標(biāo)題: Titlebook: Cognitive Computing for Big Data Systems Over IoT; Frameworks, Tools an Arun Kumar Sangaiah,Arunkumar Thangavelu,Venkatesa Book 2018 The Ed [打印本頁] 作者: 深謀遠(yuǎn)慮 時間: 2025-3-21 16:10
書目名稱Cognitive Computing for Big Data Systems Over IoT影響因子(影響力)
書目名稱Cognitive Computing for Big Data Systems Over IoT影響因子(影響力)學(xué)科排名
書目名稱Cognitive Computing for Big Data Systems Over IoT網(wǎng)絡(luò)公開度
書目名稱Cognitive Computing for Big Data Systems Over IoT網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cognitive Computing for Big Data Systems Over IoT被引頻次
書目名稱Cognitive Computing for Big Data Systems Over IoT被引頻次學(xué)科排名
書目名稱Cognitive Computing for Big Data Systems Over IoT年度引用
書目名稱Cognitive Computing for Big Data Systems Over IoT年度引用學(xué)科排名
書目名稱Cognitive Computing for Big Data Systems Over IoT讀者反饋
書目名稱Cognitive Computing for Big Data Systems Over IoT讀者反饋學(xué)科排名
作者: canvass 時間: 2025-3-21 21:42 作者: Arb853 時間: 2025-3-22 04:06
https://doi.org/10.1007/978-3-031-41163-2omposed of thousands distributed entities and a number of multimedia smart devices. In recent years, due to the improvement of popularity and capability of smart mobile devices, Mobile Cloud Computing (MCC) gains a considerable attention in Internet of Things (IoT) environment. As there are variety 作者: MERIT 時間: 2025-3-22 06:45
B. A. Cerda,M. J. Nold,C. Wesdemiotisntribute to very challenging area for data science method applying. Traditional approach of predictive modelling became insufficient, because relaying on few variables as a base of the fraud model are very fragile concept. Reason for that is fact that we are talking about portfolio with low cases of作者: B-cell 時間: 2025-3-22 11:17 作者: NOMAD 時間: 2025-3-22 13:21 作者: NOMAD 時間: 2025-3-22 18:53 作者: 延期 時間: 2025-3-22 22:59 作者: 英寸 時間: 2025-3-23 01:37
Shuxiang Guo,Nan Xiao,Baofeng GaooT procedures. Its purpose is to expand the range of entities to be considered when describing a sensor-monitored environment by allowing, in particular, to seamlessly model in a unified way (i.e., within the same representation framework) physical entities like objects, humans, robots, etc. and hig作者: maintenance 時間: 2025-3-23 06:27 作者: 教唆 時間: 2025-3-23 13:31 作者: ineptitude 時間: 2025-3-23 14:41
African Island Migration: I. WalkerBut such data aggregation is recognized to be highly susceptible to clone attacks owing to the unattended nature of the network. Thus, ascertaining trustiness of the sensor nodes is crucial for WSN. Though numerous methods for cloned attack node isolation are provided in recent years, energy efficie作者: 音樂戲劇 時間: 2025-3-23 22:06 作者: EWER 時間: 2025-3-23 23:27
Cognitive Computing for Big Data Systems Over IoT978-3-319-70688-7Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: 政府 時間: 2025-3-24 04:43
Arun Kumar Sangaiah,Arunkumar Thangavelu,VenkatesaExplores domain knowledge and data reasoning technologies and cognitive methods using the Internet of Things (IoTs).Focuses on the design of the best cognitive embedded data technologies to process an作者: Infant 時間: 2025-3-24 09:58 作者: 牽連 時間: 2025-3-24 11:29 作者: 信條 時間: 2025-3-24 16:36 作者: 迎合 時間: 2025-3-24 21:07 作者: 方便 時間: 2025-3-24 23:58 作者: 睨視 時間: 2025-3-25 06:56 作者: excrete 時間: 2025-3-25 07:59 作者: 放棄 時間: 2025-3-25 15:11
,Reliable Cross Layer Design for E-Health Applications—IoT Perspective, and data link layer (MAC layer) are integrated. Reliability related parameter are included in route discover process and later MAC based power control technique make use of routing information, to obtain the suitable transmission power. Our results show that proposed cross layer design is reliable 作者: –FER 時間: 2025-3-25 16:37
Erasure Codes for Reliable Communication in Internet of Things (IoT) Embedded with Wireless Sensorsion in the context of reliable communication in Internet of Things. In this chapter, the two methods of information transmission, end-to-end transmission and hop-by-hop transmission, prevalent in digital communication scenario is discussed in detail with emphasis on with and without erasure coding. 作者: Insufficient 時間: 2025-3-25 23:16
A Review on Security and Privacy Challenges of Big Data, mobile communication. The selected journal articles are aimed used to make comparative analysis of security issues in different areas to cast solutions. This chapter consists of four main parts: introduction, materials and method, results, discussion and conclusion. This inquiry aimed to find diffe作者: 易怒 時間: 2025-3-26 02:07
High-Level Knowledge Representation and Reasoning in a Cognitive IoT/WoT Context,., a robot or a person moving in real time towards a given object) characteristics of the different entities to deal with. After having presented a short state of the art in the cognitive/semantic IoT/WoT domain, we will specify the notion of GWE by describing its implementation under NKRL (Narrativ作者: 者變 時間: 2025-3-26 05:22
Applications of IoT in Healthcare,in improving the primary care, secondary care and tertiary care of public. This chapter focuses on how the capabilities of Internet of things (IoT)can be leveraged in providing better Healthcare. In this chapter, various applications of IoT in healthcare as well as the challenges in the implementati作者: 指耕作 時間: 2025-3-26 09:58
Security Stipulations on IoT Networks,ces. Cloud platforms rescue the situation by storing, computing and visualizing data before transforming them into meaningful information. Botnets or Zombie army is a malware that takes control of a computer in which the attacker can squeeze into the network raising threat to the authenticity of dev作者: Arboreal 時間: 2025-3-26 14:42
A Hyper Heuristic Localization Based Cloned Node Detection Technique Using GSA Based Simulated Annester nodes is given to enhance the clone detection probability rate. Here, the location and residual energy is taken into account to identify the presence of cloned attack nodes within the network. Finally, Gravitational Search Algorithm with global search ability is investigated to identify the clo作者: Yag-Capsulotomy 時間: 2025-3-26 16:55
An Innovation Model for Smart Traffic Management System Using Internet of Things (IoT),deo data analysis, wireless sensor network, etc. are used to somewhat solve the congestion in the traffic and to manage the traffic smartly. But in the above said methods having some demerits like much time to take for installation, maintenance cost is very high. Actually, our objective is to develo作者: 商品 時間: 2025-3-26 22:46 作者: Exposition 時間: 2025-3-27 02:43 作者: gusher 時間: 2025-3-27 09:16 作者: integrated 時間: 2025-3-27 12:43
Lecture Notes in Mechanical Engineeringta extracting and analyzing in less period of time. Data science methods can be used for this purpose to investigate and detect a different type of severe attacks and intrusions. This chapter introduce principles of Digital Forensics, Intrusion Detection and Internet of Things as well as exploring d作者: LINE 時間: 2025-3-27 15:14
https://doi.org/10.1007/978-3-031-41163-2nique for Order Preference by Similarity to Ideal Solution (FTOPSIS) which helps the users to select an optimal cloud where uncertainty and subjectivity are parameterized using triangular fuzzy members and is handled by using linguistic values. The proposed computational intelligence decision making作者: 口訣 時間: 2025-3-27 18:10
B. A. Cerda,M. J. Nold,C. Wesdemiotisnce methods and fuzzy logic will be used on sample data set, and will be shown potentials of proposed methodology for fraud detection purposes. Chapter shows case study in domain of finance on public data, where proposed methodology will be illustrated an efficient methodology which can be usable fo作者: 滔滔不絕的人 時間: 2025-3-27 23:01
Michael L. Easterling,I. Jonathan Amster and data link layer (MAC layer) are integrated. Reliability related parameter are included in route discover process and later MAC based power control technique make use of routing information, to obtain the suitable transmission power. Our results show that proposed cross layer design is reliable 作者: vasospasm 時間: 2025-3-28 02:44 作者: 思考 時間: 2025-3-28 08:54
William R. Swartout,Stephen W. Smoliar mobile communication. The selected journal articles are aimed used to make comparative analysis of security issues in different areas to cast solutions. This chapter consists of four main parts: introduction, materials and method, results, discussion and conclusion. This inquiry aimed to find diffe作者: 很是迷惑 時間: 2025-3-28 13:45 作者: SPALL 時間: 2025-3-28 16:44 作者: Ruptured-Disk 時間: 2025-3-28 21:44 作者: 不公開 時間: 2025-3-29 00:56
African Island Migration: I. Walkerster nodes is given to enhance the clone detection probability rate. Here, the location and residual energy is taken into account to identify the presence of cloned attack nodes within the network. Finally, Gravitational Search Algorithm with global search ability is investigated to identify the clo作者: gout109 時間: 2025-3-29 04:02
Tina Thiessen,S?ren Pl?nnigs,Wolfgang Mathisdeo data analysis, wireless sensor network, etc. are used to somewhat solve the congestion in the traffic and to manage the traffic smartly. But in the above said methods having some demerits like much time to take for installation, maintenance cost is very high. Actually, our objective is to develo作者: 車床 時間: 2025-3-29 10:20 作者: Eeg332 時間: 2025-3-29 13:29 作者: organic-matrix 時間: 2025-3-29 17:48
Beyond Automation: The Cognitive IoT. Artificial Intelligence Brings Sense to the Internet of Thingring systems, smart watches, vending machines, smart meters, city traffic, building security systems and much more like this. It has steered the automation to a new high. But IoT alone has limited capability. To reap the actual benefit of IoT, it has to be intelligent. In this chapter, we have reaso作者: ANN 時間: 2025-3-29 21:21 作者: novelty 時間: 2025-3-30 00:04
Modelling and Analysis of Multi-objective Service Selection Scheme in IoT-Cloud Environment,omposed of thousands distributed entities and a number of multimedia smart devices. In recent years, due to the improvement of popularity and capability of smart mobile devices, Mobile Cloud Computing (MCC) gains a considerable attention in Internet of Things (IoT) environment. As there are variety 作者: 密碼 時間: 2025-3-30 07:05
,Cognitive Data Science Automatic Fraud Detection Solution, Based on Benford’S Law, Fuzzy Logic withntribute to very challenging area for data science method applying. Traditional approach of predictive modelling became insufficient, because relaying on few variables as a base of the fraud model are very fragile concept. Reason for that is fact that we are talking about portfolio with low cases of作者: 充氣女 時間: 2025-3-30 09:33
,Reliable Cross Layer Design for E-Health Applications—IoT Perspective,etc. In that, e-health is one of the efficient idea that is decidedly developed for healthcare sectors. IoT devices used in e-health applications are run by battery powered smart objects and low frequency links, which says energy constrained and unreliable nature of IoT network. Thus, providing pote作者: Surgeon 時間: 2025-3-30 13:52 作者: averse 時間: 2025-3-30 18:57
A Review on Security and Privacy Challenges of Big Data,fficiencies, with confidentiality issues. Additionally, technological advances are accompanied with threats that can pose dangerous privacy risks that can be more detrimental than expected. Privacy of data is a source of much concern to researchers throughout the globe. A question that remains unans作者: 安慰 時間: 2025-3-30 23:55
Recent Trends in Deep Learning with Applications, data is collected from devices. Collecting data from all situations and doing pre-processing is complex. Monitoring data through sensors continuously is also complex and expensive. Deep learning algorithms will solve these types of issues. A deep learning method signifies at various levels of repre作者: 完全 時間: 2025-3-31 01:13 作者: GRAIN 時間: 2025-3-31 08:32
Applications of IoT in Healthcare,and network connectivity which enables these objects to collect and exchange data without human intervention. The different technologies comprising IoT are Wireless sensor network, Cloud Computing, Micro-electromechanical systems (MEMS), Semantic technologies and future Internet. This concept makes 作者: Gene408 時間: 2025-3-31 09:44