scholarly journals Fischer Linear Discrimination and Quadratic Discrimination Analysis–Based Data Mining Technique for Internet of Things Framework for Healthcare

2021 ◽  
Vol 9 ◽  
Author(s):  
Mohammad Kamrul Hasan ◽  
Taher M. Ghazal ◽  
Ali Alkhalifah ◽  
Khairul Azmi Abu Bakar ◽  
Alireza Omidvar ◽  
...  

The internet of reality or augmented reality has been considered a breakthrough and an outstanding critical mutation with an emphasis on data mining leading to dismantling of some of its assumptions among several of its stakeholders. In this work, we study the pillars of these technologies connected to web usage as the Internet of things (IoT) system's healthcare infrastructure. We used several data mining techniques to evaluate the online advertisement data set, which can be categorized as high dimensional with 1,553 attributes, and the imbalanced data set, which automatically simulates an IoT discrimination problem. The proposed methodology applies Fischer linear discrimination analysis (FLDA) and quadratic discrimination analysis (QDA) within random projection (RP) filters to compare our runtime and accuracy with support vector machine (SVM), K-nearest neighbor (KNN), and Multilayer perceptron (MLP) in IoT-based systems. Finally, the impact on number of projections was practically experimented, and the sensitivity of both FLDA and QDA with regard to precision and runtime was found to be challenging. The modeling results show not only improved accuracy, but also runtime improvements. When compared with SVM, KNN, and MLP in QDA and FLDA, runtime shortens by 20 times in our chosen data set simulated for a healthcare framework. The RP filtering in the preprocessing stage of the attribute selection, fulfilling the model's runtime, is a standpoint in the IoT industry.Index Terms: Data Mining, Random Projection, Fischer Linear Discriminant Analysis, Online Advertisement Dataset, Quadratic Discriminant Analysis, Feature Selection, Internet of Things.

Author(s):  
Xiongtao Zhang ◽  
Xiaomin Zhu ◽  
Weidong Bao ◽  
Laurence T. Yang ◽  
Ji Wang ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4536 ◽  
Author(s):  
Yan Zhong ◽  
Simon Fong ◽  
Shimin Hu ◽  
Raymond Wong ◽  
Weiwei Lin

The Internet of Things (IoT) and sensors are becoming increasingly popular, especially in monitoring large and ambient environments. Applications that embrace IoT and sensors often require mining the data feeds that are collected at frequent intervals for intelligence. Despite the fact that such sensor data are massive, most of the data contents are identical and repetitive; for example, human traffic in a park at night. Most of the traditional classification algorithms were originally formulated decades ago, and they were not designed to handle such sensor data effectively. Hence, the performance of the learned model is often poor because of the small granularity in classification and the sporadic patterns in the data. To improve the quality of data mining from the IoT data, a new pre-processing methodology based on subspace similarity detection is proposed. Our method can be well integrated with traditional data mining algorithms and anomaly detection methods. The pre-processing method is flexible for handling similar kinds of sensor data that are sporadic in nature that exist in many ambient sensing applications. The proposed methodology is evaluated by extensive experiment with a collection of classical data mining models. An improvement over the precision rate is shown by using the proposed method.


2020 ◽  
Vol 16 (2) ◽  
pp. 18-33 ◽  
Author(s):  
Hongli Lou

This article proposes a new idea for the current situation of procedural evaluation of college English based on Internet of Things. The Internet of Things is used to obtain the intelligent data to enhance the teaching flexibility. The data generated during the process of procedural evaluation is carefully analyzed through data mining to infer whether the teacher's procedural evaluation in English teaching can be satisfied.


2016 ◽  
Vol 64 (7) ◽  
Author(s):  
Christian Bauer ◽  
Zaigham-Faraz Siddiqui ◽  
Manuel Beuttler ◽  
Klaus Bauer

AbstractWith the increasing connectivity of devices, the amount of data that is recorded and ready for analysis is growing correspondingly. This is also the case for shop floors in flexible sheet metal handling and production. With the growing need for flexibility in production, the availability of machine tools is imminent. This paper shows different approaches that a classical manufacturing systems company such as TRUMPF takes in applying data mining techniques to address the new challenges which come with the Internet of things. In addition to classical methods, a new approach is introduced that does not need any alteration of the machine or its interfaces.


2018 ◽  
Vol 46 (5) ◽  
pp. 807-811 ◽  
Author(s):  
Francesco Piccialli ◽  
Salvatore Cuomo ◽  
Gwanggil Jeon

Author(s):  
Dr. Mugunthan S. R.

The cyber-attacks nowadays are becoming more and more erudite causing challenges in distinguishing them and confining. These attacks affect the sensitized information’s of the network by penetrating into the network and behaving normally. The paper devises a system for such interference recognition in the internet of things architecture that is aided by the FOG. The proposed system is a combination of variety of classifiers that are founded on the decision tree as well as the rule centered conceptions. The system put forth involves the JRip and the REP tree algorithm to utilize the features of the data set as input and distinguishes between the benign and the malicious traffic in the network and includes an decision forest that is improved with the penalizing attributes of the previous trees in the final stage to classify the traffic in the network utilizing the initial data set as well as the outputs of the classifiers that were engaged in the former stages. The proffered system was examined using the dataset such BOT-Internet of things and the CICIDS2017 to evince its competence in terms of rate of false alarm, detection, and accuracy. The attained results proved that the performance of the proposed system was better compared to the exiting methodologies to recognize the interference.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 1083-1086

In recent years everything is connected and passing through the internet, but Internet of Things (IOT), which will change all aspects of our lives and future. While the things are connected to the internet, they will generate the huge amount of information which has to be processed. The information that gathered from various IoT devices has to be recognized and organized according to the environments of their type. To recognize and organize the data gathered from different things, the important task to be played is making things passing through different Data Mining Techniques (DMT). In this article, we mainly focus on analysis of various Data Mining Techniques over the data that has been generated by the IOT Devices which are connected over the internet using DBSCAN Technique. And also performed review over different Data Mining Techniques for Data Analysis


Author(s):  
Eliot Bytyçi ◽  
Besmir Sejdiu ◽  
Arten Avdiu ◽  
Lule Ahmedi

The Internet of Things (IoT) vision is connecting uniquely identifiable devices to the internet, best described through ontologies. Furthermore, new emerging technologies such as wireless sensor networks (WSN) are recognized as essential enabling component of the IoT today. Hence, the interest is to provide linked sensor data through the web either following the semantic web enablement (SWE) standard or the linked data approach. Likewise, a need exists to explore those data for potential hidden knowledge through data mining techniques utilized by a domain ontology. Following that rationale, a new lightweight IoT architecture has been developed. It supports linking sensors, other devices and people via a single web by mean of a device-person-activity (DPA) ontology. The architecture is validated by mean of three rich-in-semantic services: contextual data mining over WSN, semantic WSN web enablement, and linked WSN data. The architecture could be easily extensible to capture semantics of input sensor data from other domains as well.


Author(s):  
Pheeha Machaka ◽  
Fulufhelo Nelwamondo

This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.


Sign in / Sign up

Export Citation Format

Share Document