Mining associated patterns from wireless sensor networks
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2015
- Type: Text , Journal article
- Relation: IEEE Transactions on Computers Vol. 64, no. 7 (2015), p. 1998-2011
- Full Text: false
- Reviewed:
- Description: Mining of sensor data for useful knowledge extraction is a very challenging task. Existing works generate sensor association rules using occurrence frequency of patterns to extract the knowledge. These techniques often generate huge number of rules, most of which are non-informative or fail to reflect true correlation among sensor data. In this paper, we propose a new type of behavioral pattern called associated sensor patterns which capture association-like co-occurrences as well as temporal correlations which are linked with such co-occurrences. To capture such patterns a compact tree structure, called associated sensor pattern tree (ASP-tree) and a mining algorithm (ASP) are proposed which use pattern growth-based approach to generate all associated patterns with only one scan over dataset. Moreover, when data stream flows through, old information may lose significance for the current time. To capture significance of recent data, ASP-tree is further enhanced to SWASP-tree by adopting sliding observation window and updating the tree structure accordingly. Finally, window size is made dynamically adaptive to ensure efficient resource usage. Different characteristics of the proposed techniques and their computational complexity are presented. Experimental results show that our approach is very efficient in discovering associated sensor patterns and outperforms existing techniques.
Opinion formation dynamics under the combined influences of majority and experts
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2015
- Type: Text , Conference proceedings
- Full Text: false
- Description: Opinion formation modelling is still poorly understood due to the hardness and complexity of the abstraction of human behaviours under the presence of various types of social influences. Two such influences that shape the opinion formation process are: (i) the expert effect originated from the presence of experts in a social group and (ii) the majority effect caused by the presence of a large group of people sharing similar opinions. In real life when these two effects contradict each other, they force public opinions towards their respective directions. Existing models employed the concept of confidence levels associated with the opinions to model the expert effect. However, they ignored the majority effect explicitly, and thereby failed to capture the combined impact of these two influences on opinion evolution. Our model explicitly introduces the majority effect through the use of a concept called opinion consistency, and captures the opinion dynamics under the combined influence of majority supported opinions as well as experts’ opinions. Simulation results show that our model properly captures the consensus, polarization and fragmentation properties of public opinion and reveals the impact of the aforementioned effects. © Springer International Publishing Switzerland 2015.
Share-frequent sensor patterns mining from wireless sensor network data
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2015
- Type: Text , Journal article
- Relation: IEEE Transactions on Parallel and Distributed Systems Vol. 26, no. 12 (2015), p. 3471-3484
- Full Text: false
- Reviewed:
- Description: Mining interesting knowledge from the huge amount of data gathered from WSNs is a challenge. Works reported in literature use support metric-based sensor association rules which employ the occurrence frequency of patterns as criteria. However, consideration of the binary frequency of a pattern is not a sufficient indicator for finding meaningful patterns because it only reflects the number of epochs which contain that pattern in the dataset. The share measure of sensorsets could discover useful knowledge about trigger values associated with a sensor. Here, we propose a new type of behavioral pattern called share-frequent sensor patterns (SFSPs) by considering the non-binary frequency values of sensors in epochs. SFSPs can find a correlation among a set of sensors and hence can improve the performance of WSNs in a resource management process. In this paper, a share-frequent sensor pattern tree (ShrFSP-Tree) has been proposed to facilitate a pattern growth mining technique to discover SFSPs from WSN data. We also present a parallel and distributed method where the ShrFSP-Tree is enhanced into PShrFSP-Tree and its performance is investigated for both homogeneous and heterogeneous systems. Results show that our method is time and memory efficient in finding SFSPs than the existing most efficient algorithms.
Welcome message from the dependsys 2015 program chairs
- Authors: Khan, Latifur , Kamruzzaman, Joarder , Pathan, Al Sakib Khan
- Date: 2015
- Type: Text , Conference paper
- Relation: 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
- Full Text: false
- Reviewed:
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Authors: Rashid, Md. Mamunur , Amar, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Journal article
- Relation: Applied Intelligence Vol. 45, no. 3 (2016), p. 638-651
- Full Text: false
- Reviewed:
- Description: Bearings play a crucial role in rotational machines and their failure is one of the foremost causes of breakdowns in rotary machinery. Their functionality is directly relevant to the operational performance, service life and efficiency of these machines. Therefore, bearing fault identification is very significant. The accuracy of fault or anomaly detection by the current techniques is not adequate. We propose a data mining-based framework for fault identification and anomaly detection from machine vibration data. In this framework, to capture the useful knowledge from the vibration data stream (VDS), we first pre-process the data using Fast Fourier Transform (FFT) to extract the frequency signature and then build a compact tree called SAFP-tree (sliding window associated frequency pattern tree), and propose a mining algorithm called SAFP. Our SAFP algorithm can mine associated frequency patterns (i.e., fault frequency signatures) in the current window of VDS and use them to identify faults in the bearing data. Finally, SAFP is further enhanced to SAFP-AD for anomaly detection by determining the normal behavior measure (NBM) from the extracted frequency patterns. The results show that our technique is very efficient in identifying faults and detecting anomalies over VDS and can be used for remote machine health diagnosis. © 2016, Springer Science+Business Media New York.
An efficient data extraction framework for mining wireless sensor networks
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Conference paper
- Relation: 23rd International Conference, ICONIP 2016; Kyoto, Japan; 16th-21st October 2016; published in Neural Information Processing, Part III (Lecture Notes in Computer Science series) Vol. 9949, p. 491-498
- Full Text:
- Reviewed:
- Description: Behavioral patterns for sensors have received a great deal of attention recently due to their usefulness in capturing the temporal relations between sensors in wireless sensor networks. To discover these patterns, we need to collect the behavioral data that represents the sensor's activities over time from the sensor database that attached with a well-equipped central node called sink for further analysis. However, given the limited resources of sensor nodes, an effective data collection method is required for collecting the behavioral data efficiently. In this paper, we introduce a new framework for behavioral patterns called associated-correlated sensor patterns and also propose a MapReduce based new paradigm for extract data from the wireless sensor network by distributed away. Extensive performance study shows that the proposed method is capable to reduce the data size almost 50% compared to the centralized model.
Carry me if you can : A utility based forwarding scheme for content sharing in tourist destinations
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 22nd Asia-Pacific Conference on Communications, APCC 2016; Yogyakarta, Indonesia; 25th-27th August 2016 p. 261-267
- Full Text:
- Reviewed:
- Description: Message forwarding is an integral part of the decentralized content sharing process as the content delivery success highly depends on it. Existing literature employs spatio-temporal regularity of human movement pattern and pre-existing social relationship to take message forwarding decisions. However, such approaches are ineffectual in environments where those information are unavailable such as a tourist spot or camping site. In this study, we explore the message forwarding techniques in such environments considering the information that are readily available and can be gathered on the fly. We propose a utility based forwarding scheme to select the appropriate forwarder node based on co-location stay time, connectivity and available resources. A higher co-location stay time reflects that the forwarder and the destination node is likely to have more opportunistic contacts, while the connectivity and available resource ensure that the selected forwarder has sufficient neighbours and resources to carry the message forward. Simulation results suggest that the proposed approach attains high hit and success rate and low latency for successful content delivery, which is comparable to those proposed for work-place type scenarios with regular movement pattern and pre-existing relationships. © 2016 IEEE.
Modeling multiuser spectrum allocation for cognitive radio networks
- Authors: Bin Shahid, Mohammad , Kamruzzaman, Joarder , Hassan, Md Rafiul
- Date: 2016
- Type: Text , Journal article
- Relation: Computers & Electrical Engineering Vol. 52, no. (2016), p. 266-283
- Full Text: false
- Reviewed:
- Description: Spectrum allocation scheme in cognitive radio networks (CRNs) becomes complex when multiple CR users concomitantly need to be allocated new and suitable bands once the primary user returns. Most existing schemes focus on the gain of individual users, ignoring the effect of an allocation on other users and rely on the 'periodic sensing and transmission' cycle which reduces spectrum utilization. This paper introduces a scheme that exploits collaboration among users to detect PU's return which relieves active CR users from the sensing task, and thereby improves spectrum utilization. It defines a Capacity of Service (CoS) metric based on the optimal sensing parameters which measures the suitability of a band for each contending user and takes into consideration the impact of allocating a particular band on other band seeking users. The proposed scheme significantly improves capacity of service, reduces interference loss and collision, and hence, enhances dynamic spectrum access capabilities. (C) 2015 Elsevier Ltd. All rights reserved.
PRADD : A path reliability-aware data delivery protocol for underwater acoustic sensor networks
- Authors: Nowsheen, Nusrat , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Network and Computer Applications Vol. 75, no. (2016), p. 385-397
- Full Text: false
- Reviewed:
- Description: Underwater Acoustic Sensor Networks (UASNs) are becoming increasingly promising to monitor aquatic environment. However, reliable data delivery remains challenging due to long propagation delay and high error-rate of underwater acoustic channel, limited energy and inherent mobility of sensor nodes. To address these issues, we propose a protocol called Path Reliability-Aware Data Delivery (PRADD) to improve data transfer reliability for delay tolerant underwater traffic. Data delivery reliability is significantly improved by selecting the next hop forwarder on-the-fly based on its link reliability, reachability to gateways and coverage probability through probabilistic estimation. Data forwarding solution is coupled with delay tolerant networking paradigm to improve delivery with reduced overhead. PRADD does not require active localization technique to estimate the updated location of a sensor node except its initial coarse location. The movement of an anchored node is exploited to estimate its coverage probability. Mobile message ferries are used to collect stored data from one or more nodes, called gateways. A strategy for gateway selection is devised to maximize their lifetime. Simulation results show that PRADD achieves significant performance improvement over competing protocols using low overhead and less energy.
Search and tracking algorithms for swarms of robots: A survey
- Authors: Senanayake, Madhubhashi , Senthooran, Ilankaikaone , Barca, Jan , Chung, Hoam , Kamruzzaman, Joarder , Murshed, Manzur
- Date: 2016
- Type: Text , Journal article
- Relation: Robotics and Autonomous Systems Vol. 75, no. Part B (2016), p. 422-434
- Full Text: false
- Reviewed:
- Description: Target search and tracking is a classical but difficult problem in many research domains, including computer vision, wireless sensor networks and robotics. We review the seminal works that addressed this problem in the area of swarm robotics, which is the application of swarm intelligence principles to the control of multi-robot systems. Robustness, scalability and flexibility, as well as distributed sensing, make swarm robotic systems well suited for the problem of target search and tracking in real-world applications. We classify the works we review according to the variations and aspects of the search and tracking problems they addressed. As this is a particularly application-driven research area, the adopted taxonomy makes this review serve as a quick reference guide to our readers in identifying related works and approaches according to their problem at hand. By no means is this an exhaustive review, but an overview for researchers who are new to the swarm robotics field, to help them easily start off their research. © 2015 Elsevier B.V.
Who are convincing? An experience based opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 30th European Simulation and Modelling Conference, ESM 2016; Las Palmas, Spain; 26th-28th October 2016 p. 167-173
- Full Text: false
- Reviewed:
- Description: Online social network (OSN) is one of the major platforms where our opinions are formed now-a-days and increasing so. Opinion formation dynamics captures the ways public opinions are formed, mainly from two different sources, (i) neighbours' opinions, (ii) external opinions from sources other than the neighbours. In this paper, we formulate an opinion formation model by considering two very important factors, that were ignored or a very little explored in the literature. First, we model the convincing power of the opinions encountered from the two sources. Second, we incorporate the experience of users' previous interactions with the two opinion sources. The problem is formulated as an agent based model where each member of an OSN is represented with an agent and their relationships with a graph. Finally through simulation, we create various scenarios, and apply our model to observe the steady state outcomes of the dynamics. This helps us to study the nature of the public opinions under various influences of our model parameters.
- Description: European Simulation and Modelling Conference 2016, ESM 2016
A rule based inference model to establish strategy-process relationship
- Authors: Dinh, Loan , Karmakar, Gour , Kamruzzaman, Joarder , Stranieri, Andrew
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 30th International Business Information Management Association Conference - Vision 2020: Sustainable Economic development, Innovation Management, and Global Growth, IBIMA 2017; Madrid, Spain; 8th-9th November 2017 Vol. 2017-January, p. 4544-4556
- Full Text: false
- Reviewed:
- Description: An effective relationship between business processes and their relevant strategies helps enterprises achieve their goals. As a business organisation changes quickly, business processes implement their relevant business operations for efficiency. It is important to know which business process achieves which business strategies dynamically. To the best of our knowledge, there exists a framework which aims to automatically determine the strategy-process relationship (Morrison et al. 2011). However, this framework can only work when the effect of the business process is known, but it is difficult to determine such effect accurately. Moreover, by optimising business processes to satisfy business strategies, higher efficiency may be achieved but there is a high chance of losing discriminative information. It therefore creates certain level of uncertainty in achieving accurate strategy-process relationship. To reduce this uncertainty and determine the relationship accurately between business processes and their relevant strategies as defined by business domain experts, in this paper, we introduce a rule-based inference model. This model not only helps business organisations realize which business processes need to be involved for the organisation to achieve their goals when strategies are made, but also reduces the possibility of losing important details from business process optimisation. We have developed a business case to validate our proposed model and the results show that our model can infer the relation accurately for each rule defined for the related business case.
Decentralized content sharing among tourists in visiting hotspots
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2017
- Type: Text , Journal article
- Relation: Journal of Network and Computer Applications Vol. 79, no. (2017), p. 25-40
- Full Text:
- Reviewed:
- Description: Content sharing with smart mobile devices using decentralized approach enables users to share contents without the use of any fixed infrastructure, and thereby offers a free-of-cost platform that does not add to Internet traffic which, in its current state, is approaching bottleneck in its capacity. Most of the existing decentralized approaches in the literature consider spatio-temporal regularity in human movement patterns and pre-existing social relationship for the sharing scheme to work. However, such predictable movement patterns and social relationship information are not available in places like tourist spots where people visit only for a short period of time and usually meet strangers. No works exist in literature that deals with content sharing in such environment. In this work, we propose a content sharing approach for such environments. The group formation mechanism is based on users' interest score and stay probability in the individual region of interest (ROI) as well as on the availability and delivery probabilities of contents in the group. The administrator of each group is selected by taking into account its probability of stay in the ROI, connectivity with other nodes, its trustworthiness and computing and energy resources to serve the group. We have also adopted an incentive mechanism as encouragement that awards nodes for sharing and forwarding contents. We have used network simulator NS3 to perform extensive simulation on a popular tourist spot in Australia which facilitates a number of activities. The proposed approach shows promising results in sharing contents among tourists, measured in terms of content hit, delivery success rate and latency.
- Description: Content sharing with smart mobile devices using decentralized approach enables users to share contents without the use of any fixed infrastructure, and thereby offers a free-of-cost platform that does not add to Internet traffic which, in its current state, is approaching bottleneck in its capacity. Most of the existing decentralized approaches in the literature consider spatio-temporal regularity in human movement patterns and pre-existing social relationship for the sharing scheme to work. However, such predictable movement patterns and social relationship information are not available in places like tourist spots where people visit only for a short period of time and usually meet strangers. No works exist in literature that deals with content sharing in such environment. In this work, we propose a content sharing approach for such environments. The group formation mechanism is based on users' interest score and stay probability in the individual region of interest (ROI) as well as on the availability and delivery probabilities of contents in the group. The administrator of each group is selected by taking into account its probability of stay in the ROI, connectivity with other nodes, its trustworthiness and computing and energy resources to serve the group. We have also adopted an incentive mechanism as encouragement that awards nodes for sharing and forwarding contents. We have used network simulator NS3 to perform extensive simulation on a popular tourist spot in Australia which facilitates a number of activities. The proposed approach shows promising results in sharing contents among tourists, measured in terms of content hit, delivery success rate and latency. © 2016
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2017
- Type: Text , Journal article
- Relation: Information Sciences Vol. 379, no. (2017), p. 128-145
- Full Text: false
- Reviewed:
- Description: Wireless sensor networks (WSNs) will be an integral part of the future Internet of Things (loT) environment and generate large volumes of data. However, these data would only be of benefit if useful knowledge can be mined from them. A data mining framework for WSNs includes data extraction, storage and mining techniques, and must be efficient and dependable. In this paper, we propose a new type of behavioral pattern mining technique from sensor data called regularly frequent sensor patterns (RFSPs). RFSPs can identify a set of temporally correlated sensors which can reveal significant knowledge from the monitored data. A distributed data extraction model to prepare the data required for mining RFSPs is proposed, as the distributed scheme ensures higher availability through greater redundancy. The tree structure for RFSP is compact requires less memory and can be constructed using only a single scan through the dataset, and the mining technique is efficient with low runtime. Current mining techniques in the literature on sensor data employ a single memory-based sequential approach and hence are not efficient. Moreover, usage of the. MapReduce model for the distributed solution has not been explored extensively. Since MapReduce is becoming the de facto model for computation on large data, we also propose a parallel implementation of the RFSP mining algorithm, called RFSP on Hadoop (RFSP-H), which uses a MapReduce-based framework to gain further efficiency. Experiments conducted to evaluate the compactness and performance of the data extraction model, RFSP-tree and RFSP-H mining show improved results. (C) 2016 Elsevier Inc. All rights reserved.
Dynamic content distribution for decentralized sharing in tourist spots using demand and supply
- Authors: Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal , Kaisar, Shahriar
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 13th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2017; Valencia, Spain; 26th-30th June 2016 p. 2121-2126
- Full Text: false
- Reviewed:
- Description: Decentralized content sharing (DCS) is emerging as an important platform for sharing contents among smart mobile device users, where devices form an ad-hoc network and communicate opportunistically. Existing DCS approaches for tourist spot like scenarios achieve low delivery success rate and high latency as they do not focus on dynamic demand for contents which usually vary considerably with the number of visitors present or occurrence of some influencing events. The amount of available supply also changes because of the nodes leaving the area. Only way to improve content delivery service is to distribute the contents in strategic positions based on dynamic demand and supply. In this paper, we propose a dynamic content distribution (DCD) method considering dynamic demand and supply for contents in tourist spots. Simulation results validate the improvement of the proposed approach. © 2017 IEEE.
- Description: 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017
Exclusive use spectrum access trading models in cognitive radio networks : A survey
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2017
- Type: Text , Journal article , Review
- Relation: IEEE Communications Surveys and Tutorials Vol. 19, no. 4 (2017), p. 2192-2231
- Full Text: false
- Reviewed:
- Description: Spectrum frequency is a valuable resource for wireless communication but very limited in its availability. Due to the extensive use and ever increasing demand of spectrum bands by wireless devices and newer applications, unlicensed band is becoming congested, while licensed bands are found mostly underutilized. To solve this problem of spectrum scarcity, cognitive radio (CR) devices can share licensed bands opportunistically in several ways. We analyze the three main dynamic sharing models (commons, shared-use, and exclusive-use) proposed in literature with extensive analysis of the exclusive-use model, which is the most promising as it provides benefits to both licensed and unlicensed users. In this model, CR-enabled service providers, also known as secondary service providers, can buy or lease spectrum from licensed, known as primary service providers, for both short and long duration and gain exclusive rights to access the spectrum. In this survey paper, exclusive-use trading approaches, namely, game theory, market equilibrium, and classical, hybrid and other models are reviewed extensively and their characteristics and differences are highlighted and compared. We also propose possible future research directions on exclusive-use CR model. © 1998-2012 IEEE.
Exploiting evolving trust relationships in the modelling of opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017; Taipei, Taiwan; 27th-29th March 2017 p. 872-879
- Full Text: false
- Reviewed:
- Description: Mass participation of the members of a society in discussions to resolve issues related to a topic leads to forming public opinion. The timeline of the underlying dynamics goes through several distinguishable phases, and experiences transition from one to another. After initiated by concerned individuals, it draws active attention from almost everyone, and with time progression, people's participation starts declining as the issues are resolved or lost attraction. The existing works in the literature to capture the opinion formation process pay attention to model the dynamics in its active phase and thus ignore the other phases and the corresponding phase transitions. Trust relationships among the participants dynamically shape their interactions in different stages of the dynamics. Existing works fail to incorporate trust in defining the extent of influence one has on others, as they define the social relationships in the opinion space. To address this issue, we adopt simulated annealing to model the transitional behaviour of the dynamics, and then, amalgamate peoples relationships in the trust space with that in the opinion space to define the meta-heuristics of the algorithm for capturing the dynamical properties of the process. Finally, through simulation, we observe that our model is insightful in representing peoples' evolving behaviour in the different stages of opinion formation process, and consequently, can capture the various properties of the steady-state outcomes of the dynamics. © 2017 IEEE.
- Description: Proceedings - International Conference on Advanced Information Networking and Applications, AINA
Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers
- Authors: Giti, Jishan , Srinivasan, Bala , Kamruzzaman, Joarder
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 2017 IEEE Globecom Workshops, 36th IEEE Global Communications Conference; Singapore, Singapore; 4th-8th December 2017
- Full Text: false
- Reviewed:
- Description: We consider the problem of security in wireless multicasting for a multiple-input multiple-output (MIMO) relay-aided system. The network suffers from a group of adaptive eavesdroppers who can act as both simple eavesdroppers and hostile jammers. This paper formulates the impact of friendly jammers to improve secured communication. We derived the expressions for secrecy multicast capacities considering the absence and presence of friendly jammers. The best relay for transmission is chosen from a group of relays that aids to achieve the maximum secrecy capacity while the best jammer is selected based on competitive interference price. Numerical results show that the achievable secrecy multicast capacity increases significantly in the presence of jammer to nullify the effect of adversaries. Results under different scenarios of varying jamming and relay powers demonstrate the efficacy of friendly jammers in providing physical layer security.
- Description: We consider the problem of security in wireless multicasting for a
Periodic associated sensor patterns mining from wireless sensor networks
- Authors: Rashid, Mamunur , Kamruzzaman, Joarder , Gondal, Iqbal , Hassan, Rafiul
- Date: 2017
- Type: Text , Conference proceedings
- Relation: Proceedings of the 24th International Conference on Neural Information Processing (ICONIP 2017); Guangzhou, China; 14/11/2017-18/11/2017 p. 247-255
- Full Text: false
- Reviewed:
- Description: Mining interesting knowledge from the massive amount of data gathered in wireless sensor networks is a challenging task. Works reported in literature all-confidence measure based associated sensor patterns can captures association-like co-occurrences and the strong temporal correlations implied by such co-occurrences in the sensor data. However, when the user given all-confidence threshold is low, a huge amount of patterns are generated and mining these patterns may not be space and time efficient. Temporal periodicity of pattern appearance can be regarded as an important criterion for measuring the interestingness of associated patterns in WSNs. Associated sensor patterns that occur after regular intervals is called periodic associated sensor patterns. Even though mining periodic associated sensor patterns from sensor data stream is extremely important in many real-time applications, no such algorithm has been proposed yet. In this paper, we propose a compact tree structure called Periodic Associated Sensor Pattern-tree (PASP-tree) and an efficient mining approach for finding periodic associated sensor patterns (PASPs) from WSNs. Extensive performance analyses show that our technique is time and memory efficient in finding periodic associated sensor patterns.
Significance level of a query for enterprise data
- Authors: Thi Ngoc Dinh, Loan , Karmakar, Gour , Kamruzzaman, Joarder , Stranieri, Andrew , Das, Rajkumar
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 30th International Business Information Management Association Conference - Vision 2020: Sustainable Economic development, Innovation Management, and Global Growth, IBIMA 2017; Madrid, Spain; 8th-9th November 2017 Vol. 2017-January, p. 4494-4504
- Full Text: false
- Reviewed:
- Description: To operate enterprise activities, a large number of queries need to be processed every day through an enterprise system. Consequently, such a system frequently faces hugely overloaded information and incurs high delay in producing query responses for big data. This is because, traditional queries are normally treated with equal importance. With the advent of big data and its use in enterprise systems and the growth of process complexity, the traditional approach of query processing is no more suitable as it does not consider semantic information and captures all data irrespective of their relevance to a business organization, which eventually increases the computational time in both big data collection and analysis. The significance level of a query can make a trade-off between query response delay and the extent of data collection and analysis. This motivates us to concentrate on determining the significance level of a query considering its importance to an enterprise system. To our knowledge, no such approach is available in the literature. To bridge this research gap, this paper, for the first time, proposes an approach to determine the significance level of a query to prioritize them with the relevance to a business organization. As business processes play key roles in any enterprise system and all business processes are not equally important, this is done by determining the semantic similarity between a query and the processes of a business organization and the importance of a business process to that organization. With a case study on an enterprise system of a retail company, the results produced by our proposed approach have shown that significance level is higher for more important queries compared to the less important ones.