Skip to main content

Organization Internet of Things (IoTs): Supervised, Unsupervised, and Reinforcement Learning

  • Chapter
  • First Online:
Business Intelligence for Enterprise Internet of Things

Abstract

Currently, in the entire economic globe, the aspect of downtime has been considered as a vital performance determinant for field service industries. The introduction of Internet of Things (IoTs) has initiated unique advancement probabilities to different organizations such as field service and manufacturing company. The ideology of IoTs is a fundamental segment of the upcoming generation of data. Wireless sensor networking includes self-regulating disseminated smart sensor gateways and nodes. The distinct sensors persistently consider external physical data, like sound, vibration, and temperature. In this chapter, we evaluated the present machine learning (ML)-based remedies that mitigate various security problems in IoTs. One of the issues to be mitigated includes the accessibility and authentication controls in IoTs. Authentication remains to be the vital security element in IoTs. The users have to be authenticated so as to utilize various applications and services of IoTs. Normally, IoTs services and applications are centered on information exchange over various platforms. The information obtained from IoTs devices is processed, pre-processed, and forwarded via decision-support frameworks to enhance user experience. All these processes are varied and depend on the fundamental IoTs architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anandakumar, H., & Umamaheswari, K. (March 2017). Supervised machine learning techniques in cognitive radio networks during cooperative spectrum handovers. Cluster Computing, 20(2), 1505–1515.

    Article  Google Scholar 

  2. Anandakumar, H., & Umamaheswari, K. (October 2018). A bio-inspired swarm intelligence technique for social aware cognitive radio handovers. Computers & Electrical Engineering, 71, 925–937. https://doi.org/10.1016/j.compeleceng.2017.09.016.

    Article  Google Scholar 

  3. Adli Mehr,K., &Musevi,N. J. (2016).Security bootstrapping of mobile ad hoc networks using identity-based cryptography. Security and Communication Networks, 9(11),1374–1383, Available: https://doi.org/10.1002/sec.1423

  4. Bredt, S. (2019). Artificial Intelligence (AI) in the financial sector—Potential and public strategies.Frontiers in Artificial Intelligence, 2, Available: https://doi.org/10.3389/frai.2019.00016

  5. Chittaro,L.,&Ranon, R. (2004). Hierarchical model-based diagnosis based on structural abstraction. Artificial Intelligence, 155(1–2), 147–182. Available: https://doi.org/10.1016/j.artint.2003.06.003

  6. Chatzigiannakis,I., &Nikoletseas, S. (2004) Design and analysis of an efficient communication strategy for hierarchical and highly changing ad-hoc mobile networks. Mobile Networks and Applications, 9(4), 319–332. Available: https://doi.org/10.1023/b:mone.0000031591.74793.52

  7. Haldorai, & Kandaswamy, U. (2019). Supervised machine learning techniques in intelligent network handovers. In EAI/Springer innovations in communication and computing (pp. 135–154). New York: Springer. https://doi.org/10.1007/978-3-030-15416-5_7.

    Chapter  Google Scholar 

  8. Delgadillo,G. Ó. (2016).Fishes and mobile macroinvertebrates of artificial habitats in Taganga Bay, Colombian Caribbean. Bulletin of Marine and Coastal Research, 38(1), Available:https://doi.org/10.25268/bimc.invemar.2009.38.1.338.

  9. Dubois,D.,&Prade,H. (2001). Special issue of the journal Artificial Intelligence on “Fuzzy set and possibility theory-based methods in artificial intelligence.”Artificial Intelligence, 127(2), 269–270, Available: https://doi.org/10.1016/s0004-3702(01)00080-7.

  10. Dubois,D.,&Prade, H. (2003).Fuzzy set and possibility theory-based methods in artificial intelligence. Artificial Intelligence, 148(1–2), 1–9, Available: https://doi.org/10.1016/s0004-3702(03)00118-8.

  11. Ebendt,R.&Drechsler, R. (2009).WeightedA∗search – Unifying view and application. Artificial Intelligence, 173(14), 1310–1342, Available: https://doi.org/10.1016/j.artint.2009.06.004.

  12. Giudici, P. (2018).Fintech risk management: A research challenge for artificial intelligence in finance. Frontiers in Artificial Intelligence, 1. Available: https://doi.org/10.3389/frai.2018.00001.

  13. Gong,T., &Bhargava, B. (2012).Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model. Security and Communication Networks, 6(1), 58–68, Available: https://doi.org/10.1002/sec.530.

  14. Gu,B., &Chen, I. (2005).Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems. Mobile Networks and Applications, 10(4), 453–463, Available: https://doi.org/10.1007/s11036-005-1557-x.

  15. Guo, M. (2011).A simple and rapid authentication protocol in mobile networks. Security and Communication Networks, 7(12), 2596–2601, Available: https://doi.org/10.1002/sec.386.

  16. Jávor,A.,&Szűcs, G. (1998).Simulation and optimization of urban traffic using AI. Mathematics and Computers in Simulation, 46(1), 13–21. Available: https://doi.org/10.1016/s0378-4754(97)00154-7.

  17. Kharin, Y. (1994).Artificial intelligence frontiers in statistics AI and statistics III. Knowledge-Based Systems, 7(1), 57–58, Available: https://doi.org/10.1016/0950-7051(94)90017-5.

  18. Lasi, H. (2013).Industrial intelligence – A business intelligence-based approach to enhance manufacturing engineering in industrial companies.Procedia CIRP, 12, 384–389, Available: https://doi.org/10.1016/j.procir.2013.09.066.

  19. Leo Kumar, S. (2017).State of the art-intense review on artificial intelligence systems application in process planning and manufacturing. Engineering Applications of Artificial Intelligence, 65, 294–329. Available: https://doi.org/10.1016/j.engappai.2017.08.005.

  20. Marquis,P.&Schwind,N. (2014).Lost in translation: Language independence in propositional logic – Application to belief change. Artificial Intelligence, 206, 1–24, Available: https://doi.org/10.1016/j.artint.2013.09.005.

  21. Mihăiţă, A.,Dupont,L.,&Camargo,M. (2018).Multi-objective traffic signal optimization using 3D mesoscopic simulation and evolutionary algorithms. Simulation Modelling Practice and Theory, 86, 120–138, Available: https://doi.org/10.1016/j.simpat.2018.05.005.

  22. O’Halloran,S.,&Nowaczyk, N. (2019).An artificial intelligence approach to regulating systemic risk. Frontiers in Artificial Intelligence, 2, Available: https://doi.org/10.3389/frai.2019.00007.

  23. Panneerselvam, S. (2019).Survey of artificial intelligence used in industries a review. Industrial Engineering Journal, 12(5), Available:https://doi.org/10.26488/iej.12.5.1188.

  24. Park,S.,&Moo,Y. S. (2010).Updating route information in mobile ad hoc networks. Journal of Mobile Communication, 4(1), 27–32, Available: https://doi.org/10.3923/jmcomm.2010.27.32.

  25. Suganya, M.,&Anandakumar, H. (December 2013).Handover based spectrum allocation in cognitive radio networks. In 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE). doi:https://doi.org/10.1109/icgce.2013.6823431. doi:https://doi.org/10.4018/978-1-5225-5246-8.ch012

  26. Rao, M. (1992).Frontiers and challenges of intelligent process control. Engineering Applications of Artificial Intelligence, 5(6), 475–481. Available: https://doi.org/10.1016/0952-1976(92)90024-e.

  27. Tünay, O. (2010).Chemical oxidation applications for industrial wastewaters. Water Intelligence Online, 9, Available: https://doi.org/10.2166/9781780401416.

  28. Varaprasad, G. (2012).Stable routing algorithm for mobile ad hoc networks using mobile agent. International Journal of Communication Systems, 27(1), 163–170, Available: https://doi.org/10.1002/dac.2354.

  29. Vôhandu, L. (1994).Artificial intelligence frontiers in statistics. Engineering Applications of Artificial Intelligence, 7(1), 87, Available: https://doi.org/10.1016/0952-1976(94)90049-3.

  30. Wu, Y.,Deng,S.,&Huang, H. (2012).Information propagation through opportunistic communication in mobile social networks. Mobile Networks and Applications, 17(6), 773–781, Available: https://doi.org/10.1007/s11036-012-0401-3.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haldorai, A., Ramu, A., Suriya, M. (2020). Organization Internet of Things (IoTs): Supervised, Unsupervised, and Reinforcement Learning. In: Haldorai, A., Ramu, A., Khan, S. (eds) Business Intelligence for Enterprise Internet of Things. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-44407-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-44407-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-44406-8

  • Online ISBN: 978-3-030-44407-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics