A large-scale web QoS prediction scheme for the Industrial Internet of Things based on a kernel machine learning algorithm

2016 ◽  
Vol 101 ◽  
pp. 81-89 ◽  
Author(s):  
Xiong Luo ◽  
Ji Liu ◽  
Dandan Zhang ◽  
Xiaohui Chang
2019 ◽  
Vol 8 (07) ◽  
pp. 24680-24782
Author(s):  
Manisha Bagri ◽  
Neha Aggarwal

By 2020 around 25-50 billion devices are likely to be connected to the internet. Due to this new development, it gives rise to something called Internet of Things (IoT). The interconnected devices can generate and share data over a network. Machine Learning plays a key role in IoT to handle the vast amount of data. It gives IoT and devices a brain to think, which is often called as intelligence. The data can be feed to machines for learning patterns, based on training the machines can identify to predict for the future. This paper gives a brief explanation of IoT. This paper gives a crisp explanation of machine learning algorithm and its types. However, Support Vector Machine (SVM) is explained in details along with its merits and demerits. An algorithm is also proposed for weather prediction using SVM for IoT.


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3115 ◽  
Author(s):  
Yang Wei ◽  
Hao Wang ◽  
Kim Fung Tsang ◽  
Yucheng Liu ◽  
Chung Kit Wu ◽  
...  

Improperly grown trees may cause huge hazards to the environment and to humans, through e.g., climate change, soil erosion, etc. A proximity environmental feature-based tree health assessment (PTA) scheme is proposed to prevent these hazards by providing guidance for early warning methods of potential poor tree health. In PTA development, tree health is defined and evaluated based on proximity environmental features (PEFs). The PEF takes into consideration the seven surrounding ambient features that strongly impact tree health. The PEFs were measured by the deployed smart sensors surrounding trees. A database composed of tree health and relative PEFs was established for further analysis. An adaptive data identifying (ADI) algorithm is applied to exclude the influence of interference factors in the database. Finally, the radial basis function (RBF) neural network (NN), a machine leaning algorithm, has been identified as the appropriate tool with which to correlate tree health and PEFs to establish the PTA algorithm. One of the salient features of PTA is that the algorithm can evaluate, and thus monitor, tree health remotely and automatically from smart sensor data by taking advantage of the well-established internet of things (IoT) network and machine learning algorithm.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Jiaxuan Fei ◽  
Qigui Yao ◽  
Mingliang Chen ◽  
Xiangqun Wang ◽  
Jie Fan

The construction of power Internet of things is an important development direction for power grid enterprises. Although power Internet of things is a kind of network, it is denser than the ordinary Internet of things points and more complex equipment types, so it has higher requirements for network security protection. At the same time, due to the special information perception and transmission mode in the Internet of things, the information transmitted in the network is easy to be stolen and resold, and traditional security measures can no longer meet the security protection requirements of the new Internet of things devices. To solve the privacy leakage and security attack caused by the illegal intrusion in the network, this paper proposes to construct a device portrait for terminal devices in the power Internet of things and detect abnormal traffic in the network based on device portrait. By collecting traffic data in the network environment, various network traffic characteristics are extracted, and abnormal traffic is analyzed and identified by the machine learning algorithm. By collecting the traffic data in the network environment, the features are extracted from the physical layer, network layer, and application layer of the message, and the device portrait is generated by a machine learning algorithm. According to the established attack mode, the corresponding traffic characteristics are analyzed, and the detection of abnormal traffic is achieved by comparing the attack traffic characteristics with the device portrait. The experimental results show that the accuracy of this method is more than 90%.


2020 ◽  
Vol 142 (8) ◽  
pp. 3814-3822 ◽  
Author(s):  
George S. Fanourgakis ◽  
Konstantinos Gkagkas ◽  
Emmanuel Tylianakis ◽  
George E. Froudakis

2018 ◽  
Vol 07 (04) ◽  
pp. 164-173 ◽  
Author(s):  
Ian Campbell ◽  
Samantha Stover ◽  
Andres Hernandez-Garcia ◽  
Shalini Jhangiani ◽  
Jaya Punetha ◽  
...  

AbstractWolf–Hirschhorn syndrome (WHS) is caused by partial deletion of the short arm of chromosome 4 and is characterized by dysmorphic facies, congenital heart defects, intellectual/developmental disability, and increased risk for congenital diaphragmatic hernia (CDH). In this report, we describe a stillborn girl with WHS and a large CDH. A literature review revealed 15 cases of WHS with CDH, which overlap a 2.3-Mb CDH critical region. We applied a machine-learning algorithm that integrates large-scale genomic knowledge to genes within the 4p16.3 CDH critical region and identified FGFRL1, CTBP1, NSD2, FGFR3, CPLX1, MAEA, CTBP1-AS2, and ZNF141 as genes whose haploinsufficiency may contribute to the development of CDH.


Sign in / Sign up

Export Citation Format

Share Document