Feasibility Support of Datamining Tools for IoT

ثبت نشده
چکیده

Today rapid development in Information Technology field and new applications being developed constantly to support critical businesses all over the world and also various key fields like environment studies, Medicine, Research and other sciences, making it an indispensable part of our lives. Computations across and over Internet has become order of day. Internet of things is an emerging topic of technical, social and economic significance. With IPV6 addressing in place, every possible consumer product, durable goods, cars and trucks, Industrial and utility components, sensors and other everyday object can become part of Internet. Data Analytics is the driving force running these applications and for mining useful knowledge. This document aims at bringing out the feasibility support that current data mining tools render IOT, against its possible data models. Keywords— Internet of Things (IOT), Data mining (DM), Data mining tools, IoT Data Models, KNIME, RAPIDMINER

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feasibility of Implementing Blockchain and Internet of Things Technologies in Hospitals Affiliated to Tabriz University of Medical Sciences

Objective Considering the importance of implementing Internet of Thing (IoT) and blockchain technologies in the health sector, and the need to assess the feasibility of each project before implementation, this study aims to assess feasibility of implementing blockchain and IoT technologies in hospitals affiliated to Tabriz University of Medical Sciences. Methods This cross-sectional study was ...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

A Qualitative Assessment of the Evidence Utilization for Health Policy-Making on the Basis of SUPPORT Tools in a Developing Country

Background SUPPORT tools consist of 18 articles addressing the health policy-makers so that they can learn how to make evidence-informed health policies. These tools have been particularly recommended for developing countries. The present study tries to explain the process of evidence utilization for developing policy documents in the Iranian Ministry of Health and Medical Education (MoHME) and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016