A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia Abstract? We focus on measuring relationships between pairs of objects in Wikipedia whose pages can be regarded as individual objects. Two kinds of relationships between two objects exist: in Wikipedia, an explicit relationship is represented by a single link between the two pages for…
A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION Abstract?A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION. Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of…
A Hyper-Heuristic Scheduling Algorithm for Cloud Abstract?A Hyper-Heuristic Scheduling Algorithm for Cloud. Rule-based scheduling algorithms have been widely used on many cloud computing systems because they are simple and easy to implement. However, there is plenty of room to improve the performance of these algorithms, especially by using heuristic scheduling. As such, this paper presents…
A Load Balancing and Multi-tenancy Oriented Data Center Virtualization Framework Abstract– Virtualization is an essential step before a baremetal data center being ready for commercial usage, because it bridges the foreground interface for cloud tenants and the background resource management on underlying infrastructures. A concept at the heart of the foreground is multi-tenancy, which deals…
< Final Year Project > A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay Abstract? Quantifying the end-to-end delay performance in multihop wireless networks is a well-known challenging problem. In this paper, we propose a new joint congestion control and scheduling algorithm for multihop wireless networks with fixed-route flows…
A Methodology for Direct and Indirect Discrimination Prevention in Data Mining Abstract? Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the…
A Multilevel Index Model to Expedite Web Service Discovery and Composition in Large-Scale Service Repositories Abstract? The number of Web services has grown drastically. Then how to manage them efficiently in a service repository is an important issue to address. Given a special field, there often exists an efficient data structure for a class of…
A New Algorithm for Inferring User Search Goals with Feedback Sessions Abstract? A New Algorithm for Inferring User Search Goals with Feedback Sessions. For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very…
A Novel Data Mining Approach for Soil Classification Abstract? Decision tree is a well known approach for classification in data mining. C4.5 and Classification and Regression Trees (CART) are two widelv used decision tree algorithms for classification. The main? drawback of C4.5 algorithm is that, it is biased towards attributes with more values while CART…
A Novel Data-Mining Approach Leveraging Social Media to Monitor Consumer Opinion of Sitagliptin Abstract? A Novel Data-Mining Approach Leveraging Social Media to Monitor Consumer Opinion of Sitagliptin. A novel data mining method was developed to gauge the experience of the drug Sitagliptin trade name Januvia by patients with diabetes mellitus type 2. < Final Year...
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Abstract– As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage servers are not fully trustworthy, data…
A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm Abstract?AbstractIn power system, minimizing the power loss in the transmission lines and/or minimizing the voltage deviation at the load buses by controlling the reactive power is referred as optimal reactive power dispatch (ORPD). This paper presents…