The Internet of Things (IoT) today already connects billions of different IoT devices with the Internet. With the advent of new services and services, new challenges arise: how to make a cloud service publicly availab...
The Internet of Things (IoT) today already connects billions of different IoT devices with the Internet. With the advent of new services and services, new challenges arise: how to make a cloud service publicly available, and reliable, how and where to store data. The article considers an example of the implementation of an IoT application with cloud components, considers the implementation of connecting IoT components to a cloud provider, and presents the IoT architecture. The focus is on the architecture and implementation of data exchange protocols, the implementation of protocols? for data collection and management of remote system components Given the large amount of data transmitted by IoT devices to the cloud, data compression and interaction with cloud services is a very relevant topic. Therefore, the article also offers recommendations for managing the traffic of IoT devices. The purpose of this article is to provide a description and algorithm for connecting IoT devices to the cloud, to bring together disparate information, and make it open and understandable to beginners and academic researchers.
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various fea...
详细信息
The methods of digital and pulse signal modulation in modern computer systems of data transmission are analysed. Process of forming non-redundant coding that use the errors detection and correction in the Galois basis...
详细信息
ISBN:
(数字)9781728155661
ISBN:
(纸本)9781728155678
The methods of digital and pulse signal modulation in modern computer systems of data transmission are analysed. Process of forming non-redundant coding that use the errors detection and correction in the Galois basis are offered. Structures of special processors for forming signal correcting codes are built. Working algorithms for proposed coding methods are developed and their software implementation are offered. Circuit design of Galois code sequence generator is implemented. Work simulation and synthesis on FPGA of Xilinx are performed.
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent Systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were careful...
详细信息
ISBN:
(数字)9783319083261
ISBN:
(纸本)9783319083254
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent Systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on complex networks and data stream mining; data mining methods; intelligent systems applications; knowledge representation in databases and systems; textual data analysis and mining; special session: challenges in text mining and semantic information retrieval; special session: warehousing and OLAPing complex, spatial and spatio-temporal data; ISMIS posters.
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for...
详细信息
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for calculating of e-learning traffic peakedness is proposed. Simulation and calculation results peakedness is analyzed.
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host,...
详细信息
ISBN:
(纸本)9781538606384
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host, which could be accessed from other networks, is conducted. Proposed metric considers a possibility of attack propagation within the network.
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site “Beech forests of the Carpathians and ancient beech forests of Germany” usin...
详细信息
ISBN:
(数字)9781728167602
ISBN:
(纸本)9781728167619
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site “Beech forests of the Carpathians and ancient beech forests of Germany” using actual data and information from Gorgany Nature Reserve in Ivano-Frankivsk, Ukraine. The features of the structure and functions of background monitoring of the protected natural resources, forests and wildlife of Gorgany Nature Reserve is based on modern methods of collecting and processing of digital data, implementation of the principles of Internet of Things and cloud technologies, combined with GPS-systems, sensor networks with the use of optical and fiber-optic telecommunication channels. The information technology of the background monitoring system is based on figurative cluster models of monitoring objects according to theoretical principles of statistical, correlatory, spectral, cluster, logic-statistical and entropy analysis.
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various fea...
详细信息
ISBN:
(数字)9798350366846
ISBN:
(纸本)9798350366853
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various features related to fundamental student traits and behaviours that manage massive amounts of data efficiently processes these. To handle student records that included information about students' behaviour and how it related to their academic performance, the companies employed models of classification with mining concepts. Additionally, the quality of result classification can be substantially improved by using learning analytics and Educational Data Mining (EDM). The educational establishments are making an effort to lower the low student performance. To address this issue, numerous methods for assessing student performance have been devised, allowing the relevant faculties to intervene and enhance the final product. Three classes—Low Performance Student, Average Student, and Smart Student—were created using the K-Mean Clustering methodology for classifying student records. Features including grade point, number of deficits, student attendance, medium of education, and board of education are taken into account when classifying the data. In this case, the WEKA tool is also utilized for implementing the model and outcome assessments.
暂无评论