2019
DOI: 10.1016/j.future.2018.08.021
|View full text |Cite
|
Sign up to set email alerts
|

Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…VI. BACKGROUND Wu et al [11] presented a method for analyzing the bigdata collected through tools e.g. Hadoop, Mapreduce, Hive and others based on seq2seq-predictive models.…”
Section: B Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…VI. BACKGROUND Wu et al [11] presented a method for analyzing the bigdata collected through tools e.g. Hadoop, Mapreduce, Hive and others based on seq2seq-predictive models.…”
Section: B Results and Analysismentioning
confidence: 99%
“…Log analysis using the Recurrent Neural Network (RNN) method has been [4,11] studied to predict future events. In ns-2 network simulator, two network scenarios were set up to generate data for the proposed study.…”
Section: Introductionmentioning
confidence: 99%
“… The datasets will help researchers in optimizing and analyzing network communication used by IoT devices in an IoT network, e.g. device identification [1 , 2] , and device log prediction [3] are some of the techniques developed for IoT security by analyzing the network communication behaviour. The given IoT datasets can be analyzed by researchers in the context of network bandwidth and storage capability required for home or office automation since data were recorded in a separate file every day.…”
Section: Value Of the Datamentioning
confidence: 99%
“…The datasets will help researchers in optimizing and analyzing network communication used by IoT devices in an IoT network, e.g. device identification [1 , 2] , and device log prediction [3] are some of the techniques developed for IoT security by analyzing the network communication behaviour.…”
Section: Value Of the Datamentioning
confidence: 99%
“…A seq2seq model-based approach was used to improve query focused summarization performance [19]. Wu et al described a novel method to create, store, and convert logs of Internet of ings big data systems to be later processed through their proposed seq2seq algorithm [20]. e method has also been applied in manufacturing systems.…”
Section: Introductionmentioning
confidence: 99%