Applications of Stream Data Mining on the Internet of Things: A Survey

Author(s):  
Emine Rumeysa Guler ◽  
Suat Ozdemir
Author(s):  
Xiongtao Zhang ◽  
Xiaomin Zhu ◽  
Weidong Bao ◽  
Laurence T. Yang ◽  
Ji Wang ◽  
...  

2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4536 ◽  
Author(s):  
Yan Zhong ◽  
Simon Fong ◽  
Shimin Hu ◽  
Raymond Wong ◽  
Weiwei Lin

The Internet of Things (IoT) and sensors are becoming increasingly popular, especially in monitoring large and ambient environments. Applications that embrace IoT and sensors often require mining the data feeds that are collected at frequent intervals for intelligence. Despite the fact that such sensor data are massive, most of the data contents are identical and repetitive; for example, human traffic in a park at night. Most of the traditional classification algorithms were originally formulated decades ago, and they were not designed to handle such sensor data effectively. Hence, the performance of the learned model is often poor because of the small granularity in classification and the sporadic patterns in the data. To improve the quality of data mining from the IoT data, a new pre-processing methodology based on subspace similarity detection is proposed. Our method can be well integrated with traditional data mining algorithms and anomaly detection methods. The pre-processing method is flexible for handling similar kinds of sensor data that are sporadic in nature that exist in many ambient sensing applications. The proposed methodology is evaluated by extensive experiment with a collection of classical data mining models. An improvement over the precision rate is shown by using the proposed method.


2020 ◽  
Vol 16 (2) ◽  
pp. 18-33 ◽  
Author(s):  
Hongli Lou

This article proposes a new idea for the current situation of procedural evaluation of college English based on Internet of Things. The Internet of Things is used to obtain the intelligent data to enhance the teaching flexibility. The data generated during the process of procedural evaluation is carefully analyzed through data mining to infer whether the teacher's procedural evaluation in English teaching can be satisfied.


2016 ◽  
Vol 64 (7) ◽  
Author(s):  
Christian Bauer ◽  
Zaigham-Faraz Siddiqui ◽  
Manuel Beuttler ◽  
Klaus Bauer

AbstractWith the increasing connectivity of devices, the amount of data that is recorded and ready for analysis is growing correspondingly. This is also the case for shop floors in flexible sheet metal handling and production. With the growing need for flexibility in production, the availability of machine tools is imminent. This paper shows different approaches that a classical manufacturing systems company such as TRUMPF takes in applying data mining techniques to address the new challenges which come with the Internet of things. In addition to classical methods, a new approach is introduced that does not need any alteration of the machine or its interfaces.


2018 ◽  
Vol 46 (5) ◽  
pp. 807-811 ◽  
Author(s):  
Francesco Piccialli ◽  
Salvatore Cuomo ◽  
Gwanggil Jeon

Author(s):  
Eliot Bytyçi ◽  
Besmir Sejdiu ◽  
Arten Avdiu ◽  
Lule Ahmedi

The Internet of Things (IoT) vision is connecting uniquely identifiable devices to the internet, best described through ontologies. Furthermore, new emerging technologies such as wireless sensor networks (WSN) are recognized as essential enabling component of the IoT today. Hence, the interest is to provide linked sensor data through the web either following the semantic web enablement (SWE) standard or the linked data approach. Likewise, a need exists to explore those data for potential hidden knowledge through data mining techniques utilized by a domain ontology. Following that rationale, a new lightweight IoT architecture has been developed. It supports linking sensors, other devices and people via a single web by mean of a device-person-activity (DPA) ontology. The architecture is validated by mean of three rich-in-semantic services: contextual data mining over WSN, semantic WSN web enablement, and linked WSN data. The architecture could be easily extensible to capture semantics of input sensor data from other domains as well.


Author(s):  
Pheeha Machaka ◽  
Fulufhelo Nelwamondo

This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.


Sign in / Sign up

Export Citation Format

Share Document