scholarly journals Improved Novel Clustering Technique for Diverse and Self-motivated Traffic Data Stream for IoT Scenario

Technologies are changing day by day and IoT is worldwide data and may of great business important to various users. sTo create such reasonable data, majority adaptive and K-mediod clustering techniques are employed in data mining. In research work, it focus on comparing adaptive, K-medisod and novel clustering technique to internet-of-things data collection in ITSs (Intelligence Traffic System). In traffic DataStream is composed form online site, it challenges of 30,000 instances with 9 attributes, clusters formed after evaluation and number of clusters is identified after the evaluation. Proposed techniques are significant too easy than some other clustering techniques with respect to all computation recall and precision parameters. In traffic databases depends on the data separation and cluster enhancement that is quality of clusters. To resolve the major issues that over load the system or Centre’s in IoT which consequences the huge kind of data on internet. It evaluated a set of consequences experiments using token and manufacture data from traffic use case view where the traffic considerations from the city monitor. Comparison of clustering methods that helps in determining suitable clustering approach for the offer internet of things database which results in optimal performance metrics.

Author(s):  
Rohit Rastogi ◽  
Devendra Kumar Chaturvedi ◽  
Mayank Gupta

Development in the field of technology is growing with a fast pace, mainly the IoT (internet of things). It is an interface between machine-to-machine, machine-to-human, machine-to-infrastructure as well as machine-to-environment. Stress, especially TTH (tension type headache), is a serious problem in today's world. Now every person in this world is facing headache and stress-related problems in daily life. To measure the stress level, the authors have introduced the concept of EEG, EMG, and GSR biofeedback. In case of TTH, human is in a state in which one experiences pain like a physical weight or a tight band around one's head. TTH is different from migraine as it can be affected due to everyday activities. The most common type of primitive headache is tension type headache (TTH). The focus of the research work was to compare the impression of EMG-, GSR-, and EEG-integrated biofeedback on stress due to headache and quality of life of the subjects under consideration.


2021 ◽  
Author(s):  
Charalampos Zafeiropoulos ◽  
Ioannis N. Tzortzis ◽  
Ioannis Rallis ◽  
Eftychios Protopapadakis ◽  
Nikolaos Doulamis ◽  
...  

In this paper, we scrutinize the effectiveness of various clustering techniques, investigating their applicability in Cultural Heritage monitoring applications. In the context of this paper, we detect the level of decomposition and corrosion on the walls of Saint Nicholas fort in Rhodes utilizing hyperspectral images. A total of 6 different clustering approaches have been evaluated over a set of 14 different orthorectified hyperspectral images. Experimental setup in this study involves K-means, Spectral, Meanshift, DBSCAN, Birch and Optics algorithms. For each of these techniques we evaluate its performance by the use of performance metrics such as Calinski-Harabasz, Davies-Bouldin indexes and Silhouette value. In this approach, we evaluate the outcomes of the clustering methods by comparing them with a set of annotated images which denotes the ground truth regarding the decomposition and/or corrosion area of the original images. The results depict that a few clustering techniques applied on the given dataset succeeded decent accuracy, precision, recall and f1 scores. Eventually, it was observed that the deterioration was detected quite accurately.


2021 ◽  
Author(s):  
Gauri Kalnoor ◽  
Gowrishankar S

Abstract Technology, as we know, has aided in the growth of humankind since its advent. Due to this advance, a new computation and communication surrounded such as the Internet of Things (IoT) has entered the scene. Much research work is being done in the area of IoT which aids the overall advancement of society and marks life simpler and more agreeable. Yet, in the asset restricted surrounding of Wireless Sensor Network (WSN) and IoT, it is practically incomprehensible to build up a totally safe framework. so we move quick, innovation turns out to be progressively powerless against security hazards. Later on, the quantity of individuals associated with the web will be not as much as that of powerful articles, so we need to set up a vigorous framework to keep the previously mentioned conditions safe and normalize it for smooth correspondence between IoT objects. In this audit archive, refinements of the relevant threat model for the safety of WSN and IoT- based correspondences are given. The security prerequisites and different potential attacks in WSN-based and IoT-based correspondence conditions are examined likewise. At that point refinements of various designs of correspondence conditions dependent on WSN and IoT are also given. Next, the ongoing concerns and moves related to WSN and IoT are discussed. A logical arrangement of security and assurance defending shows in WSN and IoT is moreover included. Lastly, some investigation incites that should be tended to soon is also presented in this article. The integrated IoT- WSN with performance metrics is tabulated to show the possibilities of securing the network systems.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 224
Author(s):  
Dr Sanakkayala SatyaNarayana ◽  
G V. Sai Bharath ◽  
Katakam Sri Lakshmi Sahithi ◽  
Adusumilli Sai Rutwik

With the technology leaping towards a new phase the next big that is happening is IOT and managing the huge amount of data that is being produced. To apprehend the real Internet of Things in which the entirely is interconnected, direct interactions between sensors and actuators, also known as bindings, are essential. As more and more devices are getting connected to the internet there is a lot of data that is being generated. We need to maintain the quality of data and it should be manageable for future use. Consequently, in evaluation to subsisting studies on smart cities we give a information driven edge depicting the central information administration methodologies employed to check consistency, interoperability, granularity and re-convenience of the information created by strategies for the fundamental Internet of Things( IoT) for smart cities. We try to find the proper communication between the devices and finally try to implement the details for a system. In this paper we are trying to do survey on how the large amount of data is being stored and various strategies for handling the data by using some architectures for the smart traffic system. We are trying to use the SWIFT architecture for analyzing the traffic in smart cities.  


Author(s):  
Meng Yuan ◽  
Justin Zobel ◽  
Pauline Lin

AbstractClustering of the contents of a document corpus is used to create sub-corpora with the intention that they are expected to consist of documents that are related to each other. However, while clustering is used in a variety of ways in document applications such as information retrieval, and a range of methods have been applied to the task, there has been relatively little exploration of how well it works in practice. Indeed, given the high dimensionality of the data it is possible that clustering may not always produce meaningful outcomes. In this paper we use a well-known clustering method to explore a variety of techniques, existing and novel, to measure clustering effectiveness. Results with our new, extrinsic techniques based on relevance judgements or retrieved documents demonstrate that retrieval-based information can be used to assess the quality of clustering, and also show that clustering can succeed to some extent at gathering together similar material. Further, they show that intrinsic clustering techniques that have been shown to be informative in other domains do not work for information retrieval. Whether clustering is sufficiently effective to have a significant impact on practical retrieval is unclear, but as the results show our measurement techniques can effectively distinguish between clustering methods.


Author(s):  
Geshwaree Huzooree ◽  
Kavi Kumar Khedo ◽  
Noojehan Joonas

The confluence of wireless body area network (WBAN) advancement has led to a great shift in the healthcare sector and has enormous potential to reduce long-term costs, social problems, workforce issues, and improve quality of healthcare service. Based on existing literature on WBANs, technologies, and standards, a WBAN is proposed to bridge the gap of information between patients and healthcare professional through sharing of high quality of information (QoI) whereby the latter can have real-time and historical view of patient's condition for effective and timely monitoring. This feature will also address the time and space restriction of healthcare service. Moreover, a best fit glucose prediction model considering various exogenous inputs based on autoregressive (ARX) model is proposed to perform data analytics in a WBAN system. The performance of the model is evaluated through performance metrics. Potential challenges and future research work are pointed out for further development of WBAN.


Medical image processing is a challenging research field, since most captured images suffer from noise and poor contrast nature. The accuracy of details present in the medical image depends entirely on the captured image quality. The factor that affects the quality of the images includes poor illumination conditions, capturing devices and inexperienced technicians that may result in low contrast images. Hence, contrast enhancement techniques are necessary to improve the quality of OCT images for further processing. In this paper, the enhancement of OCT images is carried out using various enhancement techniques to identify the method that offers improvement in the enhancement quality of the image. It presents a comparative evaluation of enhancement techniques based on the performance indices calculated from the experimental results. The results of this research work suggest the better enhancement technique suitable for OCT images depending on the various performance metrics used prominently in medical imaging


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Ifeoma V. Ngonadi

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Remote patient monitoring enables the monitoring of patients’ vital signs outside the conventional clinical settings which may increase access to care and decrease healthcare delivery costs. This paper focuses on implementing internet of things in a remote patient medical monitoring system. This was achieved by writing two computer applications in java in which one simulates a mobile phone called the Intelligent Personal Digital Assistant (IPDA) which uses a data structure that includes age, smoking habits and alcohol intake to simulate readings for blood pressure, pulse rate and mean arterial pressure continuously every twenty five which it sends to the server. The second java application protects the patients’ medical records as they travel through the networks by employing a symmetric key encryption algorithm which encrypts the patients’ medical records as they are generated and can only be decrypted in the server only by authorized personnel. The result of this research work is the implementation of internet of things in a remote patient medical monitoring system where patients’ vital signs are generated and transferred to the server continuously without human intervention.


2017 ◽  
Vol 1 (3) ◽  
pp. 54
Author(s):  
BOUKELLOUZ Wafa ◽  
MOUSSAOUI Abdelouahab

Background: Since the last decades, research have been oriented towards an MRI-alone radiation treatment planning (RTP), where MRI is used as the primary modality for imaging, delineation and dose calculation by assigning to it the needed electron density (ED) information. The idea is to create a computed tomography (CT) image or so-called pseudo-CT from MRI data. In this paper, we review and classify methods for creating pseudo-CT images from MRI data. Each class of methods is explained and a group of works in the literature is presented in detail with statistical performance. We discuss the advantages, drawbacks and limitations of each class of methods. Methods: We classified most recent works in deriving a pseudo-CT from MR images into four classes: segmentation-based, intensity-based, atlas-based and hybrid methods. We based the classification on the general technique applied in the approach. Results: Most of research focused on the brain and the pelvis regions. The mean absolute error (MAE) ranged from 80 HU to 137 HU and from 36.4 HU to 74 HU for the brain and pelvis, respectively. In addition, an interest in the Dixon MR sequence is increasing since it has the advantage of producing multiple contrast images with a single acquisition. Conclusion: Radiation therapy field is emerging towards the generalization of MRI-only RT thanks to the advances in techniques for generation of pseudo-CT images. However, a benchmark is needed to set in common performance metrics to assess the quality of the generated pseudo-CT and judge on the efficiency of a certain method.


Sign in / Sign up

Export Citation Format

Share Document