2017
DOI: 10.3390/sym9010016
|View full text |Cite
|
Sign up to set email alerts
|

Data-Filtering System to Avoid Total Data Distortion in IoT Networking

Abstract: Abstract:In the Internet of Things (IoT) networking, numerous objects are connected to a network. They sense events and deliver the sensed information to the cloud. A lot of data is generated in the IoT network, and servers in the cloud gather the sensed data from the objects. Then, the servers analyze the collected data and provide proper intelligent services to users through the results of the analysis. When the server analyzes the collected data, if there exists malfunctioning data, distortional results of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 17 publications
1
12
0
Order By: Relevance
“…The inference engine employs Naïve Bayesian Classifier. The Naïve Bayesian Classifier is based on the Bayes rule and it is a widely used supervised learning algorithm (supervised learning is widely applied to wireless networks to estimate the variance of wireless resources and network environment [17][18][19][20][21][22][23]). It is used to estimate the most possible state from probability by the a priori statistic information.…”
Section: Wifi Status Estimation In the Inference Enginementioning
confidence: 99%
See 2 more Smart Citations
“…The inference engine employs Naïve Bayesian Classifier. The Naïve Bayesian Classifier is based on the Bayes rule and it is a widely used supervised learning algorithm (supervised learning is widely applied to wireless networks to estimate the variance of wireless resources and network environment [17][18][19][20][21][22][23]). It is used to estimate the most possible state from probability by the a priori statistic information.…”
Section: Wifi Status Estimation In the Inference Enginementioning
confidence: 99%
“…If 3 is stable then (6) If > then 7Find another WiFi (8) End if (9) Else (10) If > then (11) Find another WiFi and then migrate to the WiFi (12) End if (13) End if (14) Else if 2 is low then (15) If 3 is stable then (16) If ≤ then (17) Use cellular and WiFi simultaneously until the buffer meets THRD_M (18) Else (19) Use cellular and WiFi simultaneously until the buffer meets THRD_H (20) Find another WiFi and then migrate to the WiFi (21) End if (22) Else (23) If ≤ then (24) Use cellular and WiFi simultaneously until the buffer meets THRD_H (25) Find buffer, when is less than or equal to , mobile terminals simultaneously use both cellular and WiFi until the amount of data in the buffer satisfies THRD_H and then the mobile terminals search for another WiFi and migrates to the WiFi network. When is greater than , the mobile terminal only uses cellular network or finds another WiFi network to migrate to it.…”
Section: Wireless Network Selection In the Decision Enginementioning
confidence: 99%
See 1 more Smart Citation
“…The Hong Kong MTR is equipped with full‐time staff for routine maintenance and inspection of test results [29,30]. Refs [24,31,32] indicate that due to the special operating environment of the subway, the underground structure facilities are inevitably affected by factors such as pollution, moisture, water seepage, water leakage, and high ground stress, which may cause date loss and distortion during data transmission. Therefore, the screening of abnormal points in the spurious monitoring data is becoming an urgent problem in the data processing.…”
Section: Introductionmentioning
confidence: 99%
“…A significant amount of research has been conducted to develop efficient intrusion detection systems using various techniques such as statistical, soft computing, combination learners, and the methods based on classification, knowledge, clustering, and so on [2][3][4][5][6]. However, in the past few years, the exponential growth of massive data in network domain has posed many challenges to researchers in the field [7][8][9].…”
Section: Introductionmentioning
confidence: 99%