Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code
|
|
- Shanon Johns
- 5 years ago
- Views:
Transcription
1 Usng Fuzzy Paern Recognon o Deec Unknown Malcous Execuables Code Boyun Zhang,, Janpng Yn, and Jngbo Hao School of Compuer Scence, Naonal Unversy of Defense Technology, Changsha 40073, Chna hnxzby@yahoo.com.cn Deparmen of Compuer Scence, Hunan Publc Secury College, Changsha 4038, Chna Absrac. An nellgen deec sysem o recognon unknown compuer vrus s proposed. Usng he mehod based on fuzzy paern recognon algorhm, a malcous execuable code deecon nework model s desgned also. Ths model arge a Wn3 bnary vruses on Inel IA3 archecures. I could deec known and unknown malcous code by analyzng her behavor. We gahered 43 bengn and 09 malcous execuable programs ha are n he Wndows Porable Execuable (PE) forma as daase for expermen. Afer exracng he mos relevan API calls as feaure, he fuzzy paern recognon algorhm o deec compuer vrus was evaluaed. Inroducon Malcous code s any code added, changed, or removed from a sofware sysem o nenonally cause harm or subver he sysem s nended funcon []. Such sofware has been used o compromse compuer sysems, o desroy her nformaon, and o render hem useless.excellen echnology exss for deecng known malcous execuables. Sofware for vrus deecon has been que successful, and programs such as McAfee rus Scan and Noron Anrus are ubquous. These programs search execuable code for known paerns. One shorcomng of hs mehod s ha we mus oban a copy of a malcous program before exracng he paern necessary for s deecon. Our effors o address hs problem have resuled n a felded applcaon, bul usng echnques from fuzzy paern recognon and machne learnng. The Malcous Execuable Classfcaon Sysem currenly deecs unknown malcous execuables code whou removng any obfuscaon. As far as know, our expermens s he frs me o esablshed mehods based on fuzzy paern recognon applyng o deec malcous execuables. In he followng secons, we descrbe relaed research n he area of malcous code deecon. Then we llusrae he archecure of our deec model n secon 3. Secon 4 deals he mehod of exracon feaure from program, and sang he deec engne work procedure. Secon 5 deals he mplemenaon and expermen resuls. We sae our plans for fuure work n Secon 6. L. Wang and Y. Jn (Eds.): FSKD 005, LNAI 363, pp , 005. Sprnger-erlag Berln Hedelberg 005
2 Bay New or ks 630 B. Zhang, J. Yn, and J. Hao Relaed Work There have been few aemps o use machne learnng and daa mnng for he purpose of denfyng new or unknown malcous code. In an early aemp, Lo e al. [] conduced an analyss of several programs evdenly by hand and denfed ell-ale sgns, whch hey subsequenly used o fler new programs. Researchers a IBM's T.J.Wason Research Cener have nvesgaed neural neworks for vrus deecon and have ncorporaed a smlar approach for deecng boo-secor vruses no IBM's An-rus sofware [3]. More recenly, nsead of focusng on boo-secor vruses, Schulz e al. [4] used daa mnng mehods, such as naïve Bayes, o deec malcous code. There are oher mehods of guardng agans malcous code, such as obec reconclaon, whch nvolves comparng curren fles and drecores o pas copes. One can also compare crypographc hashes. One can also aud runnng programs and sacally analyze execuables usng pre-defned malcous paerns. These approaches are no based on daa mnng. 3 Model Srucure We frs descrbe a general framework for deecng malcous execuable code. Fgure llusraes he proposed archecure. The framework s dvded no 3 par: Applcaon Server, Deec Server, and rus Deec Frewall based on characer code scannng. Before a fle save o he applcaon server, wll be scanned by he vrus deec frewall. If he fle s nfeced wh vrus hen quaranne. Oherwse f here s no malcous nformaon abou he fle, wll be replcaed copes. Then, one copy wll be sen o he applcaon server, anoher one wll be sen o he deec server based on Fuzzy Paern Recognon (FPR) deec engne. A he followng sage, he fle s feaures s exraced n he deec server. The deec server drves deec engne based on FPR check he copy agan. Accordng o he resul from deec server, f he fle s nfeced wh unknown malcous code, he applcaon server wll be remnd o remove he copy from s applcaon daabase. And hen quaranne n a specal daabase or sen o an exper o analyze by hand. Fg.. Archecure
3 Usng Fuzzy Paern Recognon o Deec Unknown Malcous Execuables Code 63 4 Malcous Code Deec Engne 4. Feaure Exracon Our frs nuon no he problem was o exrac nformaon from he PE execuables ha would dcae s behavor. We choose he Wndows API funcon calls as he man feaure. Los of API funcon calls by racng he programs n he ranng se could be obaned. I s surely ha each API calls play dfferen role on deecng malcous code. When an API call ofen appears n he malcous codes bu seldom n he bengn codes, so plays more mporan role n deecon. Here we use mean square devaon as he man parameer o selec API funcon calls as program s feaure. The mean square devaon beween classes compued as follow: () Tracng each sample program n he ranng se o oban API calls sequence A= {, A A,..., AP },( p), coun each API funcon( A ) frequency A n every malcous execuables. And coun s frequency N A n every bengn execuables N ; N () Compue average frequency EA ( ) and EA ( ) of each API funcon( A ) n malcous execuables se and bengn execuables se as: s EA ( ) = A, n N N EA ( ) = s = A () n = (3) Compue oal mean frequency ( ) where s s he number of malcous execuables,n s he number of bengn execuables. EA of each API funcon A as: N E( A ) + E( A ) E( A ) = () (4) Compue mean square devaon DA ( ) of each API funcon N A as: DA ( ) = ( EA ( ) EA ( )) + ( EA ( ) EA ( )) (3) A he las sage, we sored he API funcon call sequence on DA ( ),and choose he frs -h API funcon as he fuzzy feaure vecor. An example of feaure vecor shows n able. Table. Feaure ecor Ls Sample Program s behavor Search Fle API Funcon Calls FndClose ;FndFrsFleA; FndNexFleA ;FndResourceA DLLS reference KERNEL3.dll
4 63 B. Zhang, J. Yn, and J. Hao 4. Deecon Algorhm The resul of deec a compuer program s only bengn or malcous. We could ge a se of feaure from each sample fle x, gven C s he class se {bengn, malcous}, C denoes bengn, C denoes malcous. Our goal s o deermne wha class s afer he fle s feaure F was obaned. In our mehod, a program fle could be descrbed by fuzzy se. Gven Q= { q, q,..., q n } s he doman of a fuzzy se M = { µ / q, µ / q,..., µ / q } Where n s he number of feaures, µ s a real number whch value s beween[0,], µ / q s he degree of membershp of he es fle whch has feaure q. So he bengn code and malcous code could be descrbe by fuzzy se on doman Q. Gven EA ( ) s he mean frequency of a API funcon call n he malcous fles, EA ( N ) s he mean frequency of a API funcon call n he bengn fles, The malcous fle se s membershp funcon creae from he normal dsrbuon of F dsrbuon as: n n (4) µ 0, EA ( ) < 0 =, ( ) 0 ( EA ( )) ( E( A )) / σ e E A (5) where σ = max{ EA ( ), EA ( ),..., EA ( )}/ 3, s he number of feaures. And he bengn fle se N s membershp funcon s: µ 0, EA ( ) < 0 =, ( ) 0 N N N( EA ( )) ( EA ( N )) / σ N e E A (6) In he same way, he es fle s membershp funcon express as: 0, A < 0 µ M( A ) = ( ) / A σ e, A 0 Durng he ranng sep, we compue he frequency of all feaures over malcous code se. Accordng o membershp funcon µ ( EA ( )),we ge fuzzy se as: = { µ / A, µ / A,..., µ / A} In he same way, we compue he frequency of all feaure over bengn code se. So we ge fuzzy se N as: N = { µ / A, µ / A,..., µ / A} N N N For a es fle M, by racng s API funcon calls frs, we could ge he API call sequence. Then he frequency of all feaure was compued oo. Then { A, A,..., A } was ge, where =88 n our expermen. (7) (8) (9)
5 Usng Fuzzy Paern Recognon o Deec Unknown Malcous Execuables Code 633 Accordng o membershp funcon µ ( A ),we ge fuzzy se M : M M = { µ / A, µ / A,..., µ / A}. (0) On he Second sep, he degree of smlary ψ ( M, ) beween M and, ψ ( M, N ) beween M and N were compued as follow: A B ψ ( A, B ) = ( ( µ µ ) ) = () Where ψ ( AB, ) s Eucld degree of smlary. A he las sep, we can deermne whch class he es fle s by Theorem. Theorem : f sasfy he follow equaon: ψ( A, B ) = ψ( A, B ), hen classfy A n and B n he same class. Where A, B ( =,,..., n) s fuzzy ses, ψ ( AB, ) s he Eucld degree of smlary beween A and B. 5 Expermen Resuls We esmae our resuls over daa se n able. The daa se conssng of PE forma execuables was composed of 43 bengn programs and 09 malcous execuables.the malcous execuables were downloaded from hp://vx.nelux.org and hp:// The clean programs were gahered from a freshly nsalled Wndows 000 server machne. Each sample was labeled by a commercal vrus scanner wh he correc class label(malcous or bengn) for our mehod. Afer verfcaon of he daa se he nex sep of our mehod was o exrac feaures from he programs usng API racng ool-apispy.exe ha we desgned. To evaluae our sysem we were neresed n several quanes: (). False Negave, he number of malcous execuable examples classfed as bengn;(). False Posves, he number of bengn programs classfed as malcous execuables. We were neresed n he deecon rae of he classfer. In our case hs was he percenage of he oal malcous programs labeled malcous. We were also neresed n he false posve rae. Ths was he percenage of bengn programs whch were labeled as malcous, also called false alarms. For he algorhms we ploed he deecon rae usng Recever Operang Characersc(ROC) curves. The ROC curves n Fg. show ha our mehod had he lowes False Negave rae, 4.45%. Noce ha he curve s down slowly when he number of samples ncreases. Ths s very f o deec malcous code when he malcous sample obaned s dffcul. In anoher expermens[5], we had used a algorhm based on K Neares Neghbor(KNN) o classfy he daa se n able. The resul s shown n Fg.3.Tha algorhm had he lowes false posve rae, 4.8%. The Fuzzy Paern Recognon algorhm(fpr) has beer deecon raes han he algorhm based on KNN. Bu he KNN algorhm occupes less compue resources han FPR. The rade-off beween deec rae and sysem overhead mus be hnk over n praccal applcaon.
6 634 B. Zhang, J. Yn, and J. Hao Table. Daase n expermen Sample space Tranng se Tes Se Bengn Code Malcous Code sum Fg.. Fuzzy Paern Recognon ROC Fg. 3. K Neares Neghbor ROC 6 Concluson We presened a mehod for deecng prevously undeecable malcous execuables. As our knowledge, hs s he frs me ha usng fuzzy paern recognon algorhm o deec compuer vrus. However, he rae of error aler seems hgh n our expermen. So fuure work nvolves exendng our learnng algorhms o beer ulze API call sequences and oher feaure of vrus. We are plannng o use Neural nework o gan hgher accuracy and deecon raes. We also would lke o mplemen he sysem on a nework of compuers o evaluae s performance n erms of me and space n real world envronmens. Fnally, we are plannng on esng hs mehod over a larger se of malcous and bengn execuables. References. McGraw,G., Morse,G.: Aackng malcous code: A repor o he Infosec Research Councl. IEEE Sofware. 5(000) Lo,R., Lev,K., Olsson,R.: MCF: A malcous code fler. Compuers & Secury.4 (995) Tesauro,G., Kephar,J., Sorkn,G.: Neural neworks for compuer vrus recognon. IEEE Exper. (996) Schulz,M., Eskn,E., Zadok,E., Solfo,S.: Daa mnng mehods for deecon of new malcous execuables. In: Proceedngs of he IEEE Symposum on Secury and Prvacy. IEEE Press, Los Alamos, CA, (00) ZHANG Boyun,YIN Janpng,ZHANG Dngxng,HAO Jngbo.:Unkown compuer vrus deecon based on K-neares neghbor algorhm. Compuer Engneerng and Applcaons. 6(005)7-0
Variants of Pegasos. December 11, 2009
Inroducon Varans of Pegasos SooWoong Ryu bshboy@sanford.edu December, 009 Youngsoo Cho yc344@sanford.edu Developng a new SVM algorhm s ongong research opc. Among many exng SVM algorhms, we wll focus on
More informationBayes rule for a classification problem INF Discriminant functions for the normal density. Euclidean distance. Mahalanobis distance
INF 43 3.. Repeon Anne Solberg (anne@f.uo.no Bayes rule for a classfcaon problem Suppose we have J, =,...J classes. s he class label for a pxel, and x s he observed feaure vecor. We can use Bayes rule
More informationAn Effective TCM-KNN Scheme for High-Speed Network Anomaly Detection
Vol. 24, November,, 200 An Effecve TCM-KNN Scheme for Hgh-Speed Nework Anomaly eecon Yang L Chnese Academy of Scences, Bejng Chna, 00080 lyang@sofware.c.ac.cn Absrac. Nework anomaly deecon has been a ho
More informationV.Abramov - FURTHER ANALYSIS OF CONFIDENCE INTERVALS FOR LARGE CLIENT/SERVER COMPUTER NETWORKS
R&RATA # Vol.) 8, March FURTHER AALYSIS OF COFIDECE ITERVALS FOR LARGE CLIET/SERVER COMPUTER ETWORKS Vyacheslav Abramov School of Mahemacal Scences, Monash Unversy, Buldng 8, Level 4, Clayon Campus, Wellngon
More informationSolution in semi infinite diffusion couples (error function analysis)
Soluon n sem nfne dffuson couples (error funcon analyss) Le us consder now he sem nfne dffuson couple of wo blocks wh concenraon of and I means ha, n a A- bnary sysem, s bondng beween wo blocks made of
More informationGENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS. Youngwoo Ahn and Kitae Kim
Korean J. Mah. 19 (2011), No. 3, pp. 263 272 GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS Youngwoo Ahn and Kae Km Absrac. In he paper [1], an explc correspondence beween ceran
More informationAn introduction to Support Vector Machine
An nroducon o Suppor Vecor Machne 報告者 : 黃立德 References: Smon Haykn, "Neural Neworks: a comprehensve foundaon, second edon, 999, Chaper 2,6 Nello Chrsann, John Shawe-Tayer, An Inroducon o Suppor Vecor Machnes,
More informationClustering (Bishop ch 9)
Cluserng (Bshop ch 9) Reference: Daa Mnng by Margare Dunham (a slde source) 1 Cluserng Cluserng s unsupervsed learnng, here are no class labels Wan o fnd groups of smlar nsances Ofen use a dsance measure
More informationIntroduction to Boosting
Inroducon o Boosng Cynha Rudn PACM, Prnceon Unversy Advsors Ingrd Daubeches and Rober Schapre Say you have a daabase of news arcles, +, +, -, -, +, +, -, -, +, +, -, -, +, +, -, + where arcles are labeled
More informationCS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 4
CS434a/54a: Paern Recognon Prof. Olga Veksler Lecure 4 Oulne Normal Random Varable Properes Dscrmnan funcons Why Normal Random Varables? Analycally racable Works well when observaon comes form a corruped
More informationCHAPTER 10: LINEAR DISCRIMINATION
CHAPER : LINEAR DISCRIMINAION Dscrmnan-based Classfcaon 3 In classfcaon h K classes (C,C,, C k ) We defned dscrmnan funcon g j (), j=,,,k hen gven an es eample, e chose (predced) s class label as C f g
More informationECE 366 Honors Section Fall 2009 Project Description
ECE 366 Honors Secon Fall 2009 Projec Descrpon Inroducon: Muscal genres are caegorcal labels creaed by humans o characerze dfferen ypes of musc. A muscal genre s characerzed by he common characerscs shared
More informationCubic Bezier Homotopy Function for Solving Exponential Equations
Penerb Journal of Advanced Research n Compung and Applcaons ISSN (onlne: 46-97 Vol. 4, No.. Pages -8, 6 omoopy Funcon for Solvng Eponenal Equaons S. S. Raml *,,. Mohamad Nor,a, N. S. Saharzan,b and M.
More informationRobust and Accurate Cancer Classification with Gene Expression Profiling
Robus and Accurae Cancer Classfcaon wh Gene Expresson Proflng (Compuaonal ysems Bology, 2005) Auhor: Hafeng L, Keshu Zhang, ao Jang Oulne Background LDA (lnear dscrmnan analyss) and small sample sze problem
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
Ths documen s downloaded from DR-NTU, Nanyang Technologcal Unversy Lbrary, Sngapore. Tle A smplfed verb machng algorhm for word paron n vsual speech processng( Acceped verson ) Auhor(s) Foo, Say We; Yong,
More informationDepartment of Economics University of Toronto
Deparmen of Economcs Unversy of Torono ECO408F M.A. Economercs Lecure Noes on Heeroskedascy Heeroskedascy o Ths lecure nvolves lookng a modfcaons we need o make o deal wh he regresson model when some of
More informationOn One Analytic Method of. Constructing Program Controls
Appled Mahemacal Scences, Vol. 9, 05, no. 8, 409-407 HIKARI Ld, www.m-hkar.com hp://dx.do.org/0.988/ams.05.54349 On One Analyc Mehod of Consrucng Program Conrols A. N. Kvko, S. V. Chsyakov and Yu. E. Balyna
More informationTHE PREDICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS
THE PREICTION OF COMPETITIVE ENVIRONMENT IN BUSINESS INTROUCTION The wo dmensonal paral dfferenal equaons of second order can be used for he smulaon of compeve envronmen n busness The arcle presens he
More informationEcon107 Applied Econometrics Topic 5: Specification: Choosing Independent Variables (Studenmund, Chapter 6)
Econ7 Appled Economercs Topc 5: Specfcaon: Choosng Independen Varables (Sudenmund, Chaper 6 Specfcaon errors ha we wll deal wh: wrong ndependen varable; wrong funconal form. Ths lecure deals wh wrong ndependen
More informationAdvanced Machine Learning & Perception
Advanced Machne Learnng & Percepon Insrucor: Tony Jebara SVM Feaure & Kernel Selecon SVM Eensons Feaure Selecon (Flerng and Wrappng) SVM Feaure Selecon SVM Kernel Selecon SVM Eensons Classfcaon Feaure/Kernel
More informationLearning Objectives. Self Organization Map. Hamming Distance(1/5) Introduction. Hamming Distance(3/5) Hamming Distance(2/5) 15/04/2015
/4/ Learnng Objecves Self Organzaon Map Learnng whou Exaples. Inroducon. MAXNET 3. Cluserng 4. Feaure Map. Self-organzng Feaure Map 6. Concluson 38 Inroducon. Learnng whou exaples. Daa are npu o he syse
More informationDetection of Waving Hands from Images Using Time Series of Intensity Values
Deecon of Wavng Hands from Images Usng Tme eres of Inensy Values Koa IRIE, Kazunor UMEDA Chuo Unversy, Tokyo, Japan re@sensor.mech.chuo-u.ac.jp, umeda@mech.chuo-u.ac.jp Absrac Ths paper proposes a mehod
More informationComputing Relevance, Similarity: The Vector Space Model
Compung Relevance, Smlary: The Vecor Space Model Based on Larson and Hears s sldes a UC-Bereley hp://.sms.bereley.edu/courses/s0/f00/ aabase Managemen Sysems, R. Ramarshnan ocumen Vecors v ocumens are
More informationA Novel Object Detection Method Using Gaussian Mixture Codebook Model of RGB-D Information
A Novel Objec Deecon Mehod Usng Gaussan Mxure Codebook Model of RGB-D Informaon Lujang LIU 1, Gaopeng ZHAO *,1, Yumng BO 1 1 School of Auomaon, Nanjng Unversy of Scence and Technology, Nanjng, Jangsu 10094,
More informationHEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD
Journal of Appled Mahemacs and Compuaonal Mechancs 3, (), 45-5 HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Sansław Kukla, Urszula Sedlecka Insue of Mahemacs,
More informationIn the complete model, these slopes are ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL. (! i+1 -! i ) + [(!") i+1,q - [(!
ANALYSIS OF VARIANCE FOR THE COMPLETE TWO-WAY MODEL The frs hng o es n wo-way ANOVA: Is here neracon? "No neracon" means: The man effecs model would f. Ths n urn means: In he neracon plo (wh A on he horzonal
More informationLecture 11 SVM cont
Lecure SVM con. 0 008 Wha we have done so far We have esalshed ha we wan o fnd a lnear decson oundary whose margn s he larges We know how o measure he margn of a lnear decson oundary Tha s: he mnmum geomerc
More informationAttribute Reduction Algorithm Based on Discernibility Matrix with Algebraic Method GAO Jing1,a, Ma Hui1, Han Zhidong2,b
Inernaonal Indusral Informacs and Compuer Engneerng Conference (IIICEC 05) Arbue educon Algorhm Based on Dscernbly Marx wh Algebrac Mehod GAO Jng,a, Ma Hu, Han Zhdong,b Informaon School, Capal Unversy
More informationLinear Response Theory: The connection between QFT and experiments
Phys540.nb 39 3 Lnear Response Theory: The connecon beween QFT and expermens 3.1. Basc conceps and deas Q: ow do we measure he conducvy of a meal? A: we frs nroduce a weak elecrc feld E, and hen measure
More informationChapter Lagrangian Interpolation
Chaper 5.4 agrangan Inerpolaon Afer readng hs chaper you should be able o:. dere agrangan mehod of nerpolaon. sole problems usng agrangan mehod of nerpolaon and. use agrangan nerpolans o fnd deraes and
More informationChapter 6: AC Circuits
Chaper 6: AC Crcus Chaper 6: Oulne Phasors and he AC Seady Sae AC Crcus A sable, lnear crcu operang n he seady sae wh snusodal excaon (.e., snusodal seady sae. Complee response forced response naural response.
More informationOutline. Probabilistic Model Learning. Probabilistic Model Learning. Probabilistic Model for Time-series Data: Hidden Markov Model
Probablsc Model for Tme-seres Daa: Hdden Markov Model Hrosh Mamsuka Bonformacs Cener Kyoo Unversy Oulne Three Problems for probablsc models n machne learnng. Compung lkelhood 2. Learnng 3. Parsng (predcon
More informationRobustness Experiments with Two Variance Components
Naonal Insue of Sandards and Technology (NIST) Informaon Technology Laboraory (ITL) Sascal Engneerng Dvson (SED) Robusness Expermens wh Two Varance Componens by Ana Ivelsse Avlés avles@ns.gov Conference
More information( ) [ ] MAP Decision Rule
Announcemens Bayes Decson Theory wh Normal Dsrbuons HW0 due oday HW o be assgned soon Proec descrpon posed Bomercs CSE 90 Lecure 4 CSE90, Sprng 04 CSE90, Sprng 04 Key Probables 4 ω class label X feaure
More informationApproximate Analytic Solution of (2+1) - Dimensional Zakharov-Kuznetsov(Zk) Equations Using Homotopy
Arcle Inernaonal Journal of Modern Mahemacal Scences, 4, (): - Inernaonal Journal of Modern Mahemacal Scences Journal homepage: www.modernscenfcpress.com/journals/jmms.aspx ISSN: 66-86X Florda, USA Approxmae
More informationHidden Markov Models
11-755 Machne Learnng for Sgnal Processng Hdden Markov Models Class 15. 12 Oc 2010 1 Admnsrva HW2 due Tuesday Is everyone on he projecs page? Where are your projec proposals? 2 Recap: Wha s an HMM Probablsc
More informationFault Diagnosis in Industrial Processes Using Principal Component Analysis and Hidden Markov Model
Faul Dagnoss n Indusral Processes Usng Prncpal Componen Analyss and Hdden Markov Model Shaoyuan Zhou, Janmng Zhang, and Shuqng Wang Absrac An approach combnng hdden Markov model (HMM) wh prncpal componen
More informationWiH Wei He
Sysem Idenfcaon of onlnear Sae-Space Space Baery odels WH We He wehe@calce.umd.edu Advsor: Dr. Chaochao Chen Deparmen of echancal Engneerng Unversy of aryland, College Par 1 Unversy of aryland Bacground
More informationAlgorithm Research on Moving Object Detection of Surveillance Video Sequence *
Opcs and Phooncs Journal 03 3 308-3 do:0.436/opj.03.3b07 Publshed Onlne June 03 (hp://www.scrp.org/journal/opj) Algorhm Research on Movng Objec Deecon of Survellance Vdeo Sequence * Kuhe Yang Zhmng Ca
More informationDEEP UNFOLDING FOR MULTICHANNEL SOURCE SEPARATION SUPPLEMENTARY MATERIAL
DEEP UNFOLDING FOR MULTICHANNEL SOURCE SEPARATION SUPPLEMENTARY MATERIAL Sco Wsdom, John Hershey 2, Jonahan Le Roux 2, and Shnj Waanabe 2 Deparmen o Elecrcal Engneerng, Unversy o Washngon, Seale, WA, USA
More informationAppendix H: Rarefaction and extrapolation of Hill numbers for incidence data
Anne Chao Ncholas J Goell C seh lzabeh L ander K Ma Rober K Colwell and Aaron M llson 03 Rarefacon and erapolaon wh ll numbers: a framewor for samplng and esmaon n speces dversy sudes cology Monographs
More informationChapter 4. Neural Networks Based on Competition
Chaper 4. Neural Neworks Based on Compeon Compeon s mporan for NN Compeon beween neurons has been observed n bologcal nerve sysems Compeon s mporan n solvng many problems To classfy an npu paern _1 no
More informationImproved Classification Based on Predictive Association Rules
Proceedngs of he 009 IEEE Inernaonal Conference on Sysems, Man, and Cybernecs San Anono, TX, USA - Ocober 009 Improved Classfcaon Based on Predcve Assocaon Rules Zhxn Hao, Xuan Wang, Ln Yao, Yaoyun Zhang
More informationOff line signatures Recognition System using Discrete Cosine Transform and VQ/HMM
Ausralan Journal of Basc and Appled Scences, 6(12): 423-428, 2012 ISSN 1991-8178 Off lne sgnaures Recognon Sysem usng Dscree Cosne Transform and VQ/HMM 1 Behrouz Vasegh, 2 Somayeh Hashem, 1,2 Deparmen
More information[ ] 2. [ ]3 + (Δx i + Δx i 1 ) / 2. Δx i-1 Δx i Δx i+1. TPG4160 Reservoir Simulation 2018 Lecture note 3. page 1 of 5
TPG460 Reservor Smulaon 08 page of 5 DISCRETIZATIO OF THE FOW EQUATIOS As we already have seen, fne dfference appromaons of he paral dervaves appearng n he flow equaons may be obaned from Taylor seres
More informationEfficient Asynchronous Channel Hopping Design for Cognitive Radio Networks
Effcen Asynchronous Channel Hoppng Desgn for Cognve Rado Neworks Chh-Mn Chao, Chen-Yu Hsu, and Yun-ng Lng Absrac In a cognve rado nework (CRN), a necessary condon for nodes o communcae wh each oher s ha
More information5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)
5h Inernaonal onference on Advanced Desgn and Manufacurng Engneerng (IADME 5 The Falure Rae Expermenal Sudy of Specal N Machne Tool hunshan He, a, *, La Pan,b and Bng Hu 3,c,,3 ollege of Mechancal and
More informationExistence and Uniqueness Results for Random Impulsive Integro-Differential Equation
Global Journal of Pure and Appled Mahemacs. ISSN 973-768 Volume 4, Number 6 (8), pp. 89-87 Research Inda Publcaons hp://www.rpublcaon.com Exsence and Unqueness Resuls for Random Impulsve Inegro-Dfferenal
More informationFI 3103 Quantum Physics
/9/4 FI 33 Quanum Physcs Aleander A. Iskandar Physcs of Magnesm and Phooncs Research Grou Insu Teknolog Bandung Basc Conces n Quanum Physcs Probably and Eecaon Value Hesenberg Uncerany Prncle Wave Funcon
More informatione-journal Reliability: Theory& Applications No 2 (Vol.2) Vyacheslav Abramov
June 7 e-ournal Relably: Theory& Applcaons No (Vol. CONFIDENCE INTERVALS ASSOCIATED WITH PERFORMANCE ANALYSIS OF SYMMETRIC LARGE CLOSED CLIENT/SERVER COMPUTER NETWORKS Absrac Vyacheslav Abramov School
More informationIntroduction ( Week 1-2) Course introduction A brief introduction to molecular biology A brief introduction to sequence comparison Part I: Algorithms
Course organzaon Inroducon Wee -2) Course nroducon A bref nroducon o molecular bology A bref nroducon o sequence comparson Par I: Algorhms for Sequence Analyss Wee 3-8) Chaper -3, Models and heores» Probably
More informationFall 2010 Graduate Course on Dynamic Learning
Fall 200 Graduae Course on Dynamc Learnng Chaper 4: Parcle Flers Sepember 27, 200 Byoung-Tak Zhang School of Compuer Scence and Engneerng & Cognve Scence and Bran Scence Programs Seoul aonal Unversy hp://b.snu.ac.kr/~bzhang/
More informationConstrained-Storage Variable-Branch Neural Tree for. Classification
Consraned-Sorage Varable-Branch Neural Tree for Classfcaon Shueng-Ben Yang Deparmen of Dgal Conen of Applcaon and Managemen Wenzao Ursulne Unversy of Languages 900 Mnsu s oad Kaohsng 807, Tawan. Tel :
More informationHidden Markov Models Following a lecture by Andrew W. Moore Carnegie Mellon University
Hdden Markov Models Followng a lecure by Andrew W. Moore Carnege Mellon Unversy www.cs.cmu.edu/~awm/uorals A Markov Sysem Has N saes, called s, s 2.. s N s 2 There are dscree meseps, 0,, s s 3 N 3 0 Hdden
More informationPerformance Analysis for a Network having Standby Redundant Unit with Waiting in Repair
TECHNI Inernaonal Journal of Compung Scence Communcaon Technologes VOL.5 NO. July 22 (ISSN 974-3375 erformance nalyss for a Nework havng Sby edundan Un wh ang n epar Jendra Sngh 2 abns orwal 2 Deparmen
More informationJohn Geweke a and Gianni Amisano b a Departments of Economics and Statistics, University of Iowa, USA b European Central Bank, Frankfurt, Germany
Herarchcal Markov Normal Mxure models wh Applcaons o Fnancal Asse Reurns Appendx: Proofs of Theorems and Condonal Poseror Dsrbuons John Geweke a and Gann Amsano b a Deparmens of Economcs and Sascs, Unversy
More informationTools for Analysis of Accelerated Life and Degradation Test Data
Acceleraed Sress Tesng and Relably Tools for Analyss of Acceleraed Lfe and Degradaon Tes Daa Presened by: Reuel Smh Unversy of Maryland College Park smhrc@umd.edu Sepember-5-6 Sepember 28-30 206, Pensacola
More informationPattern Classification (III) & Pattern Verification
Preare by Prof. Hu Jang CSE638 --4 CSE638 3. Seech & Language Processng o.5 Paern Classfcaon III & Paern Verfcaon Prof. Hu Jang Dearmen of Comuer Scence an Engneerng York Unversy Moel Parameer Esmaon Maxmum
More informationVideo-Based Face Recognition Using Adaptive Hidden Markov Models
Vdeo-Based Face Recognon Usng Adapve Hdden Markov Models Xaomng Lu and suhan Chen Elecrcal and Compuer Engneerng, Carnege Mellon Unversy, Psburgh, PA, 523, U.S.A. xaomng@andrew.cmu.edu suhan@cmu.edu Absrac
More informationFTCS Solution to the Heat Equation
FTCS Soluon o he Hea Equaon ME 448/548 Noes Gerald Reckenwald Porland Sae Unversy Deparmen of Mechancal Engneerng gerry@pdxedu ME 448/548: FTCS Soluon o he Hea Equaon Overvew Use he forward fne d erence
More informationMath 128b Project. Jude Yuen
Mah 8b Proec Jude Yuen . Inroducon Le { Z } be a sequence of observed ndependen vecor varables. If he elemens of Z have a on normal dsrbuon hen { Z } has a mean vecor Z and a varancecovarance marx z. Geomercally
More informationMCs Detection Approach Using Bagging and Boosting Based Twin Support Vector Machine
Proceedngs of he 009 IEEE Inernaonal Conference on Sysems, Man, and Cybernecs San Anono, TX, USA - Ocober 009 MCs Deecon Approach Usng Baggng and Boosng Based Twn Suppor Vecor Machne Xnsheng Zhang School
More informationLi An-Ping. Beijing , P.R.China
A New Type of Cpher: DICING_csb L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Absrac: In hs paper, we wll propose a new ype of cpher named DICING_csb, whch s derved from our prevous sream cpher DICING.
More informationOrdinary Differential Equations in Neuroscience with Matlab examples. Aim 1- Gain understanding of how to set up and solve ODE s
Ordnary Dfferenal Equaons n Neuroscence wh Malab eamples. Am - Gan undersandng of how o se up and solve ODE s Am Undersand how o se up an solve a smple eample of he Hebb rule n D Our goal a end of class
More informationMachine Learning 2nd Edition
INTRODUCTION TO Lecure Sldes for Machne Learnng nd Edon ETHEM ALPAYDIN, modfed by Leonardo Bobadlla and some pars from hp://www.cs.au.ac.l/~aparzn/machnelearnng/ The MIT Press, 00 alpaydn@boun.edu.r hp://www.cmpe.boun.edu.r/~ehem/mle
More informationComparison of Differences between Power Means 1
In. Journal of Mah. Analyss, Vol. 7, 203, no., 5-55 Comparson of Dfferences beween Power Means Chang-An Tan, Guanghua Sh and Fe Zuo College of Mahemacs and Informaon Scence Henan Normal Unversy, 453007,
More informationObject Tracking Based on Visual Attention Model and Particle Filter
Inernaonal Journal of Informaon Technology Vol. No. 9 25 Objec Trackng Based on Vsual Aenon Model and Parcle Fler Long-Fe Zhang, Yuan-Da Cao 2, Mng-Je Zhang 3, Y-Zhuo Wang 4 School of Compuer Scence and
More informationAn Integrated and Interactive Video Retrieval Framework with Hierarchical Learning Models and Semantic Clustering Strategy
An Inegraed and Ineracve Vdeo Rereval Framewor wh Herarchcal Learnng Models and Semanc Cluserng Sraegy Na Zhao, Shu-Chng Chen, Me-Lng Shyu 2, Suar H. Rubn 3 Dsrbued Mulmeda Informaon Sysem Laboraory School
More informationSOME NOISELESS CODING THEOREMS OF INACCURACY MEASURE OF ORDER α AND TYPE β
SARAJEVO JOURNAL OF MATHEMATICS Vol.3 (15) (2007), 137 143 SOME NOISELESS CODING THEOREMS OF INACCURACY MEASURE OF ORDER α AND TYPE β M. A. K. BAIG AND RAYEES AHMAD DAR Absrac. In hs paper, we propose
More information( ) () we define the interaction representation by the unitary transformation () = ()
Hgher Order Perurbaon Theory Mchael Fowler 3/7/6 The neracon Represenaon Recall ha n he frs par of hs course sequence, we dscussed he chrödnger and Hesenberg represenaons of quanum mechancs here n he chrödnger
More informationGraduate Macroeconomics 2 Problem set 5. - Solutions
Graduae Macroeconomcs 2 Problem se. - Soluons Queson 1 To answer hs queson we need he frms frs order condons and he equaon ha deermnes he number of frms n equlbrum. The frms frs order condons are: F K
More informationAuthentication Management for Information System Security Based on Iris Recognition
Journal of Advanced Managemen Scence, Vol 1, No 1, March 2013 Auhencaon Managemen for Informaon Sysem Secury Based on Irs Recognon Yao-Hong Tsa Deparmen of Informaon Managemen, Hsuan Chung Unversy, Hsnchu
More informationAnisotropic Behaviors and Its Application on Sheet Metal Stamping Processes
Ansoropc Behavors and Is Applcaon on Shee Meal Sampng Processes Welong Hu ETA-Engneerng Technology Assocaes, Inc. 33 E. Maple oad, Sue 00 Troy, MI 48083 USA 48-79-300 whu@ea.com Jeanne He ETA-Engneerng
More informationTheoretical Analysis of Biogeography Based Optimization Aijun ZHU1,2,3 a, Cong HU1,3, Chuanpei XU1,3, Zhi Li1,3
6h Inernaonal Conference on Machnery, Maerals, Envronmen, Boechnology and Compuer (MMEBC 6) Theorecal Analyss of Bogeography Based Opmzaon Aun ZU,,3 a, Cong U,3, Chuanpe XU,3, Zh L,3 School of Elecronc
More informationSingle-loop System Reliability-Based Design & Topology Optimization (SRBDO/SRBTO): A Matrix-based System Reliability (MSR) Method
10 h US Naonal Congress on Compuaonal Mechancs Columbus, Oho 16-19, 2009 Sngle-loop Sysem Relably-Based Desgn & Topology Opmzaon (SRBDO/SRBTO): A Marx-based Sysem Relably (MSR) Mehod Tam Nguyen, Junho
More informationUNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 2017 EXAMINATION
INTERNATIONAL TRADE T. J. KEHOE UNIVERSITAT AUTÒNOMA DE BARCELONA MARCH 27 EXAMINATION Please answer wo of he hree quesons. You can consul class noes, workng papers, and arcles whle you are workng on he
More informationAnomaly Detection. Lecture Notes for Chapter 9. Introduction to Data Mining, 2 nd Edition by Tan, Steinbach, Karpatne, Kumar
Anomaly eecon Lecure Noes for Chaper 9 Inroducon o aa Mnng, 2 nd Edon by Tan, Senbach, Karpane, Kumar 2/14/18 Inroducon o aa Mnng, 2nd Edon 1 Anomaly/Ouler eecon Wha are anomales/oulers? The se of daa
More informationNew M-Estimator Objective Function. in Simultaneous Equations Model. (A Comparative Study)
Inernaonal Mahemacal Forum, Vol. 8, 3, no., 7 - HIKARI Ld, www.m-hkar.com hp://dx.do.org/.988/mf.3.3488 New M-Esmaor Objecve Funcon n Smulaneous Equaons Model (A Comparave Sudy) Ahmed H. Youssef Professor
More informationFace Detector with Oriented Multiple Templates
Face Deecor wh Orened Mulple Templaes Yea-Shuan Huang We-Cheng Lu Absrac Ths paper proposes a novel ace deecon algorhm whch exracs a local mage srucure (LIS) eaure and adops a boosng approach o consruc
More informationLecture 2 L n i e n a e r a M od o e d l e s
Lecure Lnear Models Las lecure You have learned abou ha s machne learnng Supervsed learnng Unsupervsed learnng Renforcemen learnng You have seen an eample learnng problem and he general process ha one
More informationDetecting Emerging Trends from Scientific Corpora
hp://www.as.ac.p/sss/ Inernaonal Journal of Knowledge and Sysems Scences Vol. 2, No. 2, June 2005 Deecng Emergng Trends from Scenfc Corpora Mnh-Hoang Le, Tu-Bao Ho, Yosheru Naamor School of Knowledge Scence,
More informationJ i-1 i. J i i+1. Numerical integration of the diffusion equation (I) Finite difference method. Spatial Discretization. Internal nodes.
umercal negraon of he dffuson equaon (I) Fne dfference mehod. Spaal screaon. Inernal nodes. R L V For hermal conducon le s dscree he spaal doman no small fne spans, =,,: Balance of parcles for an nernal
More informationScattering at an Interface: Oblique Incidence
Course Insrucor Dr. Raymond C. Rumpf Offce: A 337 Phone: (915) 747 6958 E Mal: rcrumpf@uep.edu EE 4347 Appled Elecromagnecs Topc 3g Scaerng a an Inerface: Oblque Incdence Scaerng These Oblque noes may
More informationMachine Learning Linear Regression
Machne Learnng Lnear Regresson Lesson 3 Lnear Regresson Bascs of Regresson Leas Squares esmaon Polynomal Regresson Bass funcons Regresson model Regularzed Regresson Sascal Regresson Mamum Lkelhood (ML)
More informationCS286.2 Lecture 14: Quantum de Finetti Theorems II
CS286.2 Lecure 14: Quanum de Fne Theorems II Scrbe: Mara Okounkova 1 Saemen of he heorem Recall he las saemen of he quanum de Fne heorem from he prevous lecure. Theorem 1 Quanum de Fne). Le ρ Dens C 2
More informationNational Exams December 2015 NOTES: 04-BS-13, Biology. 3 hours duration
Naonal Exams December 205 04-BS-3 Bology 3 hours duraon NOTES: f doub exss as o he nerpreaon of any queson he canddae s urged o subm wh he answer paper a clear saemen of any assumpons made 2 Ths s a CLOSED
More informationTesting a new idea to solve the P = NP problem with mathematical induction
Tesng a new dea o solve he P = NP problem wh mahemacal nducon Bacground P and NP are wo classes (ses) of languages n Compuer Scence An open problem s wheher P = NP Ths paper ess a new dea o compare he
More information/99 $10.00 (c) 1999 IEEE
Recognzng Hand Gesure Usng Moon Trajecores Mng-Hsuan Yang and Narendra Ahuja Deparmen of Compuer Scence and Beckman Insue Unversy of Illnos a Urbana-Champagn, Urbana, IL 611 fmhyang,ahujag@vson.a.uuc.edu
More informationExtracting Duration Facts in Qualitative Simulation using Comparison Calculus
Exracng Duraon Facs n Qualave Smulaon usng Comparson Calculus Tolga Könk 1 and A. C. Cem Say 2 1: konk@umch.edu Compuer Scence and Engneerng ATL., Unv. Mchgan, 1101 Beal Ave., Ann Arbor, 48105-2106 MI,
More informationTime-interval analysis of β decay. V. Horvat and J. C. Hardy
Tme-nerval analyss of β decay V. Horva and J. C. Hardy Work on he even analyss of β decay [1] connued and resuled n he developmen of a novel mehod of bea-decay me-nerval analyss ha produces hghly accurae
More informationdoi: info:doi/ /
do: nfo:do/0.063/.322393 nernaonal Conference on Power Conrol and Opmzaon, Bal, ndonesa, -3, June 2009 A COLOR FEATURES-BASED METHOD FOR OBJECT TRACKNG EMPLOYNG A PARTCLE FLTER ALGORTHM Bud Sugand, Hyoungseop
More informationFiltrage particulaire et suivi multi-pistes Carine Hue Jean-Pierre Le Cadre and Patrick Pérez
Chaînes de Markov cachées e flrage parculare 2-22 anver 2002 Flrage parculare e suv mul-pses Carne Hue Jean-Perre Le Cadre and Parck Pérez Conex Applcaons: Sgnal processng: arge rackng bearngs-onl rackng
More informationPhone Recognition on TIMIT Database Using Mel-Frequency Cepstral Coefficients and Support Vector Machine Classifier
IJISET - Inernaonal Journal of Innovave Scence, Engneerng & Technology, Vol. Issue, January 05. www.jse.com Phone Recognon on TIMIT Daabase Usng Mel-Frequency Cepsral Coeffcens and Suppor Vecor Machne
More informationTrack Properities of Normal Chain
In. J. Conemp. Mah. Scences, Vol. 8, 213, no. 4, 163-171 HIKARI Ld, www.m-har.com rac Propes of Normal Chan L Chen School of Mahemacs and Sascs, Zhengzhou Normal Unversy Zhengzhou Cy, Hennan Provnce, 4544,
More informationThe Analysis of the Thickness-predictive Model Based on the SVM Xiu-ming Zhao1,a,Yan Wang2,band Zhimin Bi3,c
h Naonal Conference on Elecrcal, Elecroncs and Compuer Engneerng (NCEECE The Analyss of he Thcknesspredcve Model Based on he SVM Xumng Zhao,a,Yan Wang,band Zhmn B,c School of Conrol Scence and Engneerng,
More informationNormal Random Variable and its discriminant functions
Noral Rando Varable and s dscrnan funcons Oulne Noral Rando Varable Properes Dscrnan funcons Why Noral Rando Varables? Analycally racable Works well when observaon coes for a corruped snle prooype 3 The
More informationAN OVERTRAINING-RESISTANT STOCHASTIC MODELING METHOD FOR PATTERN RECOGNITION. BY E. M. KLEINBERG State University of New York, Buffalo
The Annals of Sascs 1996, Vol. 24, No. 6, 2319 2349 AN OVERTRAINING-RESISTANT STOCHASTIC MODELING METHOD FOR PATTERN RECOGNITION BY E. M. KLEINBERG Sae Unversy of New York, Buffalo We wll nroduce a generc
More informationRobustness of DEWMA versus EWMA Control Charts to Non-Normal Processes
Journal of Modern Appled Sascal Mehods Volume Issue Arcle 8 5--3 Robusness of D versus Conrol Chars o Non- Processes Saad Saeed Alkahan Performance Measuremen Cener of Governmen Agences, Insue of Publc
More informationCS 268: Packet Scheduling
Pace Schedulng Decde when and wha pace o send on oupu ln - Usually mplemened a oupu nerface CS 68: Pace Schedulng flow Ion Soca March 9, 004 Classfer flow flow n Buffer managemen Scheduler soca@cs.bereley.edu
More informationTSS = SST + SSE An orthogonal partition of the total SS
ANOVA: Topc 4. Orhogonal conrass [ST&D p. 183] H 0 : µ 1 = µ =... = µ H 1 : The mean of a leas one reamen group s dfferen To es hs hypohess, a basc ANOVA allocaes he varaon among reamen means (SST) equally
More information