Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code

Size: px
Start display at page:

Download "Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code"

Transcription

1 Usng Fuzzy Paern Recognon o Deec Unknown Malcous Execuables Code Boyun Zhang,, Janpng Yn, and Jngbo Hao School of Compuer Scence, Naonal Unversy of Defense Technology, Changsha 40073, Chna hnxzby@yahoo.com.cn Deparmen of Compuer Scence, Hunan Publc Secury College, Changsha 4038, Chna Absrac. An nellgen deec sysem o recognon unknown compuer vrus s proposed. Usng he mehod based on fuzzy paern recognon algorhm, a malcous execuable code deecon nework model s desgned also. Ths model arge a Wn3 bnary vruses on Inel IA3 archecures. I could deec known and unknown malcous code by analyzng her behavor. We gahered 43 bengn and 09 malcous execuable programs ha are n he Wndows Porable Execuable (PE) forma as daase for expermen. Afer exracng he mos relevan API calls as feaure, he fuzzy paern recognon algorhm o deec compuer vrus was evaluaed. Inroducon Malcous code s any code added, changed, or removed from a sofware sysem o nenonally cause harm or subver he sysem s nended funcon []. Such sofware has been used o compromse compuer sysems, o desroy her nformaon, and o render hem useless.excellen echnology exss for deecng known malcous execuables. Sofware for vrus deecon has been que successful, and programs such as McAfee rus Scan and Noron Anrus are ubquous. These programs search execuable code for known paerns. One shorcomng of hs mehod s ha we mus oban a copy of a malcous program before exracng he paern necessary for s deecon. Our effors o address hs problem have resuled n a felded applcaon, bul usng echnques from fuzzy paern recognon and machne learnng. The Malcous Execuable Classfcaon Sysem currenly deecs unknown malcous execuables code whou removng any obfuscaon. As far as know, our expermens s he frs me o esablshed mehods based on fuzzy paern recognon applyng o deec malcous execuables. In he followng secons, we descrbe relaed research n he area of malcous code deecon. Then we llusrae he archecure of our deec model n secon 3. Secon 4 deals he mehod of exracon feaure from program, and sang he deec engne work procedure. Secon 5 deals he mplemenaon and expermen resuls. We sae our plans for fuure work n Secon 6. L. Wang and Y. Jn (Eds.): FSKD 005, LNAI 363, pp , 005. Sprnger-erlag Berln Hedelberg 005

2 Bay New or ks 630 B. Zhang, J. Yn, and J. Hao Relaed Work There have been few aemps o use machne learnng and daa mnng for he purpose of denfyng new or unknown malcous code. In an early aemp, Lo e al. [] conduced an analyss of several programs evdenly by hand and denfed ell-ale sgns, whch hey subsequenly used o fler new programs. Researchers a IBM's T.J.Wason Research Cener have nvesgaed neural neworks for vrus deecon and have ncorporaed a smlar approach for deecng boo-secor vruses no IBM's An-rus sofware [3]. More recenly, nsead of focusng on boo-secor vruses, Schulz e al. [4] used daa mnng mehods, such as naïve Bayes, o deec malcous code. There are oher mehods of guardng agans malcous code, such as obec reconclaon, whch nvolves comparng curren fles and drecores o pas copes. One can also compare crypographc hashes. One can also aud runnng programs and sacally analyze execuables usng pre-defned malcous paerns. These approaches are no based on daa mnng. 3 Model Srucure We frs descrbe a general framework for deecng malcous execuable code. Fgure llusraes he proposed archecure. The framework s dvded no 3 par: Applcaon Server, Deec Server, and rus Deec Frewall based on characer code scannng. Before a fle save o he applcaon server, wll be scanned by he vrus deec frewall. If he fle s nfeced wh vrus hen quaranne. Oherwse f here s no malcous nformaon abou he fle, wll be replcaed copes. Then, one copy wll be sen o he applcaon server, anoher one wll be sen o he deec server based on Fuzzy Paern Recognon (FPR) deec engne. A he followng sage, he fle s feaures s exraced n he deec server. The deec server drves deec engne based on FPR check he copy agan. Accordng o he resul from deec server, f he fle s nfeced wh unknown malcous code, he applcaon server wll be remnd o remove he copy from s applcaon daabase. And hen quaranne n a specal daabase or sen o an exper o analyze by hand. Fg.. Archecure

3 Usng Fuzzy Paern Recognon o Deec Unknown Malcous Execuables Code 63 4 Malcous Code Deec Engne 4. Feaure Exracon Our frs nuon no he problem was o exrac nformaon from he PE execuables ha would dcae s behavor. We choose he Wndows API funcon calls as he man feaure. Los of API funcon calls by racng he programs n he ranng se could be obaned. I s surely ha each API calls play dfferen role on deecng malcous code. When an API call ofen appears n he malcous codes bu seldom n he bengn codes, so plays more mporan role n deecon. Here we use mean square devaon as he man parameer o selec API funcon calls as program s feaure. The mean square devaon beween classes compued as follow: () Tracng each sample program n he ranng se o oban API calls sequence A= {, A A,..., AP },( p), coun each API funcon( A ) frequency A n every malcous execuables. And coun s frequency N A n every bengn execuables N ; N () Compue average frequency EA ( ) and EA ( ) of each API funcon( A ) n malcous execuables se and bengn execuables se as: s EA ( ) = A, n N N EA ( ) = s = A () n = (3) Compue oal mean frequency ( ) where s s he number of malcous execuables,n s he number of bengn execuables. EA of each API funcon A as: N E( A ) + E( A ) E( A ) = () (4) Compue mean square devaon DA ( ) of each API funcon N A as: DA ( ) = ( EA ( ) EA ( )) + ( EA ( ) EA ( )) (3) A he las sage, we sored he API funcon call sequence on DA ( ),and choose he frs -h API funcon as he fuzzy feaure vecor. An example of feaure vecor shows n able. Table. Feaure ecor Ls Sample Program s behavor Search Fle API Funcon Calls FndClose ;FndFrsFleA; FndNexFleA ;FndResourceA DLLS reference KERNEL3.dll

4 63 B. Zhang, J. Yn, and J. Hao 4. Deecon Algorhm The resul of deec a compuer program s only bengn or malcous. We could ge a se of feaure from each sample fle x, gven C s he class se {bengn, malcous}, C denoes bengn, C denoes malcous. Our goal s o deermne wha class s afer he fle s feaure F was obaned. In our mehod, a program fle could be descrbed by fuzzy se. Gven Q= { q, q,..., q n } s he doman of a fuzzy se M = { µ / q, µ / q,..., µ / q } Where n s he number of feaures, µ s a real number whch value s beween[0,], µ / q s he degree of membershp of he es fle whch has feaure q. So he bengn code and malcous code could be descrbe by fuzzy se on doman Q. Gven EA ( ) s he mean frequency of a API funcon call n he malcous fles, EA ( N ) s he mean frequency of a API funcon call n he bengn fles, The malcous fle se s membershp funcon creae from he normal dsrbuon of F dsrbuon as: n n (4) µ 0, EA ( ) < 0 =, ( ) 0 ( EA ( )) ( E( A )) / σ e E A (5) where σ = max{ EA ( ), EA ( ),..., EA ( )}/ 3, s he number of feaures. And he bengn fle se N s membershp funcon s: µ 0, EA ( ) < 0 =, ( ) 0 N N N( EA ( )) ( EA ( N )) / σ N e E A (6) In he same way, he es fle s membershp funcon express as: 0, A < 0 µ M( A ) = ( ) / A σ e, A 0 Durng he ranng sep, we compue he frequency of all feaures over malcous code se. Accordng o membershp funcon µ ( EA ( )),we ge fuzzy se as: = { µ / A, µ / A,..., µ / A} In he same way, we compue he frequency of all feaure over bengn code se. So we ge fuzzy se N as: N = { µ / A, µ / A,..., µ / A} N N N For a es fle M, by racng s API funcon calls frs, we could ge he API call sequence. Then he frequency of all feaure was compued oo. Then { A, A,..., A } was ge, where =88 n our expermen. (7) (8) (9)

5 Usng Fuzzy Paern Recognon o Deec Unknown Malcous Execuables Code 633 Accordng o membershp funcon µ ( A ),we ge fuzzy se M : M M = { µ / A, µ / A,..., µ / A}. (0) On he Second sep, he degree of smlary ψ ( M, ) beween M and, ψ ( M, N ) beween M and N were compued as follow: A B ψ ( A, B ) = ( ( µ µ ) ) = () Where ψ ( AB, ) s Eucld degree of smlary. A he las sep, we can deermne whch class he es fle s by Theorem. Theorem : f sasfy he follow equaon: ψ( A, B ) = ψ( A, B ), hen classfy A n and B n he same class. Where A, B ( =,,..., n) s fuzzy ses, ψ ( AB, ) s he Eucld degree of smlary beween A and B. 5 Expermen Resuls We esmae our resuls over daa se n able. The daa se conssng of PE forma execuables was composed of 43 bengn programs and 09 malcous execuables.the malcous execuables were downloaded from hp://vx.nelux.org and hp:// The clean programs were gahered from a freshly nsalled Wndows 000 server machne. Each sample was labeled by a commercal vrus scanner wh he correc class label(malcous or bengn) for our mehod. Afer verfcaon of he daa se he nex sep of our mehod was o exrac feaures from he programs usng API racng ool-apispy.exe ha we desgned. To evaluae our sysem we were neresed n several quanes: (). False Negave, he number of malcous execuable examples classfed as bengn;(). False Posves, he number of bengn programs classfed as malcous execuables. We were neresed n he deecon rae of he classfer. In our case hs was he percenage of he oal malcous programs labeled malcous. We were also neresed n he false posve rae. Ths was he percenage of bengn programs whch were labeled as malcous, also called false alarms. For he algorhms we ploed he deecon rae usng Recever Operang Characersc(ROC) curves. The ROC curves n Fg. show ha our mehod had he lowes False Negave rae, 4.45%. Noce ha he curve s down slowly when he number of samples ncreases. Ths s very f o deec malcous code when he malcous sample obaned s dffcul. In anoher expermens[5], we had used a algorhm based on K Neares Neghbor(KNN) o classfy he daa se n able. The resul s shown n Fg.3.Tha algorhm had he lowes false posve rae, 4.8%. The Fuzzy Paern Recognon algorhm(fpr) has beer deecon raes han he algorhm based on KNN. Bu he KNN algorhm occupes less compue resources han FPR. The rade-off beween deec rae and sysem overhead mus be hnk over n praccal applcaon.

6 634 B. Zhang, J. Yn, and J. Hao Table. Daase n expermen Sample space Tranng se Tes Se Bengn Code Malcous Code sum Fg.. Fuzzy Paern Recognon ROC Fg. 3. K Neares Neghbor ROC 6 Concluson We presened a mehod for deecng prevously undeecable malcous execuables. As our knowledge, hs s he frs me ha usng fuzzy paern recognon algorhm o deec compuer vrus. However, he rae of error aler seems hgh n our expermen. So fuure work nvolves exendng our learnng algorhms o beer ulze API call sequences and oher feaure of vrus. We are plannng o use Neural nework o gan hgher accuracy and deecon raes. We also would lke o mplemen he sysem on a nework of compuers o evaluae s performance n erms of me and space n real world envronmens. Fnally, we are plannng on esng hs mehod over a larger se of malcous and bengn execuables. References. McGraw,G., Morse,G.: Aackng malcous code: A repor o he Infosec Research Councl. IEEE Sofware. 5(000) Lo,R., Lev,K., Olsson,R.: MCF: A malcous code fler. Compuers & Secury.4 (995) Tesauro,G., Kephar,J., Sorkn,G.: Neural neworks for compuer vrus recognon. IEEE Exper. (996) Schulz,M., Eskn,E., Zadok,E., Solfo,S.: Daa mnng mehods for deecon of new malcous execuables. In: Proceedngs of he IEEE Symposum on Secury and Prvacy. IEEE Press, Los Alamos, CA, (00) ZHANG Boyun,YIN Janpng,ZHANG Dngxng,HAO Jngbo.:Unkown compuer vrus deecon based on K-neares neghbor algorhm. Compuer Engneerng and Applcaons. 6(005)7-0

Variants of Pegasos. December 11, 2009

Variants of Pegasos. December 11, 2009 Inroducon Varans of Pegasos SooWoong Ryu bshboy@sanford.edu December, 009 Youngsoo Cho yc344@sanford.edu Developng a new SVM algorhm s ongong research opc. Among many exng SVM algorhms, we wll focus on

More information

Bayes rule for a classification problem INF Discriminant functions for the normal density. Euclidean distance. Mahalanobis distance

Bayes rule for a classification problem INF Discriminant functions for the normal density. Euclidean distance. Mahalanobis distance INF 43 3.. Repeon Anne Solberg (anne@f.uo.no Bayes rule for a classfcaon problem Suppose we have J, =,...J classes. s he class label for a pxel, and x s he observed feaure vecor. We can use Bayes rule

More information

An Effective TCM-KNN Scheme for High-Speed Network Anomaly Detection

An Effective TCM-KNN Scheme for High-Speed Network Anomaly Detection Vol. 24, November,, 200 An Effecve TCM-KNN Scheme for Hgh-Speed Nework Anomaly eecon Yang L Chnese Academy of Scences, Bejng Chna, 00080 lyang@sofware.c.ac.cn Absrac. Nework anomaly deecon has been a ho

More information

V.Abramov - FURTHER ANALYSIS OF CONFIDENCE INTERVALS FOR LARGE CLIENT/SERVER COMPUTER NETWORKS

V.Abramov - FURTHER ANALYSIS OF CONFIDENCE INTERVALS FOR LARGE CLIENT/SERVER COMPUTER NETWORKS R&RATA # Vol.) 8, March FURTHER AALYSIS OF COFIDECE ITERVALS FOR LARGE CLIET/SERVER COMPUTER ETWORKS Vyacheslav Abramov School of Mahemacal Scences, Monash Unversy, Buldng 8, Level 4, Clayon Campus, Wellngon

More information

Solution in semi infinite diffusion couples (error function analysis)

Solution in semi infinite diffusion couples (error function analysis) Soluon n sem nfne dffuson couples (error funcon analyss) Le us consder now he sem nfne dffuson couple of wo blocks wh concenraon of and I means ha, n a A- bnary sysem, s bondng beween wo blocks made of

More information

GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS. Youngwoo Ahn and Kitae Kim

GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS. Youngwoo Ahn and Kitae Kim Korean J. Mah. 19 (2011), No. 3, pp. 263 272 GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS Youngwoo Ahn and Kae Km Absrac. In he paper [1], an explc correspondence beween ceran

More information

An introduction to Support Vector Machine

An introduction to Support Vector Machine An nroducon o Suppor Vecor Machne 報告者 : 黃立德 References: Smon Haykn, "Neural Neworks: a comprehensve foundaon, second edon, 999, Chaper 2,6 Nello Chrsann, John Shawe-Tayer, An Inroducon o Suppor Vecor Machnes,

More information

Clustering (Bishop ch 9)

Clustering (Bishop ch 9) Cluserng (Bshop ch 9) Reference: Daa Mnng by Margare Dunham (a slde source) 1 Cluserng Cluserng s unsupervsed learnng, here are no class labels Wan o fnd groups of smlar nsances Ofen use a dsance measure

More information

Introduction to Boosting

Introduction to Boosting Inroducon o Boosng Cynha Rudn PACM, Prnceon Unversy Advsors Ingrd Daubeches and Rober Schapre Say you have a daabase of news arcles, +, +, -, -, +, +, -, -, +, +, -, -, +, +, -, + where arcles are labeled

More information

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 4

CS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 4 CS434a/54a: Paern Recognon Prof. Olga Veksler Lecure 4 Oulne Normal Random Varable Properes Dscrmnan funcons Why Normal Random Varables? Analycally racable Works well when observaon comes form a corruped

More information

CHAPTER 10: LINEAR DISCRIMINATION

CHAPTER 10: LINEAR DISCRIMINATION CHAPER : LINEAR DISCRIMINAION Dscrmnan-based Classfcaon 3 In classfcaon h K classes (C,C,, C k ) We defned dscrmnan funcon g j (), j=,,,k hen gven an es eample, e chose (predced) s class label as C f g

More information

ECE 366 Honors Section Fall 2009 Project Description

ECE 366 Honors Section Fall 2009 Project Description ECE 366 Honors Secon Fall 2009 Projec Descrpon Inroducon: Muscal genres are caegorcal labels creaed by humans o characerze dfferen ypes of musc. A muscal genre s characerzed by he common characerscs shared

More information

Cubic Bezier Homotopy Function for Solving Exponential Equations

Cubic Bezier Homotopy Function for Solving Exponential Equations Penerb Journal of Advanced Research n Compung and Applcaons ISSN (onlne: 46-97 Vol. 4, No.. Pages -8, 6 omoopy Funcon for Solvng Eponenal Equaons S. S. Raml *,,. Mohamad Nor,a, N. S. Saharzan,b and M.

More information

Robust and Accurate Cancer Classification with Gene Expression Profiling

Robust and Accurate Cancer Classification with Gene Expression Profiling Robus and Accurae Cancer Classfcaon wh Gene Expresson Proflng (Compuaonal ysems Bology, 2005) Auhor: Hafeng L, Keshu Zhang, ao Jang Oulne Background LDA (lnear dscrmnan analyss) and small sample sze problem

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Ths documen s downloaded from DR-NTU, Nanyang Technologcal Unversy Lbrary, Sngapore. Tle A smplfed verb machng algorhm for word paron n vsual speech processng( Acceped verson ) Auhor(s) Foo, Say We; Yong,

More information

Department of Economics University of Toronto

Department of Economics University of Toronto Deparmen of Economcs Unversy of Torono ECO408F M.A. Economercs Lecure Noes on Heeroskedascy Heeroskedascy o Ths lecure nvolves lookng a modfcaons we need o make o deal wh he regresson model when some of

More information

On One Analytic Method of. Constructing Program Controls

On One Analytic Method of. Constructing Program Controls Appled Mahemacal Scences, Vol. 9, 05, no. 8, 409-407 HIKARI Ld, www.m-hkar.com hp://dx.do.org/0.988/ams.05.54349 On One Analyc Mehod of Consrucng Program Conrols A. N. Kvko, S. V. Chsyakov and Yu. E. Balyna

More information

THE PREDICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS

THE PREDICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS THE PREICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS INTROUCTION The wo dmensonal paral dfferenal equaons of second order can be used for he smulaon of compeve envronmen n busness The arcle presens he

More information

Econ107 Applied Econometrics Topic 5: Specification: Choosing Independent Variables (Studenmund, Chapter 6)

Econ107 Applied Econometrics Topic 5: Specification: Choosing Independent Variables (Studenmund, Chapter 6) Econ7 Appled Economercs Topc 5: Specfcaon: Choosng Independen Varables (Sudenmund, Chaper 6 Specfcaon errors ha we wll deal wh: wrong ndependen varable; wrong funconal form. Ths lecure deals wh wrong ndependen

More information

Advanced Machine Learning & Perception

Advanced Machine Learning & Perception Advanced Machne Learnng & Percepon Insrucor: Tony Jebara SVM Feaure & Kernel Selecon SVM Eensons Feaure Selecon (Flerng and Wrappng) SVM Feaure Selecon SVM Kernel Selecon SVM Eensons Classfcaon Feaure/Kernel

More information

Learning Objectives. Self Organization Map. Hamming Distance(1/5) Introduction. Hamming Distance(3/5) Hamming Distance(2/5) 15/04/2015

Learning Objectives. Self Organization Map. Hamming Distance(1/5) Introduction. Hamming Distance(3/5) Hamming Distance(2/5) 15/04/2015 /4/ Learnng Objecves Self Organzaon Map Learnng whou Exaples. Inroducon. MAXNET 3. Cluserng 4. Feaure Map. Self-organzng Feaure Map 6. Concluson 38 Inroducon. Learnng whou exaples. Daa are npu o he syse

More information

Detection of Waving Hands from Images Using Time Series of Intensity Values

Detection of Waving Hands from Images Using Time Series of Intensity Values Deecon of Wavng Hands from Images Usng Tme eres of Inensy Values Koa IRIE, Kazunor UMEDA Chuo Unversy, Tokyo, Japan re@sensor.mech.chuo-u.ac.jp, umeda@mech.chuo-u.ac.jp Absrac Ths paper proposes a mehod

More information

Computing Relevance, Similarity: The Vector Space Model

Computing Relevance, Similarity: The Vector Space Model Compung Relevance, Smlary: The Vecor Space Model Based on Larson and Hears s sldes a UC-Bereley hp://.sms.bereley.edu/courses/s0/f00/ aabase Managemen Sysems, R. Ramarshnan ocumen Vecors v ocumens are

More information

A Novel Object Detection Method Using Gaussian Mixture Codebook Model of RGB-D Information

A Novel Object Detection Method Using Gaussian Mixture Codebook Model of RGB-D Information A Novel Objec Deecon Mehod Usng Gaussan Mxure Codebook Model of RGB-D Informaon Lujang LIU 1, Gaopeng ZHAO *,1, Yumng BO 1 1 School of Auomaon, Nanjng Unversy of Scence and Technology, Nanjng, Jangsu 10094,

More information

HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD

HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Journal of Appled Mahemacs and Compuaonal Mechancs 3, (), 45-5 HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Sansław Kukla, Urszula Sedlecka Insue of Mahemacs,

More information

In the complete model, these slopes are ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL. (! i+1 -! i ) + [(!") i+1,q - [(!

In the complete model, these slopes are ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL. (! i+1 -! i ) + [(!) i+1,q - [(! ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL The frs hng o es n wo-way ANOVA: Is here neracon? "No neracon" means: The man effecs model would f. Ths n urn means: In he neracon plo (wh A on he horzonal

More information

Lecture 11 SVM cont

Lecture 11 SVM cont Lecure SVM con. 0 008 Wha we have done so far We have esalshed ha we wan o fnd a lnear decson oundary whose margn s he larges We know how o measure he margn of a lnear decson oundary Tha s: he mnmum geomerc

More information

Attribute Reduction Algorithm Based on Discernibility Matrix with Algebraic Method GAO Jing1,a, Ma Hui1, Han Zhidong2,b

Attribute Reduction Algorithm Based on Discernibility Matrix with Algebraic Method GAO Jing1,a, Ma Hui1, Han Zhidong2,b Inernaonal Indusral Informacs and Compuer Engneerng Conference (IIICEC 05) Arbue educon Algorhm Based on Dscernbly Marx wh Algebrac Mehod GAO Jng,a, Ma Hu, Han Zhdong,b Informaon School, Capal Unversy

More information

Linear Response Theory: The connection between QFT and experiments

Linear Response Theory: The connection between QFT and experiments Phys540.nb 39 3 Lnear Response Theory: The connecon beween QFT and expermens 3.1. Basc conceps and deas Q: ow do we measure he conducvy of a meal? A: we frs nroduce a weak elecrc feld E, and hen measure

More information

Chapter Lagrangian Interpolation

Chapter Lagrangian Interpolation Chaper 5.4 agrangan Inerpolaon Afer readng hs chaper you should be able o:. dere agrangan mehod of nerpolaon. sole problems usng agrangan mehod of nerpolaon and. use agrangan nerpolans o fnd deraes and

More information

Chapter 6: AC Circuits

Chapter 6: AC Circuits Chaper 6: AC Crcus Chaper 6: Oulne Phasors and he AC Seady Sae AC Crcus A sable, lnear crcu operang n he seady sae wh snusodal excaon (.e., snusodal seady sae. Complee response forced response naural response.

More information

Outline. Probabilistic Model Learning. Probabilistic Model Learning. Probabilistic Model for Time-series Data: Hidden Markov Model

Outline. Probabilistic Model Learning. Probabilistic Model Learning. Probabilistic Model for Time-series Data: Hidden Markov Model Probablsc Model for Tme-seres Daa: Hdden Markov Model Hrosh Mamsuka Bonformacs Cener Kyoo Unversy Oulne Three Problems for probablsc models n machne learnng. Compung lkelhood 2. Learnng 3. Parsng (predcon

More information

Robustness Experiments with Two Variance Components

Robustness Experiments with Two Variance Components Naonal Insue of Sandards and Technology (NIST) Informaon Technology Laboraory (ITL) Sascal Engneerng Dvson (SED) Robusness Expermens wh Two Varance Componens by Ana Ivelsse Avlés avles@ns.gov Conference

More information

( ) [ ] MAP Decision Rule

( ) [ ] MAP Decision Rule Announcemens Bayes Decson Theory wh Normal Dsrbuons HW0 due oday HW o be assgned soon Proec descrpon posed Bomercs CSE 90 Lecure 4 CSE90, Sprng 04 CSE90, Sprng 04 Key Probables 4 ω class label X feaure

More information

Approximate Analytic Solution of (2+1) - Dimensional Zakharov-Kuznetsov(Zk) Equations Using Homotopy

Approximate Analytic Solution of (2+1) - Dimensional Zakharov-Kuznetsov(Zk) Equations Using Homotopy Arcle Inernaonal Journal of Modern Mahemacal Scences, 4, (): - Inernaonal Journal of Modern Mahemacal Scences Journal homepage: www.modernscenfcpress.com/journals/jmms.aspx ISSN: 66-86X Florda, USA Approxmae

More information

Hidden Markov Models

Hidden Markov Models 11-755 Machne Learnng for Sgnal Processng Hdden Markov Models Class 15. 12 Oc 2010 1 Admnsrva HW2 due Tuesday Is everyone on he projecs page? Where are your projec proposals? 2 Recap: Wha s an HMM Probablsc

More information

Fault Diagnosis in Industrial Processes Using Principal Component Analysis and Hidden Markov Model

Fault Diagnosis in Industrial Processes Using Principal Component Analysis and Hidden Markov Model Faul Dagnoss n Indusral Processes Usng Prncpal Componen Analyss and Hdden Markov Model Shaoyuan Zhou, Janmng Zhang, and Shuqng Wang Absrac An approach combnng hdden Markov model (HMM) wh prncpal componen

More information

WiH Wei He

WiH Wei He Sysem Idenfcaon of onlnear Sae-Space Space Baery odels WH We He wehe@calce.umd.edu Advsor: Dr. Chaochao Chen Deparmen of echancal Engneerng Unversy of aryland, College Par 1 Unversy of aryland Bacground

More information

Algorithm Research on Moving Object Detection of Surveillance Video Sequence *

Algorithm Research on Moving Object Detection of Surveillance Video Sequence * Opcs and Phooncs Journal 03 3 308-3 do:0.436/opj.03.3b07 Publshed Onlne June 03 (hp://www.scrp.org/journal/opj) Algorhm Research on Movng Objec Deecon of Survellance Vdeo Sequence * Kuhe Yang Zhmng Ca

More information

DEEP UNFOLDING FOR MULTICHANNEL SOURCE SEPARATION SUPPLEMENTARY MATERIAL

DEEP UNFOLDING FOR MULTICHANNEL SOURCE SEPARATION SUPPLEMENTARY MATERIAL DEEP UNFOLDING FOR MULTICHANNEL SOURCE SEPARATION SUPPLEMENTARY MATERIAL Sco Wsdom, John Hershey 2, Jonahan Le Roux 2, and Shnj Waanabe 2 Deparmen o Elecrcal Engneerng, Unversy o Washngon, Seale, WA, USA

More information

Appendix H: Rarefaction and extrapolation of Hill numbers for incidence data

Appendix H: Rarefaction and extrapolation of Hill numbers for incidence data Anne Chao Ncholas J Goell C seh lzabeh L ander K Ma Rober K Colwell and Aaron M llson 03 Rarefacon and erapolaon wh ll numbers: a framewor for samplng and esmaon n speces dversy sudes cology Monographs

More information

Chapter 4. Neural Networks Based on Competition

Chapter 4. Neural Networks Based on Competition Chaper 4. Neural Neworks Based on Compeon Compeon s mporan for NN Compeon beween neurons has been observed n bologcal nerve sysems Compeon s mporan n solvng many problems To classfy an npu paern _1 no

More information

Improved Classification Based on Predictive Association Rules

Improved Classification Based on Predictive Association Rules Proceedngs of he 009 IEEE Inernaonal Conference on Sysems, Man, and Cybernecs San Anono, TX, USA - Ocober 009 Improved Classfcaon Based on Predcve Assocaon Rules Zhxn Hao, Xuan Wang, Ln Yao, Yaoyun Zhang

More information

Off line signatures Recognition System using Discrete Cosine Transform and VQ/HMM

Off line signatures Recognition System using Discrete Cosine Transform and VQ/HMM Ausralan Journal of Basc and Appled Scences, 6(12): 423-428, 2012 ISSN 1991-8178 Off lne sgnaures Recognon Sysem usng Dscree Cosne Transform and VQ/HMM 1 Behrouz Vasegh, 2 Somayeh Hashem, 1,2 Deparmen

More information

[ ] 2. [ ]3 + (Δx i + Δx i 1 ) / 2. Δx i-1 Δx i Δx i+1. TPG4160 Reservoir Simulation 2018 Lecture note 3. page 1 of 5

[ ] 2. [ ]3 + (Δx i + Δx i 1 ) / 2. Δx i-1 Δx i Δx i+1. TPG4160 Reservoir Simulation 2018 Lecture note 3. page 1 of 5 TPG460 Reservor Smulaon 08 page of 5 DISCRETIZATIO OF THE FOW EQUATIOS As we already have seen, fne dfference appromaons of he paral dervaves appearng n he flow equaons may be obaned from Taylor seres

More information

Efficient Asynchronous Channel Hopping Design for Cognitive Radio Networks

Efficient Asynchronous Channel Hopping Design for Cognitive Radio Networks Effcen Asynchronous Channel Hoppng Desgn for Cognve Rado Neworks Chh-Mn Chao, Chen-Yu Hsu, and Yun-ng Lng Absrac In a cognve rado nework (CRN), a necessary condon for nodes o communcae wh each oher s ha

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5h Inernaonal onference on Advanced Desgn and Manufacurng Engneerng (IADME 5 The Falure Rae Expermenal Sudy of Specal N Machne Tool hunshan He, a, *, La Pan,b and Bng Hu 3,c,,3 ollege of Mechancal and

More information

Existence and Uniqueness Results for Random Impulsive Integro-Differential Equation

Existence and Uniqueness Results for Random Impulsive Integro-Differential Equation Global Journal of Pure and Appled Mahemacs. ISSN 973-768 Volume 4, Number 6 (8), pp. 89-87 Research Inda Publcaons hp://www.rpublcaon.com Exsence and Unqueness Resuls for Random Impulsve Inegro-Dfferenal

More information

FI 3103 Quantum Physics

FI 3103 Quantum Physics /9/4 FI 33 Quanum Physcs Aleander A. Iskandar Physcs of Magnesm and Phooncs Research Grou Insu Teknolog Bandung Basc Conces n Quanum Physcs Probably and Eecaon Value Hesenberg Uncerany Prncle Wave Funcon

More information

e-journal Reliability: Theory& Applications No 2 (Vol.2) Vyacheslav Abramov

e-journal Reliability: Theory& Applications No 2 (Vol.2) Vyacheslav Abramov June 7 e-ournal Relably: Theory& Applcaons No (Vol. CONFIDENCE INTERVALS ASSOCIATED WITH PERFORMANCE ANALYSIS OF SYMMETRIC LARGE CLOSED CLIENT/SERVER COMPUTER NETWORKS Absrac Vyacheslav Abramov School

More information

Introduction ( Week 1-2) Course introduction A brief introduction to molecular biology A brief introduction to sequence comparison Part I: Algorithms

Introduction ( Week 1-2) Course introduction A brief introduction to molecular biology A brief introduction to sequence comparison Part I: Algorithms Course organzaon Inroducon Wee -2) Course nroducon A bref nroducon o molecular bology A bref nroducon o sequence comparson Par I: Algorhms for Sequence Analyss Wee 3-8) Chaper -3, Models and heores» Probably

More information

Fall 2010 Graduate Course on Dynamic Learning

Fall 2010 Graduate Course on Dynamic Learning Fall 200 Graduae Course on Dynamc Learnng Chaper 4: Parcle Flers Sepember 27, 200 Byoung-Tak Zhang School of Compuer Scence and Engneerng & Cognve Scence and Bran Scence Programs Seoul aonal Unversy hp://b.snu.ac.kr/~bzhang/

More information

Constrained-Storage Variable-Branch Neural Tree for. Classification

Constrained-Storage Variable-Branch Neural Tree for. Classification Consraned-Sorage Varable-Branch Neural Tree for Classfcaon Shueng-Ben Yang Deparmen of Dgal Conen of Applcaon and Managemen Wenzao Ursulne Unversy of Languages 900 Mnsu s oad Kaohsng 807, Tawan. Tel :

More information

Hidden Markov Models Following a lecture by Andrew W. Moore Carnegie Mellon University

Hidden Markov Models Following a lecture by Andrew W. Moore Carnegie Mellon University Hdden Markov Models Followng a lecure by Andrew W. Moore Carnege Mellon Unversy www.cs.cmu.edu/~awm/uorals A Markov Sysem Has N saes, called s, s 2.. s N s 2 There are dscree meseps, 0,, s s 3 N 3 0 Hdden

More information

Performance Analysis for a Network having Standby Redundant Unit with Waiting in Repair

Performance Analysis for a Network having Standby Redundant Unit with Waiting in Repair TECHNI Inernaonal Journal of Compung Scence Communcaon Technologes VOL.5 NO. July 22 (ISSN 974-3375 erformance nalyss for a Nework havng Sby edundan Un wh ang n epar Jendra Sngh 2 abns orwal 2 Deparmen

More information

John Geweke a and Gianni Amisano b a Departments of Economics and Statistics, University of Iowa, USA b European Central Bank, Frankfurt, Germany

John Geweke a and Gianni Amisano b a Departments of Economics and Statistics, University of Iowa, USA b European Central Bank, Frankfurt, Germany Herarchcal Markov Normal Mxure models wh Applcaons o Fnancal Asse Reurns Appendx: Proofs of Theorems and Condonal Poseror Dsrbuons John Geweke a and Gann Amsano b a Deparmens of Economcs and Sascs, Unversy

More information

Tools for Analysis of Accelerated Life and Degradation Test Data

Tools for Analysis of Accelerated Life and Degradation Test Data Acceleraed Sress Tesng and Relably Tools for Analyss of Acceleraed Lfe and Degradaon Tes Daa Presened by: Reuel Smh Unversy of Maryland College Park smhrc@umd.edu Sepember-5-6 Sepember 28-30 206, Pensacola

More information

Pattern Classification (III) & Pattern Verification

Pattern Classification (III) & Pattern Verification Preare by Prof. Hu Jang CSE638 --4 CSE638 3. Seech & Language Processng o.5 Paern Classfcaon III & Paern Verfcaon Prof. Hu Jang Dearmen of Comuer Scence an Engneerng York Unversy Moel Parameer Esmaon Maxmum

More information

Video-Based Face Recognition Using Adaptive Hidden Markov Models

Video-Based Face Recognition Using Adaptive Hidden Markov Models Vdeo-Based Face Recognon Usng Adapve Hdden Markov Models Xaomng Lu and suhan Chen Elecrcal and Compuer Engneerng, Carnege Mellon Unversy, Psburgh, PA, 523, U.S.A. xaomng@andrew.cmu.edu suhan@cmu.edu Absrac

More information

FTCS Solution to the Heat Equation

FTCS Solution to the Heat Equation FTCS Soluon o he Hea Equaon ME 448/548 Noes Gerald Reckenwald Porland Sae Unversy Deparmen of Mechancal Engneerng gerry@pdxedu ME 448/548: FTCS Soluon o he Hea Equaon Overvew Use he forward fne d erence

More information

Math 128b Project. Jude Yuen

Math 128b Project. Jude Yuen Mah 8b Proec Jude Yuen . Inroducon Le { Z } be a sequence of observed ndependen vecor varables. If he elemens of Z have a on normal dsrbuon hen { Z } has a mean vecor Z and a varancecovarance marx z. Geomercally

More information

MCs Detection Approach Using Bagging and Boosting Based Twin Support Vector Machine

MCs Detection Approach Using Bagging and Boosting Based Twin Support Vector Machine Proceedngs of he 009 IEEE Inernaonal Conference on Sysems, Man, and Cybernecs San Anono, TX, USA - Ocober 009 MCs Deecon Approach Usng Baggng and Boosng Based Twn Suppor Vecor Machne Xnsheng Zhang School

More information

Li An-Ping. Beijing , P.R.China

Li An-Ping. Beijing , P.R.China A New Type of Cpher: DICING_csb L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Absrac: In hs paper, we wll propose a new ype of cpher named DICING_csb, whch s derved from our prevous sream cpher DICING.

More information

Ordinary Differential Equations in Neuroscience with Matlab examples. Aim 1- Gain understanding of how to set up and solve ODE s

Ordinary Differential Equations in Neuroscience with Matlab examples. Aim 1- Gain understanding of how to set up and solve ODE s Ordnary Dfferenal Equaons n Neuroscence wh Malab eamples. Am - Gan undersandng of how o se up and solve ODE s Am Undersand how o se up an solve a smple eample of he Hebb rule n D Our goal a end of class

More information

Machine Learning 2nd Edition

Machine Learning 2nd Edition INTRODUCTION TO Lecure Sldes for Machne Learnng nd Edon ETHEM ALPAYDIN, modfed by Leonardo Bobadlla and some pars from hp://www.cs.au.ac.l/~aparzn/machnelearnng/ The MIT Press, 00 alpaydn@boun.edu.r hp://www.cmpe.boun.edu.r/~ehem/mle

More information

Comparison of Differences between Power Means 1

Comparison of Differences between Power Means 1 In. Journal of Mah. Analyss, Vol. 7, 203, no., 5-55 Comparson of Dfferences beween Power Means Chang-An Tan, Guanghua Sh and Fe Zuo College of Mahemacs and Informaon Scence Henan Normal Unversy, 453007,

More information

Object Tracking Based on Visual Attention Model and Particle Filter

Object Tracking Based on Visual Attention Model and Particle Filter Inernaonal Journal of Informaon Technology Vol. No. 9 25 Objec Trackng Based on Vsual Aenon Model and Parcle Fler Long-Fe Zhang, Yuan-Da Cao 2, Mng-Je Zhang 3, Y-Zhuo Wang 4 School of Compuer Scence and

More information

An Integrated and Interactive Video Retrieval Framework with Hierarchical Learning Models and Semantic Clustering Strategy

An Integrated and Interactive Video Retrieval Framework with Hierarchical Learning Models and Semantic Clustering Strategy An Inegraed and Ineracve Vdeo Rereval Framewor wh Herarchcal Learnng Models and Semanc Cluserng Sraegy Na Zhao, Shu-Chng Chen, Me-Lng Shyu 2, Suar H. Rubn 3 Dsrbued Mulmeda Informaon Sysem Laboraory School

More information

SOME NOISELESS CODING THEOREMS OF INACCURACY MEASURE OF ORDER α AND TYPE β

SOME NOISELESS CODING THEOREMS OF INACCURACY MEASURE OF ORDER α AND TYPE β SARAJEVO JOURNAL OF MATHEMATICS Vol.3 (15) (2007), 137 143 SOME NOISELESS CODING THEOREMS OF INACCURACY MEASURE OF ORDER α AND TYPE β M. A. K. BAIG AND RAYEES AHMAD DAR Absrac. In hs paper, we propose

More information

( ) () we define the interaction representation by the unitary transformation () = ()

( ) () we define the interaction representation by the unitary transformation () = () Hgher Order Perurbaon Theory Mchael Fowler 3/7/6 The neracon Represenaon Recall ha n he frs par of hs course sequence, we dscussed he chrödnger and Hesenberg represenaons of quanum mechancs here n he chrödnger

More information

Graduate Macroeconomics 2 Problem set 5. - Solutions

Graduate Macroeconomics 2 Problem set 5. - Solutions Graduae Macroeconomcs 2 Problem se. - Soluons Queson 1 To answer hs queson we need he frms frs order condons and he equaon ha deermnes he number of frms n equlbrum. The frms frs order condons are: F K

More information

Authentication Management for Information System Security Based on Iris Recognition

Authentication Management for Information System Security Based on Iris Recognition Journal of Advanced Managemen Scence, Vol 1, No 1, March 2013 Auhencaon Managemen for Informaon Sysem Secury Based on Irs Recognon Yao-Hong Tsa Deparmen of Informaon Managemen, Hsuan Chung Unversy, Hsnchu

More information

Anisotropic Behaviors and Its Application on Sheet Metal Stamping Processes

Anisotropic Behaviors and Its Application on Sheet Metal Stamping Processes Ansoropc Behavors and Is Applcaon on Shee Meal Sampng Processes Welong Hu ETA-Engneerng Technology Assocaes, Inc. 33 E. Maple oad, Sue 00 Troy, MI 48083 USA 48-79-300 whu@ea.com Jeanne He ETA-Engneerng

More information

Theoretical Analysis of Biogeography Based Optimization Aijun ZHU1,2,3 a, Cong HU1,3, Chuanpei XU1,3, Zhi Li1,3

Theoretical Analysis of Biogeography Based Optimization Aijun ZHU1,2,3 a, Cong HU1,3, Chuanpei XU1,3, Zhi Li1,3 6h Inernaonal Conference on Machnery, Maerals, Envronmen, Boechnology and Compuer (MMEBC 6) Theorecal Analyss of Bogeography Based Opmzaon Aun ZU,,3 a, Cong U,3, Chuanpe XU,3, Zh L,3 School of Elecronc

More information

Single-loop System Reliability-Based Design & Topology Optimization (SRBDO/SRBTO): A Matrix-based System Reliability (MSR) Method

Single-loop System Reliability-Based Design & Topology Optimization (SRBDO/SRBTO): A Matrix-based System Reliability (MSR) Method 10 h US Naonal Congress on Compuaonal Mechancs Columbus, Oho 16-19, 2009 Sngle-loop Sysem Relably-Based Desgn & Topology Opmzaon (SRBDO/SRBTO): A Marx-based Sysem Relably (MSR) Mehod Tam Nguyen, Junho

More information

UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 2017 EXAMINATION

UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 2017 EXAMINATION INTERNATIONAL TRADE T. J. KEHOE UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 27 EXAMINATION Please answer wo of he hree quesons. You can consul class noes, workng papers, and arcles whle you are workng on he

More information

Anomaly Detection. Lecture Notes for Chapter 9. Introduction to Data Mining, 2 nd Edition by Tan, Steinbach, Karpatne, Kumar

Anomaly Detection. Lecture Notes for Chapter 9. Introduction to Data Mining, 2 nd Edition by Tan, Steinbach, Karpatne, Kumar Anomaly eecon Lecure Noes for Chaper 9 Inroducon o aa Mnng, 2 nd Edon by Tan, Senbach, Karpane, Kumar 2/14/18 Inroducon o aa Mnng, 2nd Edon 1 Anomaly/Ouler eecon Wha are anomales/oulers? The se of daa

More information

New M-Estimator Objective Function. in Simultaneous Equations Model. (A Comparative Study)

New M-Estimator Objective Function. in Simultaneous Equations Model. (A Comparative Study) Inernaonal Mahemacal Forum, Vol. 8, 3, no., 7 - HIKARI Ld, www.m-hkar.com hp://dx.do.org/.988/mf.3.3488 New M-Esmaor Objecve Funcon n Smulaneous Equaons Model (A Comparave Sudy) Ahmed H. Youssef Professor

More information

Face Detector with Oriented Multiple Templates

Face Detector with Oriented Multiple Templates Face Deecor wh Orened Mulple Templaes Yea-Shuan Huang We-Cheng Lu Absrac Ths paper proposes a novel ace deecon algorhm whch exracs a local mage srucure (LIS) eaure and adops a boosng approach o consruc

More information

Lecture 2 L n i e n a e r a M od o e d l e s

Lecture 2 L n i e n a e r a M od o e d l e s Lecure Lnear Models Las lecure You have learned abou ha s machne learnng Supervsed learnng Unsupervsed learnng Renforcemen learnng You have seen an eample learnng problem and he general process ha one

More information

Detecting Emerging Trends from Scientific Corpora

Detecting Emerging Trends from Scientific Corpora hp://www.as.ac.p/sss/ Inernaonal Journal of Knowledge and Sysems Scences Vol. 2, No. 2, June 2005 Deecng Emergng Trends from Scenfc Corpora Mnh-Hoang Le, Tu-Bao Ho, Yosheru Naamor School of Knowledge Scence,

More information

J i-1 i. J i i+1. Numerical integration of the diffusion equation (I) Finite difference method. Spatial Discretization. Internal nodes.

J i-1 i. J i i+1. Numerical integration of the diffusion equation (I) Finite difference method. Spatial Discretization. Internal nodes. umercal negraon of he dffuson equaon (I) Fne dfference mehod. Spaal screaon. Inernal nodes. R L V For hermal conducon le s dscree he spaal doman no small fne spans, =,,: Balance of parcles for an nernal

More information

Scattering at an Interface: Oblique Incidence

Scattering at an Interface: Oblique Incidence Course Insrucor Dr. Raymond C. Rumpf Offce: A 337 Phone: (915) 747 6958 E Mal: rcrumpf@uep.edu EE 4347 Appled Elecromagnecs Topc 3g Scaerng a an Inerface: Oblque Incdence Scaerng These Oblque noes may

More information

Machine Learning Linear Regression

Machine Learning Linear Regression Machne Learnng Lnear Regresson Lesson 3 Lnear Regresson Bascs of Regresson Leas Squares esmaon Polynomal Regresson Bass funcons Regresson model Regularzed Regresson Sascal Regresson Mamum Lkelhood (ML)

More information

CS286.2 Lecture 14: Quantum de Finetti Theorems II

CS286.2 Lecture 14: Quantum de Finetti Theorems II CS286.2 Lecure 14: Quanum de Fne Theorems II Scrbe: Mara Okounkova 1 Saemen of he heorem Recall he las saemen of he quanum de Fne heorem from he prevous lecure. Theorem 1 Quanum de Fne). Le ρ Dens C 2

More information

National Exams December 2015 NOTES: 04-BS-13, Biology. 3 hours duration

National Exams December 2015 NOTES: 04-BS-13, Biology. 3 hours duration Naonal Exams December 205 04-BS-3 Bology 3 hours duraon NOTES: f doub exss as o he nerpreaon of any queson he canddae s urged o subm wh he answer paper a clear saemen of any assumpons made 2 Ths s a CLOSED

More information

Testing a new idea to solve the P = NP problem with mathematical induction

Testing a new idea to solve the P = NP problem with mathematical induction Tesng a new dea o solve he P = NP problem wh mahemacal nducon Bacground P and NP are wo classes (ses) of languages n Compuer Scence An open problem s wheher P = NP Ths paper ess a new dea o compare he

More information

/99 $10.00 (c) 1999 IEEE

/99 $10.00 (c) 1999 IEEE Recognzng Hand Gesure Usng Moon Trajecores Mng-Hsuan Yang and Narendra Ahuja Deparmen of Compuer Scence and Beckman Insue Unversy of Illnos a Urbana-Champagn, Urbana, IL 611 fmhyang,ahujag@vson.a.uuc.edu

More information

Extracting Duration Facts in Qualitative Simulation using Comparison Calculus

Extracting Duration Facts in Qualitative Simulation using Comparison Calculus Exracng Duraon Facs n Qualave Smulaon usng Comparson Calculus Tolga Könk 1 and A. C. Cem Say 2 1: konk@umch.edu Compuer Scence and Engneerng ATL., Unv. Mchgan, 1101 Beal Ave., Ann Arbor, 48105-2106 MI,

More information

Time-interval analysis of β decay. V. Horvat and J. C. Hardy

Time-interval analysis of β decay. V. Horvat and J. C. Hardy Tme-nerval analyss of β decay V. Horva and J. C. Hardy Work on he even analyss of β decay [1] connued and resuled n he developmen of a novel mehod of bea-decay me-nerval analyss ha produces hghly accurae

More information

doi: info:doi/ /

doi: info:doi/ / do: nfo:do/0.063/.322393 nernaonal Conference on Power Conrol and Opmzaon, Bal, ndonesa, -3, June 2009 A COLOR FEATURES-BASED METHOD FOR OBJECT TRACKNG EMPLOYNG A PARTCLE FLTER ALGORTHM Bud Sugand, Hyoungseop

More information

Filtrage particulaire et suivi multi-pistes Carine Hue Jean-Pierre Le Cadre and Patrick Pérez

Filtrage particulaire et suivi multi-pistes Carine Hue Jean-Pierre Le Cadre and Patrick Pérez Chaînes de Markov cachées e flrage parculare 2-22 anver 2002 Flrage parculare e suv mul-pses Carne Hue Jean-Perre Le Cadre and Parck Pérez Conex Applcaons: Sgnal processng: arge rackng bearngs-onl rackng

More information

Phone Recognition on TIMIT Database Using Mel-Frequency Cepstral Coefficients and Support Vector Machine Classifier

Phone Recognition on TIMIT Database Using Mel-Frequency Cepstral Coefficients and Support Vector Machine Classifier IJISET - Inernaonal Journal of Innovave Scence, Engneerng & Technology, Vol. Issue, January 05. www.jse.com Phone Recognon on TIMIT Daabase Usng Mel-Frequency Cepsral Coeffcens and Suppor Vecor Machne

More information

Track Properities of Normal Chain

Track Properities of Normal Chain In. J. Conemp. Mah. Scences, Vol. 8, 213, no. 4, 163-171 HIKARI Ld, www.m-har.com rac Propes of Normal Chan L Chen School of Mahemacs and Sascs, Zhengzhou Normal Unversy Zhengzhou Cy, Hennan Provnce, 4544,

More information

The Analysis of the Thickness-predictive Model Based on the SVM Xiu-ming Zhao1,a,Yan Wang2,band Zhimin Bi3,c

The Analysis of the Thickness-predictive Model Based on the SVM Xiu-ming Zhao1,a,Yan Wang2,band Zhimin Bi3,c h Naonal Conference on Elecrcal, Elecroncs and Compuer Engneerng (NCEECE The Analyss of he Thcknesspredcve Model Based on he SVM Xumng Zhao,a,Yan Wang,band Zhmn B,c School of Conrol Scence and Engneerng,

More information

Normal Random Variable and its discriminant functions

Normal Random Variable and its discriminant functions Noral Rando Varable and s dscrnan funcons Oulne Noral Rando Varable Properes Dscrnan funcons Why Noral Rando Varables? Analycally racable Works well when observaon coes for a corruped snle prooype 3 The

More information

AN OVERTRAINING-RESISTANT STOCHASTIC MODELING METHOD FOR PATTERN RECOGNITION. BY E. M. KLEINBERG State University of New York, Buffalo

AN OVERTRAINING-RESISTANT STOCHASTIC MODELING METHOD FOR PATTERN RECOGNITION. BY E. M. KLEINBERG State University of New York, Buffalo The Annals of Sascs 1996, Vol. 24, No. 6, 2319 2349 AN OVERTRAINING-RESISTANT STOCHASTIC MODELING METHOD FOR PATTERN RECOGNITION BY E. M. KLEINBERG Sae Unversy of New York, Buffalo We wll nroduce a generc

More information

Robustness of DEWMA versus EWMA Control Charts to Non-Normal Processes

Robustness of DEWMA versus EWMA Control Charts to Non-Normal Processes Journal of Modern Appled Sascal Mehods Volume Issue Arcle 8 5--3 Robusness of D versus Conrol Chars o Non- Processes Saad Saeed Alkahan Performance Measuremen Cener of Governmen Agences, Insue of Publc

More information

CS 268: Packet Scheduling

CS 268: Packet Scheduling Pace Schedulng Decde when and wha pace o send on oupu ln - Usually mplemened a oupu nerface CS 68: Pace Schedulng flow Ion Soca March 9, 004 Classfer flow flow n Buffer managemen Scheduler soca@cs.bereley.edu

More information

TSS = SST + SSE An orthogonal partition of the total SS

TSS = SST + SSE An orthogonal partition of the total SS ANOVA: Topc 4. Orhogonal conrass [ST&D p. 183] H 0 : µ 1 = µ =... = µ H 1 : The mean of a leas one reamen group s dfferen To es hs hypohess, a basc ANOVA allocaes he varaon among reamen means (SST) equally

More information