-
121
Network traffic classification using decision tree based on minimum partition distance
Published 2012-03-01“…Before data communications,every application protocol to handshake at application layer and transmit some parameters.This process is quite different according to the protocols,such as the packet direction,payload size and the information entropy of each packet payload.So according to these features,decision tree algorithm based on minimum partition distance was used to train the classifier.The results of the offline experiments on real network traces and the online classification experiments in campus network indicate that,analyzing the first four or six packets of each flow is enough to classify eight common used application protocols with high overall accuracy and low cost.Contrast to other machine learning algorithms,decision tree can achieve better ent traces and low classification time.So it is very suitable for real-time traffic classification.…”
Get full text
Article -
122
Investing in Private Equity in Brazil
Published 2016-01-01“…The proposed methodology is based on multi-criteria decision-making. Real data obtained from one of the largest pension funds in Brazil is used to illustrate a practical application of the methodology when selecting investments among eleven private equity funds available in the local financial market. …”
Get full text
Article -
123
BCP-based joint delegation learning model and protocol
Published 2021-05-01“…In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.…”
Get full text
Article -
124
-
125
Rethinking military command and control systems
Published 2025-01-01“…In the context of new multi-domain operational paradigms and accelerated technological progress, C2 adaptation involves the integration of emerging technologies such as artificial intelligence, automation and real-time response capabilities to optimize decision-making. …”
Get full text
Article -
126
Multilevel Constrained Bandits: A Hierarchical Upper Confidence Bound Approach with Safety Guarantees
Published 2025-01-01“…The multi-armed bandit (MAB) problem is a foundational model for sequential decision-making under uncertainty. While MAB has proven valuable in applications such as clinical trials and online advertising, traditional formulations have limitations; specifically, they struggle to handle three key real-world scenarios: (1) when decisions must follow a hierarchical structure (as in autonomous systems where high-level strategy guides low-level actions); (2) when there are constraints at multiple levels of decision-making (such as both system-wide and component-level resource limits); and (3) when available actions depend on previous choices or context. …”
Get full text
Article -
127
Optimization of multiple access in the energy harvesting wireless sensor network with delivery deadline constraint
Published 2022-09-01“…With the wide application of the energy harvesting wireless sensor network (WSN) in many real-time communication scenarios, such as environmental monitoring, industrial automation and battlefield surveillance, the multiple access of such WSN needs to take into account both the delivery deadline constraint of data packets and the energy harvesting dynamics of sensor nodes.Due to the inherent decoupling of interference, delivery urgency and remaining energy, the design and optimization of such multiple access are more challenging than that of traditional multiple access that only needs to take into account the packet traffic pattern.A centralized access scheme was designed with the access actions relying on the global knowledge of current delivery urgency and remaining energy.And then, to avoid the costly overhead in the centralized access, a decentralized access scheme was designed with the access probabilities merely relying on the local knowledge of delivery urgency and remaining energy.Under the objective of maximizing the network throughput, the centralized access schemes were formulated with complete and simplified knowledge as two Markov decision processes (MDPs), respectively, and the backward induction algorithm was used to obtain optimal centralized policies for these MDPs.Furthermore, the decentralized access was formulated with simplified knowledge as a decentralized MDP, and the Markov policy search was used to propose an ε-optimal decentralized policy.Simulations under a wide range of network configurations were provided to verify the effectiveness of the simplified modeling and demonstrate the performance advantage of the proposed polices.…”
Get full text
Article -
128
Offshoring Location Decision in Fuzzy Environment
Published 2024-06-01“…Offshoring location selection is a crucial decision for firms in terms of competitiveness, flexibility, productivity, and profitability. …”
Get full text
Article -
129
RETRACTED ARTICLE: Confidence level based complex polytopic fuzzy Einstein aggregation operators and their application to decision-making process
Published 2024-07-01“…Abstract A complex Polytopic fuzzy set (CPoFS) extends a Polytopic fuzzy set (PoFS) by handling vagueness with degrees that range from real numbers to complex numbers within the unit disc. …”
Get full text
Article -
130
Assessment of Teaching Quality of Traditional Decorative Patterns in Colleges and Universities Using an MCDM Approach and Circular Intuitionistic Information
Published 2025-01-01“…The superiority of this model lies in the fact that general structure, less time complexity, and prioritization of factors make it real. The suggested framework prioritizes decision criteria and manages ambiguity well, making it a reliable tool for assessing the quality of instruction. …”
Get full text
Article -
131
A convolutional autoencoder framework for ECG signal analysis
Published 2025-01-01“…The results show interesting results in automatic anomaly detection to support physicians in the decision process. The results show that the CAE-based framework is able to identify anomalies in ECG signals with a ROC AUC of 97.82% on simulated test set and a ROC AUC of 99.75% using a real test set. …”
Get full text
Article -
132
Implementation of Fuzzy Logic in the Monitoring and Controlling System for Temperature and pH of Fry Aquarium Water Betta Fish Based on the Internet of Things
Published 2025-01-01“…To overcome this problem, a system based on the Internet of Things was developed(IoT) which can monitor in real time and control the temperature and pH of the water in the Betta fish fry pond. …”
Get full text
Article -
133
A Voting-Based Star Identification Algorithm Using a Partitioned Star Catalog
Published 2025-01-01“…During star identification, a method based on a voting decision is employed for feature matching in the basic unit. …”
Get full text
Article -
134
A Data Fusion System for Simulation of Critical Scenarios and Decision-Making
Published 2019-11-01“… The decision-making (DM) process in critical environments is a complex process that can be simulated due to current telematic capabilities, which allow the real time interaction of large amounts of data. …”
Get full text
Article -
135
Research on the impact of enterprise digital transformation based on digital twin technology on renewable energy investment decisions
Published 2024-12-01“…Digital twin technology, as an emerging tool, enables real-time monitoring, prediction, and optimization by creating dynamic virtual models of real-world processes. …”
Get full text
Article -
136
Enterprise information system automatic fault diagnosis and analysis method based on decision tree
Published 2017-03-01“…The algorithm was verified, and the decision tree model and training method was simulated and analyzed comparatively under R language environment, using alarm data extracted from real operation data of a typical large-scale enterprise system. …”
Get full text
Article -
137
-
138
Assessing hazard prediction and risk calibration skills in experienced and novice e-scooter riders
Published 2025-02-01Get full text
Article -
139
Impact of Environmental Conditions on Renewable Energy Prediction: An Investigation Through Tree-Based Community Learning
Published 2025-01-01“…The real-time prediction of energy production is essential for effective energy management and planning. …”
Get full text
Article -
140
OSFS‐Vague: Online streaming feature selection algorithm based on vague set
Published 2024-12-01“…Its main idea is to combine uncertainty and three‐way decision theories to improve feature selection from the traditional dichotomous method to the trichotomous method. …”
Get full text
Article