scholarly journals A Comprehensive Assessment on IOT Devices with Data Mining Techniques

2021 ◽  
Author(s):  
G. Vijay Kumar ◽  
M. Sreedevi ◽  
Arvind Yadav ◽  
B. Aruna

Now at present development the entire world using vast variety of smart devices associated among sensors & handful of actuators. There is an enormous progress within the field of electronic communication; processing the data through devices and the bandwidth in internet technologies makes very easy to access and to interact with the variety of devices all over the whole world. There is a wide range research in the area of Internet of Things (IoT) along Cloud Technologies making to build incredible data which are creating from this type of heterogeneous environments and can be able to transform into a valuable knowledge with the help of data mining techniques. The knowledge that is generated will takes a crucial role in making intellectual decisions and also be a best possible resource management and services. In this paper we organized a comprehensive assessment on various data mining techniques engaged with small and large scale IoT applications to make the environment smart.

Author(s):  
Sherry Y. Chen ◽  
Xiaohui Liu

There is an explosion in the amount of data that organizations generate, collect, and store. Organizations are gradually relying more on new technologies to access, analyze, summarize, and interpret information intelligently. Data mining, therefore, has become a research area with increased importance (Amaratunga & Cabrera, 2004). Data mining is the search for valuable information in large volumes of data (Hand, Mannila, & Smyth, 2001). It can discover hidden relationships, patterns, and interdependencies and generate rules to predict the correlations, which can help the organizations make critical decisions faster or with a greater degree of confidence (Gargano & Ragged, 1999). There is a wide range of data mining techniques, which has been successfully used in many applications. This article is an attempt to provide an overview of existing data mining applications. The article begins by explaining the key tasks that data mining can achieve. It then moves to discuss applications domains that data mining can support. The article identifies three common application domains, including bioinformatics, electronic commerce, and search engines. For each domain, how data mining can enhance the functions will be described. Subsequently, the limitations of current research will be addressed, followed by a discussion of directions for future research.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 1083-1086

In recent years everything is connected and passing through the internet, but Internet of Things (IOT), which will change all aspects of our lives and future. While the things are connected to the internet, they will generate the huge amount of information which has to be processed. The information that gathered from various IoT devices has to be recognized and organized according to the environments of their type. To recognize and organize the data gathered from different things, the important task to be played is making things passing through different Data Mining Techniques (DMT). In this article, we mainly focus on analysis of various Data Mining Techniques over the data that has been generated by the IOT Devices which are connected over the internet using DBSCAN Technique. And also performed review over different Data Mining Techniques for Data Analysis


2020 ◽  
Vol 10 (21) ◽  
pp. 7699
Author(s):  
Shin-Hung Pan ◽  
Shu-Ching Wang

Because the Internet of Things (IoT) can provide a global service network through various smart devices, the IoT has been widely used in smart transportation, smart cities, smart healthcare, and factory automation through the Internet connection. With the large-scale establishment and 5G (fifth generation) wireless networks, the cellular Internet of Things (CIoT) will continue to be developed and applied to a wide range of applications. In order to provide a reliable application of CIoT, a safe and reliable network topology MECIoT is proposed in this study. To improve the reliability and fault-tolerant capability of the network proposed, the problem of reaching agreement should be revisited. Therefore, the applications in the system can still be performed correctly even if some processing units (PUs) in the system have failed. In this study, a new protocol is proposed to allow all normal PUs in MECIoT to reach an agreement with the minimum amount of data exchanges required and the maximum number of failed PUs allowed in MECIoT. In the end, the optimality of the protocol has been proven by mathematical method.


Author(s):  
Sidra Javed ◽  
Hamza Javed ◽  
Ayesha Saddique ◽  
Beenish Rafiq

— Prediction of heart disease is a big concern now a days because everyone is busy and due to heavy load of work people do not give attention to their health. To diagnose a disease is a big challenge. The issue is to extract data that have some meaningful knowledge. For this purpose, data mining techniques are used to extract meaningful data. Decision Tree and ID3 are used to predict heart diseases. Many researchers and practitioners are familiar with prediction of heart diseases and wide range of techniques is available to predict disease. To address this problem, Decision Tree is used to predict the heart disease. In this study the collected data is pre-processed, Decision Tree algorithm and ID3 were then applied to predict the heart disease.   Index Terms— Decision Tree, ID3 Algorithm, Data Mining, Decision Support System (DSS), knowledge Discovery from Databases (KDD).


Author(s):  
Gebeyehu Belay Gebremeskel ◽  
Zhongshi He ◽  
Huazheng Zhu

Unable to accommodating new technologies, including social technology, mobile devices and computing are other potential problems, which are significant challenges to social-networking service. The very broad range of such social-networking challenges and problems are demanding advanced and dynamic tools. Therefore, in this chapter, we introduced and discussed data mining prospects to overcome the traditional social-networking challenges and problems, which led to optimization of MSNs application and performances. The proposed method infers defining and investigating social-networking problems using data mining techniques and algorithms based on the large-scale data. The approach is also exploring the possible potential of users and systems contexts, which leads to mine the personal contexts such as the users’ locations and situations from the mobile logs. In these sections, we discussed and introduced new ideas on social technologies, data mining techniques and algorithm’s prospects, social technology’s key functional and performances, which include social analysis, security and fraud detections by presenting a brief analysis, and modeling based descriptions. The approach also empirically discussed using the real survey data, which the result showed how data mining vitally significant to explore MSNs performance and its crosscutting impacts. Finally, this chapter provides fundamental insight to researchers and practitioners who need to know data mining prospects and techniques to analyze large, complex and frequently changing data. This chapter is also providing a state-of-the-art of data mining techniques and algorithm’s dynamic prospects.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 154-165
Author(s):  
Abbas Atwan Mhawes ◽  
Ahmed Yousif Falih Saedi ◽  
Ali Talib Qasim Al-Aqbi ◽  
Lamees Abdalhasan Salman

Data mining is characterized as a quest for useful knowledge via large quantities of data. Some basic and most common techniques for data extraction are association rules, grouping, clustering, estimation, sequence modeling. For a wide range of applications, data mining techniques are used. Techniques of data analysis are essential to the preparation and implementation of the administration of the learning system, including behavioral guidance and personal behavior appraisal. The article applies data analytical methods to the role of student classification. Several tests are used for the interpretation of the findings. In keeping with the methodology proposed in the paper, the classification using cognitive skills provides more detailed results than the findings of other study published. Five algorithms were used (J48, Naïve Bayes, Multilayer Perception, K Star and SMO). This essay discusses and measures the application of the various algorithms so that factors affecting the success and failure of students can be identified, student performance can be estimated, and the significant consequences of the mathematics system for the second university year can be identified. However the number of exams can be minimized using data mining techniques. In terms of time and consequences, this shortened analysis plays a key role.


Author(s):  
Amine Chemchem ◽  
Habiba Drias ◽  
Youcef Djenouri

The tremendous size of data in nowadays world web invokes many data mining techniques. The recent emergence of some new data mining techniques provide also many interesting induction rules. So, it's important to process these induction rules in order to extract some new strong patterns called meta-rules. This work explores this concept by proposing a new support for induction rules clustering. Besides, a new clustering approach based on multilevel paradigm called multilevel clustering is developed for the purpose of treating large scale knowledge sets. The approach invokes k-means algorithm to cluster induction rules using new designed similarity measures. The developed module have been implemented in the core of the cognitive agent, in order to speed up its reasoning. This new architecture called Multilevel Miner Intelligent Agent (MMIA) is tested on four public benchmarks that contain 25000 rules, and compared to the classical one. As foreseeable, the multilevel clustering outperforms clearly the basic k-means algorithm on both the execution time and success rate criteria.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6163
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
Nor Masri Sahri ◽  
Nickson M. Karie ◽  
Mohiuddin Ahmed ◽  
...  

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.


Sign in / Sign up

Export Citation Format

Share Document