Data Mining
The process of identifying patterns from large sets of data is commonly known as data mining. Data mining can be conducted with all methods at the interaction of database systems, machine learning and statistics (Witten, 2016). Some of the most notable uses of data mining techniques are as follows:
This is the process where massive chunks of unstructured text data is is explored and analysed. Software are used to identify recognizable topics, patterns and concepts or attributes in the respective collectives. This is commonly used in the following fields:
Web Mining
Web mining allows the pattern recognition techniques with the help of content and structure mining abilities. This data mining application aids in the process of discovering necessary data patterns from the WWW or World Wide Web. Some of its renowned use cases are as follows:
Social Mining
Social mining or social media mining is one of the most common mining trends of the modern era. The process of analysing, representing, and retrieving meaningful patterns from data that is collected from social media that is a product of several user interactions of posts and information of the respective platforms. This involves the collection and analysis of data collected from the perspective of user’s emotional attachment. This is in turn used in the process of content management. Highlighting likewise content and adverts is an important use case of this process.
Internet of Technology, which is most commonly known as IoT can be defined as a network of several devices or appliances that are connected to a control system. This allows them to be remotely operated or work on their own, based on AI or Artificial Intelligence aids. These IoT devices can be so operated to work on their own, interact with each other and exchange data as necessary. Some of the major analytics techniques that are applied in IoT are as follows:
The advantages of IoT are as follows:
There arises various complexities with IoT. Some commonly mentioned disadvantages are as follows:
EmIoT or Emotional Internet of Things is the technology that allows the IoT devices to interact on a greater aspect with the users’ emotional factors to create a better data set for analytics. The data that are collected from this technology helps in the emotional analysis process. It records data that are related to the deepest personal factors of the inheritants. This includes data like how a user reacts to certain situations or how the user interacts with the IoT devices. They gather information that consist of user’s voice pitch level or sensor data about the user’s catabolism, depending on various familiar situations that the device can simulate or note. IoT on the other hand, is designed to only collect, share and analyse the data that they are meant to handle. It is the EmIoT that aids the integrated IoT devices with data feedbacks.
Important examples of EmIoT devices are the EmoSPARK and the Feel Wristband. The EmoSPARK is a smart home device that creates an emotional profile of the inhabitants based on their vocal characteristics, choice of words and also facial recognition. This device can alter the IoT devices’’ operation based on the real-time collected emotional data. This includes changing the music or video playlist based on the user’s mood or general daily habits.
The Feel Wristband uses sensors to read pulse, body temperature and skin responses. These are useful in health assistance purposes (Mano et al., 2016). The collection of these data helps the device to create a real-time emotional profile of the user and hence instruct the connected IoT devices to operate properly. For example, if the band reads that the user has a hot skin temperature and a pounding heart, it may advice the mobile application that it is connected to, to call the doctor or it may even bring down the temperature of the AC if connected (Kelly, Suryadevara & Mukhopadhyay, 2013).
EmIoT is developed and designed to frame the feelings of the users in a special manner so as to add a deeper layer understanding of the data that they gather. While, IoT devices only face the threat of security and excess human dependence, EmIoT creates a fine line of competition between humans and the robots. Cui (2016), says that robots are getting smarter with time and a time will come when these will take over almost every network accessible device usage duties from the control human beings.
References
Aggarwal, C. C., & Zhai, C. (Eds.). (2012). Mining text data. Springer Science & Business Media.
Barbosa, R., Nunes, D., Figueira, A., Aguiar, H., Silva, J. S., Gonzalez, F., … & Sinche, S. (2016, October). An architecture for emotional smartphones in Internet of Things. In Ecuador Technical Chapters Meeting (ETCM), IEEE (pp. 1-5). IEEE.
Bhayani, M., Patel, M., & Bhatt, C. (2016). Internet of Things (IoT): In a way of smart world. In Proceedings of the international congress on information and communication technology (pp. 343-350). Springer, Singapore.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68). Palgrave Macmillan, London.
Formisano, C., Pavia, D., Gurgen, L., Yonezawa, T., Galache, J. A., Doguchi, K., & Matranga, I. (2015, August). The advantages of IoT and cloud applied to smart cities. In Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference on (pp. 325-332). IEEE.
He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587-1595.
Kelly, S. D. T., Suryadevara, N. K., & Mukhopadhyay, S. C. (2013). Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sensors Journal, 13(10), 3846-3853.
Khattab, A., Abdelgawad, A., & Yelmarthi, K. (2016, December). Design and implementation of a cloud-based IoT scheme for precision agriculture. In Microelectronics (ICM), 2016 28th International Conference on (pp. 201-204). IEEE.
Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
Mano, L. Y., Faiçal, B. S., Nakamura, L. H., Gomes, P. H., Libralon, G. L., Meneguete, R. I., … & Ueyama, J. (2016). Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Computer Communications, 89, 178-190.
Sanchez, L., Muñoz, L., Galache, J. A., Sotres, P., Santana, J. R., Gutierrez, V., … & Pfisterer, D. (2014). SmartSantander: IoT experimentation over a smart city testbed. Computer Networks, 61, 217-238.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on (pp. 230-234). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download