2018
DOI: 10.1109/jiot.2017.2730360
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Recovery of Incomplete Sensed Data in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
43
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(44 citation statements)
references
References 10 publications
1
43
0
Order By: Relevance
“…Hybrid methods Fekade et al [63] proposed a k-means clustering and Probabilistic Matrix Factorization (PMF) approach to recover missing values. Firstly, k-means clustering is done to divide the data into clusters, and within each cluster, PMF is applied.…”
Section: Singular Value Decompositionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hybrid methods Fekade et al [63] proposed a k-means clustering and Probabilistic Matrix Factorization (PMF) approach to recover missing values. Firstly, k-means clustering is done to divide the data into clusters, and within each cluster, PMF is applied.…”
Section: Singular Value Decompositionmentioning
confidence: 99%
“…They assessed their solution on simulated errors whereby they artificially injected 100 anomalies. For missing data imputation, the Intel Lab dataset has also been used by D' Aniello et al [62] and Fekade et al [63], where the former simulated the missing errors at 5%, 10%, 20%, 30%, 40% and 50% rates and the latter simulated the missing error by making 10% of the total data empty.…”
mentioning
confidence: 99%
“…Instead of using the system resource allocation for each cluster, many clusters can simultaneously use the same resource and divide it among themselves. [12], [13] c) The method of optimizing network using ant algorithm optimal routing. This algorithm is used for objective estimation vector, which includes such metrics as delay, distance between jumps, cost, load and reliability.…”
Section: Network Optimization By Analyzing Statisticsmentioning
confidence: 99%
“…Anonymization of missing data streams is very challenging [29]- [31], researchers found three major techniques to treat missingness for anonymization. There are imputation, marginalization and partitioning.…”
Section: Introductionmentioning
confidence: 99%