Enhancing the effectiveness and interpretability of decision tree and rule Abstract? Enhancing the effectiveness and interpretability of decision tree and rule. The participation of wind farm-energy storage systems (WF-ESS) in electricity markets calls for an integrated view of day-ahead offering strategies and real-time operation policies. Such an integrated strategy is proposed here by co-optimizing offering…
Ensembles of -Trees for Imbalanced Classification Problems Abstract? Ensembles of -Trees for Imbalanced Classification Problems. This paper introduces two kinds of decision tree ensembles for imbalanced classification problems, extensively utilizing properties of ?-divergence. First, a novel splitting criterion based on ?-divergence is shown to generalize several well-known splitting criteria such as those used in C4.5…
Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing Abstract?Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing. Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing…
Ensuring Data Storage Security in Cloud Computing Abstract? Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of…
Enterprise resource Management Abstract? Enterprise resource Management. Holonic enterprises are considered as one of the new types of networking organizations used to increase business efficiency. In practice this requires to introduce a new type of management stimulating the ?interpreneurial? approach, < Final Year Projects > active interaction between actors to make coordinated and effective decisions…
Epidemic Attacks in Network-Coding Enabled Wireless Mesh Networks: Detection, Identification and Evaluation Abstract?Epidemic attack is a severe security problem in network-coding-enabled wireless mesh networks (WMNs). Malicious nodes can easily launch such form of attack to create an epidemic spreading of polluted packets and deplete network resources. The contribution of this work is to address such…
Error Detection in Majority Logic Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes. a method was proposed to accelerate the majority logic decoding of difference set low density parity check codes. This is useful as majority logic decoding can be implemented serially with simple hardware but requires a large decoding time. For memory…
Error Detection in Majority Logic Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Abstract? Error Detection in Majority Logic Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes. In a recent paper, a method was proposed to accelerate the majority logic decoding of difference set low density parity check codes. This is…
Error Rate Analysis of Cognitive Radio Transmissions with Imperfect Channel Sensing Abstract?This paper studies the symbol error rate performance of cognitive radio transmissions in the presence of imperfect sensing decisions. Two different transmission schemes, namely sensing-based spectrum sharing (SSS) and opportunistic spectrum access (OSA), are considered. In both schemes, secondary users first perform channel sensing,…
Error-Tolerant Resource Allocation And Payment Minimization For Cloud System Abstract?Error-Tolerant Resource Allocation And Payment Minimization For Cloud System. With virtual machine (VM) technology being increasingly mature, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand. We make three contributions in this paper: 1) We formulate a deadline-driven resource…
Estimation Based on Analysis of Mark & Calculating the Efficency through Graph Abstract? Estimation Based on Analysis of Mark & Calculating the Efficency through Graph. Content dissemination in social opportunistic networks has attracted great interests in the field. Most of the researches in literature focused on the data forwarding and routing mechanisms in such network…