scispace - formally typeset
Journal ArticleDOI

G-spamine

Reads0
Chats0
TLDR
The objective is to find temporal patterns whose true prevalence values vary similar to a reference support time sequence satisfying subset constraints through estimating temporal pattern support bounds and using a novel fuzzy dissimilarity measure, named G-SPAMINE.
About
This article is published in Future Generation Computer Systems.The article was published on 2017-09-01. It has received 152 citations till now. The article focuses on the topics: Temporal database.

read more

Citations
More filters
Proceedings ArticleDOI

Internet of Things: Survey and open issues of MQTT protocol

TL;DR: This paper provides an overview for one of the most popular application layer protocols that is MqTT, including its architecture, message format, MQTT scope, and Quality of Service (QoS) for the MQ TT levels.
Journal ArticleDOI

GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things

TL;DR: The approach GARUDA is based on clustering feature patterns incrementally and then representing features in different transformation space through using a novel fuzzy Gaussian dissimilarity measure, which resulted in the improved accuracy and detection rates for U2R and R2L attack classes when compared to other approaches.
Journal ArticleDOI

A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining

TL;DR: A novel approach for estimation of temporal association pattern prevalence values and a novel temporal fuzzy similarity measure which holds monotonicity to find similarity between any two temporal patterns are proposed.
Journal ArticleDOI

ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function

TL;DR: A novel dissimilarity measure whose design is a function of product based gaussian membership function through extending the similarity function proposed in earlier research (G-Spamine) is proposed and the correctness and completeness of proposed approach is also proved analytically.
Journal ArticleDOI

A novel image encryption scheme based on Arnold scrambling and Lucas series

TL;DR: A digital contents encryption scheme based Arnold scrambling and Lucas series, which is very simple to implement but almost impossible to breach is developed in this article.
References
More filters
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Middleware for Internet of Things: A Survey

TL;DR: This paper outlines a set of requirements for IoT middleware, and presents a comprehensive review of the existing middleware solutions against those requirements, and open research issues, challenges, and future research directions are highlighted.
Journal ArticleDOI

State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing

TL;DR: A survey of integration components: Cloud platforms, Cloud infrastructures and IoT Middleware is presented and some integration proposals and data analytics techniques are surveyed as well as different challenges and open research issues are pointed out.
Journal ArticleDOI

Trustworthiness Management in the Social Internet of Things

TL;DR: This work defines two models for trustworthiness management starting from the solutions proposed for P2P and social networks and shows how the proposed models can effectively isolate almost any malicious nodes in the network at the expenses of an increase in thenetwork traffic for feedback exchange.
Related Papers (5)