importdata('tn.xs'); [pn,meanp,stdp,tn,meant,stdt]=prestd(p,t); for m=1:10 net=newff(minmax(pn),[m,1],{'tansig','purein'},'trainm');

More information

FORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS

FORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS FORECASTING TEECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODES Niesh Subhash naawade a, Mrs. Meenakshi Pawar b a SVERI's Coege of Engineering, Pandharpur. nieshsubhash15@gmai.com

More information

Phase Diagrams. Chapter 8. Conditions for the Coexistence of Multiple Phases. d S dt V

Phase Diagrams. Chapter 8. Conditions for the Coexistence of Multiple Phases. d S dt V hase Diaras Chapter 8 hase - a for of atter that is unifor with respect to cheica coposition and the physica state of areation (soid, iquid, or aseous phases) icroscopicay and acroscopicay. Conditions

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

MULTI-PERIOD MODEL FOR PART FAMILY/MACHINE CELL FORMATION. Objectives included in the multi-period formulation

MULTI-PERIOD MODEL FOR PART FAMILY/MACHINE CELL FORMATION. Objectives included in the multi-period formulation ationa Institute of Technoogy aicut Department of echanica Engineering ULTI-PERIOD ODEL FOR PART FAILY/AHIE ELL FORATIO Given a set of parts, processing requirements, and avaiabe resources The objective

More information

Computional solutions of a family of generalized Procrustes problems. P. Benner, J. Fankhänel

Computional solutions of a family of generalized Procrustes problems. P. Benner, J. Fankhänel Coputiona soutions of a faiy of generaized Procrustes probes P. Benner, J. Fankhäne Preprint 014-6 Preprintreihe der Fakutät für Matheatik ISSN 1614-8835 Contents 1 Introduction 5 The (`p; `q) Procrustes

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Distances in random graphs with finite mean and infinite variance degrees

Distances in random graphs with finite mean and infinite variance degrees Distances in rando graphs with finite ean and infinite variance degrees Citation for pubished version APA: Hofstad, van der, R. W., Hooghiestra, G., & Znaensi, D. 2007. Distances in rando graphs with finite

More information

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,

More information

Soft-margin SVM can address linearly separable problems with outliers

Soft-margin SVM can address linearly separable problems with outliers Non-linear Support Vector Machines Non-linearly separable probles Hard-argin SVM can address linearly separable probles Soft-argin SVM can address linearly separable probles with outliers Non-linearly

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Stochastic Subgradient Methods

Stochastic Subgradient Methods Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods

More information

Factorizations of Invertible Symmetric Matrices over Polynomial Rings with Involution

Factorizations of Invertible Symmetric Matrices over Polynomial Rings with Involution Goba Journa of Pure and Appied Matheatics ISSN 0973-1768 Voue 13 Nuber 10 (017) pp 7073-7080 Research India Pubications http://wwwripubicationco Factorizations of Invertibe Syetric Matrices over Poynoia

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Energy Efficient WiFi-based Fingerprinting for Indoor Positioning with Smartphones

Energy Efficient WiFi-based Fingerprinting for Indoor Positioning with Smartphones Energy Efficient WiFi-based Fingerprinting for Indoor Positioning with Sartphones Igor Bisio Fabio avagetto ario archese Andrea Sciarrone Dept of eecounication Eectronic Eectric Engineering and Nava Architectures

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

SVM-based Supervised and Unsupervised Classification Schemes

SVM-based Supervised and Unsupervised Classification Schemes SVM-based Supervised and Unsupervised Cassification Schemes LUMINITA STATE University of Pitesti Facuty of Mathematics and Computer Science 1 Targu din Vae St., Pitesti 110040 ROMANIA state@cicknet.ro

More information

Strauss PDEs 2e: Section Exercise 2 Page 1 of 12. For problem (1), complete the calculation of the series in case j(t) = 0 and h(t) = e t.

Strauss PDEs 2e: Section Exercise 2 Page 1 of 12. For problem (1), complete the calculation of the series in case j(t) = 0 and h(t) = e t. Strauss PDEs e: Section 5.6 - Exercise Page 1 of 1 Exercise For probem (1, compete the cacuation of the series in case j(t = and h(t = e t. Soution With j(t = and h(t = e t, probem (1 on page 147 becomes

More information

Fitting Algorithms for MMPP ATM Traffic Models

Fitting Algorithms for MMPP ATM Traffic Models Fitting Agorithms for PP AT Traffic odes A. Nogueira, P. Savador, R. Vaadas University of Aveiro / Institute of Teecommunications, 38-93 Aveiro, Portuga; e-mai: (nogueira, savador, rv)@av.it.pt ABSTRACT

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Identites and properties for associated Legendre functions

Identites and properties for associated Legendre functions Identites and properties for associated Legendre functions DBW This note is a persona note with a persona history; it arose out off y incapacity to find references on the internet that prove reations that

More information

FUNDAMENTALS OF FLUID MECHANICS Chapter 7 Dimensional Analysis Modeling, and Similitude

FUNDAMENTALS OF FLUID MECHANICS Chapter 7 Dimensional Analysis Modeling, and Similitude FUNAMENTALS OF FLUI MECHANICS Chapter 7 iensiona Anaysis Modeing, and Siiitude Jyh-Cherng Shieh epartent of Bio-Industria Mechatronics Engineering Nationa Taiwan University 1/4/007 1 MAIN TOPICS iensiona

More information

Hubbard model with intersite kinetic correlations

Hubbard model with intersite kinetic correlations PHYSICAL REVIEW B 79, 06444 2009 Hubbard ode with intersite kinetic correations Grzegorz Górski and Jerzy Mizia Institute of Physics, Rzeszów University, u. Rejtana 6A, 35-959 Rzeszów, Poand Received 29

More information

MC-CDMA Systems: a General Framework for Performance Evaluation with Linear Equalization

MC-CDMA Systems: a General Framework for Performance Evaluation with Linear Equalization C-CDA Systes: a Genera Fraework for Perforance Evauation with Linear Equaization Barbara. asini 1, Favio Zabini 1 and Andrea Conti 1, 6 1 IEIIT/CNR, WiLab and University of Boogna ENDIF, University of

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Robust and Fast Ellipsoid Fitting from Noisy Image: Computer solution for fitting Tumours on MRI Scanner

Robust and Fast Ellipsoid Fitting from Noisy Image: Computer solution for fitting Tumours on MRI Scanner Internationa Journa of Video&Iage Processing and Network Security IJVIPNS-IJENS Vo:3 No: 7 Robust and Fast Eipsoid Fitting fro Noisy Iage: Coputer soution for fitting Tuours on MRI Scanner A Cherkaoui,

More information

Statistical Learning Theory: a Primer

Statistical Learning Theory: a Primer ??,??, 1 6 (??) c?? Kuwer Academic Pubishers, Boston. Manufactured in The Netherands. Statistica Learning Theory: a Primer THEODOROS EVGENIOU AND MASSIMILIANO PONTIL Center for Bioogica and Computationa

More information

Effects of Dissipation Energy on Vibrational and Sound Energy Flow

Effects of Dissipation Energy on Vibrational and Sound Energy Flow TECNSCE MECANK, Band [6, cf12(996) 107416 Manuskripreingang: ()2 Januar 1996 Effects of Dissipation Energy on Vibrationa and Sound Energy Fow N Nakagawa, Y Sekiguchi, A igashi, O Mahrenhotz Sound radiating

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Nonlinear Control Structure of Grid Connected Modular Multilevel Converters

Nonlinear Control Structure of Grid Connected Modular Multilevel Converters Downoaded fro vbn.aau.dk on: anuar 15, 019 Aaborg Universitet Noninear Contro Structure of Grid Connected Moduar Mutieve Converters Haizadeh, Ain; Noru, Lars; Ahadpour Sha, Aireza Pubished in: Renewabe

More information

Multilayer Kerceptron

Multilayer Kerceptron Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,

More information

14 - OSCILLATIONS Page 1

14 - OSCILLATIONS Page 1 14 - OSCILLATIONS Page 1 14.1 Perioic an Osciator otion Motion of a sste at reguar interva of tie on a efinite path about a efinite point is known as a perioic otion, e.g., unifor circuar otion of a partice.

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Translation to Bundle Operators

Translation to Bundle Operators Syetry, Integrabiity and Geoetry: Methods and Appications Transation to Bunde Operators SIGMA 3 7, 1, 14 pages Thoas P. BRANSON and Doojin HONG Deceased URL: http://www.ath.uiowa.edu/ branson/ Departent

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Likelihood-Based Inference for Discretely Observed Birth Death-Shift Processes, with Applications to Evolution of Mobile Genetic Elements

Likelihood-Based Inference for Discretely Observed Birth Death-Shift Processes, with Applications to Evolution of Mobile Genetic Elements Bioetrics 71, 1009 1021 Deceber 2015 DOI: 10.1111/bio.12352 Likeihood-Based Inference for Discretey Observed Birth Death-Shift Processes, with Appications to Evoution of Mobie Genetic Eeents Jason Xu,

More information

University of Alabama Department of Physics and Astronomy. PH 105 LeClair Summer Problem Set 11

University of Alabama Department of Physics and Astronomy. PH 105 LeClair Summer Problem Set 11 University of Aabaa Departent of Physics and Astronoy PH 05 LeCair Suer 0 Instructions: Probe Set. Answer a questions beow. A questions have equa weight.. Due Fri June 0 at the start of ecture, or eectronicay

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

From Margins to Probabilities in Multiclass Learning Problems

From Margins to Probabilities in Multiclass Learning Problems From Margins to Probabiities in Muticass Learning Probems Andrea Passerini and Massimiiano Ponti 2 and Paoo Frasconi 3 Abstract. We study the probem of muticass cassification within the framework of error

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

a l b l m m w2 b l b G[ u/ R] C

a l b l m m w2 b l b G[ u/ R] C Degree Probes for ence Graph Graars K. Skodinis y E. Wanke z Abstract The copexity of the bounded degree probe is anayzed for graph anguages generated by ence graph graars. In particuar, the bounded degree

More information

Two view learning: SVM-2K, Theory and Practice

Two view learning: SVM-2K, Theory and Practice Two view earning: SVM-2K, Theory and Practice Jason D.R. Farquhar jdrf99r@ecs.soton.ac.uk Hongying Meng hongying@cs.york.ac.uk David R. Hardoon drh@ecs.soton.ac.uk John Shawe-Tayor jst@ecs.soton.ac.uk

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Effect of transport ratio on source term in determination of surface emission coefficient

Effect of transport ratio on source term in determination of surface emission coefficient Internationa Journa of heoretica & Appied Sciences, (): 74-78(9) ISSN : 975-78 Effect of transport ratio on source term in determination of surface emission coefficient Sanjeev Kumar and Apna Mishra epartment

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

11 - KINETIC THEORY OF GASES Page 1. The constituent particles of the matter like atoms, molecules or ions are in continuous motion.

11 - KINETIC THEORY OF GASES Page 1. The constituent particles of the matter like atoms, molecules or ions are in continuous motion. - KIETIC THEORY OF GASES Page Introduction The constituent partices of the atter ike atos, oecues or ions are in continuous otion. In soids, the partices are very cose and osciate about their ean positions.

More information

Week 10 Spring Lecture 19. Estimation of Large Covariance Matrices: Upper bound Observe. is contained in the following parameter space,

Week 10 Spring Lecture 19. Estimation of Large Covariance Matrices: Upper bound Observe. is contained in the following parameter space, Week 0 Sprig 009 Lecture 9. stiatio of Large Covariace Matrices: Upper boud Observe ; ; : : : ; i.i.d. fro a p-variate Gaussia distributio, N (; pp ). We assue that the covariace atrix pp = ( ij ) i;jp

More information

Research Article Solution of Point Reactor Neutron Kinetics Equations with Temperature Feedback by Singularly Perturbed Method

Research Article Solution of Point Reactor Neutron Kinetics Equations with Temperature Feedback by Singularly Perturbed Method Science and Technoogy of Nucear Instaations Voume 213, Artice ID 261327, 6 pages http://dx.doi.org/1.1155/213/261327 Research Artice Soution of Point Reactor Neutron Kinetics Equations with Temperature

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Support Vector Machine and Its Application to Regression and Classification

Support Vector Machine and Its Application to Regression and Classification BearWorks Institutiona Repository MSU Graduate Theses Spring 2017 Support Vector Machine and Its Appication to Regression and Cassification Xiaotong Hu As with any inteectua project, the content and views

More information

UI FORMULATION FOR CABLE STATE OF EXISTING CABLE-STAYED BRIDGE

UI FORMULATION FOR CABLE STATE OF EXISTING CABLE-STAYED BRIDGE UI FORMULATION FOR CABLE STATE OF EXISTING CABLE-STAYED BRIDGE Juan Huang, Ronghui Wang and Tao Tang Coege of Traffic and Communications, South China University of Technoogy, Guangzhou, Guangdong 51641,

More information

PAPER On Optimal Magnitude of Fluctuations in Probe Packet Arrival Intervals

PAPER On Optimal Magnitude of Fluctuations in Probe Packet Arrival Intervals 3028 PAPER On Optia Magnitude of Fuctuations in Probe Packet Arriva Intervas Kohei WATABE a, Student Meber and Masaki AIDA b, Meber SUMMARY Active easureent is an end-to-end easureent technique that can

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

Shape Determination of Steel Truss Structures Subjected to Thermal Loading Kok Keong CHOONHG, Jae-Yeol KIM

Shape Determination of Steel Truss Structures Subjected to Thermal Loading Kok Keong CHOONHG, Jae-Yeol KIM ISSN: 9-97 ISO 900:008 Certified Voue, Issue, March 04 Shape Deterination of Stee Truss Structures Subjected to Thera Loading Kok Keong CHOONHG, Jae-Yeo KIM Abstract Truss structures experience thera oading

More information

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1 Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

II. PROBLEM. A. Description. For the space of audio signals

II. PROBLEM. A. Description. For the space of audio signals CS229 - Fina Report Speech Recording based Language Recognition (Natura Language) Leopod Cambier - cambier; Matan Leibovich - matane; Cindy Orozco Bohorquez - orozcocc ABSTRACT We construct a rea time

More information