Disclosing climate change patterns using an adaptive Markov chain pattern detection method Abstract?proposes an adaptive Markov chain pattern detection (AMCPD) method for disclosing the climate change patterns of Singapore through meteorological data mining. Meteorological variables, including daily mean temperature, mean dew point temperature, mean visibility, mean wind speed, maximum sustained wind speed, maximum temperature…
Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis Abstract?An expert selection system that learns online the best expert to assign to each patient depending on the context of the patient. In general, the context can include an enormous number and variety of information related to the patient’s health condition, age, gender, previous drug doses,…
Discovering Binding Cores in Protein-DNA Binding Using Association Rule Mining with Statistical Measures Abstract? Understanding binding cores is of fundamental importance in deciphering Protein-DNA (TF-TFBS) binding and for the deep understanding of gene regulation. Traditionally, binding cores are identi?ed in resolved high-resolution 3D structures. However, it is expensive, labor-intensive and time-consuming to obtain these structures….
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Abstract? Discovering Emerging Topics in Social Streams via Link-Anomaly Detection. Detection of emerging topics is now receiving renewed interest motivated by the rapid growth of social networks. Conventional-term-frequency-based approaches may not be appropriate in this context, because the information exchanged in social-network posts include not only…
Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach Abstract? We propose a code-based discovery protocol for cellular device-to-device < Final Year Projects 2016 > D2D communications. To realize proximity based services such as mobile social networks and mobile marketing using D2D communications, each device should ?rst discover nearby devices, which…
Discovering the Top-kUnexplained Sequences in Time-Stamped Observation Data Abstract? Discovering the Top-kUnexplained Sequences in Time-Stamped Observation Data. There are numerous applications where we wish to discover unexpected activities in a sequence of time-stamped observation data-for instance, we may want to detect < Final Year Projects > inexplicable events in transactions at a website or in…
Discovery of Ranking Fraud for Mobile Apps Abstract?Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File…
Discovery of Ranking Fraud for Mobile Apps Abstract? Discovery of Ranking Fraud for Mobile Apps. Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App developers to use shady means,…
Disease Inference from Health-Related Questions via Sparse Deep Learning Abstract? Disease Inference from Health-Related Questions via Sparse Deep Learning. Automatic disease inference is of importance to bridge the gap between what online health seekers with unusual symptoms need and what busy human doctors with biased expertise can offer. However, accurately and efficiently inferring diseases is…
Distributed Byzantine fault Detection Technique in Wireless Sensor Networks based on Hypothesis Testing Abstract? Distributed fault detection in wireless sensor network is an important problem where every sensor node identi?es its own fault status based on the information from its neighboring sensor nodes. This paper presents a novel distributed fault detection algorithm to detect the…
Distributed Finite-Horizon Fusion Kalman Filtering for Bandwidth and Energy Constrained Wireless Sensor Networks Abstract?This paper is concerned with the distributed finite-horizon fusion Kalman filtering problem for a class of networked multi-sensor fusion systems (NMFSs) in a bandwidth and energy constrained wireless sensor network. To satisfy the finite communication bandwidth, only partial components of each local…
Distributed malware propagation in Mobile Adhoc NETwork Abstract?The openness of the Android operating system increased the number of applications developed, but it also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware using epidemiology theory and study the problem as a function of the underlying mobility models.< Final Year...