[HTML][HTML] Internet of things and data mining: An application oriented survey

P Sunhare, RR Chowdhary… - Journal of King Saud …, 2022 - Elsevier
Advancement in the fields of electronic communication, data processing, and internet
technologies enable easy access to and interaction with a variety of physical devices …

A reliable data compression scheme in sensor-cloud systems based on edge computing

S Lu, Q Xia, X Tang, X Zhang, Y Lu, J She - IEEE Access, 2021 - ieeexplore.ieee.org
The rapid development of the IoT and cloud computing has spawned a new network
structure—sensor-cloud system (SCS) where sensors, sensor networks, and cloud …

Hierarchical blockchain-based group and group key management scheme exploiting unmanned aerial vehicles for urban computing

G Heo, K Chae, I Doh - IEEE Access, 2022 - ieeexplore.ieee.org
In urban computing composed of various Internet of Things (IoT) devices, data is collected
from IoT as learning data for other IoT devices in a circular structure. Therefore, data are …

Sdfp-growth algorithm as a novelty of association rule mining optimization

B Siswanto, H Soeparno, NF Sianipar… - IEEE Access, 2024 - ieeexplore.ieee.org
An essential element of association rules is the strong confidence values that depend on the
support value threshold, which determines the optimum number of datasets. The existing …

Frequent pattern mining algorithms in fog computing environments: A systematic review

A Fadaei Tehrani, M Sharifi… - … Practice and Experience, 2022 - Wiley Online Library
Recent advances in technology have resulted in generating or collecting massive volumes
of data from rich data resources such as sensors and mobile devices in Internet of Things …

Green IoT: Environment‐Friendly Approach to IoT

A Goel, S Gautam - Advances in Data Science and Analytics …, 2023 - Wiley Online Library
Summary The Internet of Things, better known as IoT, has been a great area for research
and has also gained fame in recent years. Nowadays, we all have advanced and …

Machine learning-based decision support framework for CBRN protection

T Kegyes, Z Süle, J Abonyi - Heliyon, 2024 - cell.com
Detecting chemical, biological, radiological and nuclear (CBRN) incidents is a high priority
task and has been a topic of intensive research for decades. Ongoing technological, data …

Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin

Z Miao, W Li, X Pan - Journal of Cloud Computing, 2024 - Springer
With the booming of cloud-based digital twin systems, monitoring key performance
indicators has become crucial for ensuring system security and reliability. Due to the …

A reduced network traffic method for IoT data clustering

RD Azevedo, GR Machado, RR Goldschmidt… - ACM Transactions on …, 2020 - dl.acm.org
Internet of Things (IoT) systems usually involve interconnected, low processing capacity, and
low memory sensor nodes (devices) that collect data in several sorts of applications that …

Reviews in online data stream and active learning for cyber intrusion detection-A systematic literature review

C Nixon, M Sedky, M Hassan - 2021 Sixth International …, 2021 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) monitor com-puter networks for attack. Network data
streams are potentially infinite and require real-time processing in order to provide timely …