“…This makes the many business sector to penetrate into the field of E-commerce, in order to make their business more profitable and provide easy way for the public to access the business platform on demand. 1 This transformation has lead to the generation of extensive quantity of transaction data in digital form. Over the period of time many E-commerce sector where trying to analyze those transaction data so as to improve their profit by understanding their customers behavior.…”
Section: Putation (Ec)-based Algorithms Have Been Offered Asmentioning
confidence: 99%
“…Therefore, the fitness role is essential for deciding the chromosome (itemset) which satisfies the (Util min ). The approach used to measure the utility of itemset by 22 is used as fitness function in the proposed work as shown in Equation (1).…”
Section: Itemset Pruning Ga Population Initialization and Encodingmentioning
confidence: 99%
“…Enormous growth of networking technologies had made the internet to become indispensable in every humans life. This makes the many business sector to penetrate into the field of E‐commerce, in order to make their business more profitable and provide easy way for the public to access the business platform on demand 1 . This transformation has lead to the generation of extensive quantity of transaction data in digital form.…”
Mining high utility itemsets (HUI) is a current thrust field in data mining that has received numerous methodologies for addressing it effectively. The difficulty with HUI is to locate a number of items that have a high degree of utility in comparison to other different sets in a transaction database. Traditional accurate HUIM algorithms usually have to solve the exponential problem of big search spaces when the size or number of different items in the database is quite vast.
“…This makes the many business sector to penetrate into the field of E-commerce, in order to make their business more profitable and provide easy way for the public to access the business platform on demand. 1 This transformation has lead to the generation of extensive quantity of transaction data in digital form. Over the period of time many E-commerce sector where trying to analyze those transaction data so as to improve their profit by understanding their customers behavior.…”
Section: Putation (Ec)-based Algorithms Have Been Offered Asmentioning
confidence: 99%
“…Therefore, the fitness role is essential for deciding the chromosome (itemset) which satisfies the (Util min ). The approach used to measure the utility of itemset by 22 is used as fitness function in the proposed work as shown in Equation (1).…”
Section: Itemset Pruning Ga Population Initialization and Encodingmentioning
confidence: 99%
“…Enormous growth of networking technologies had made the internet to become indispensable in every humans life. This makes the many business sector to penetrate into the field of E‐commerce, in order to make their business more profitable and provide easy way for the public to access the business platform on demand 1 . This transformation has lead to the generation of extensive quantity of transaction data in digital form.…”
Mining high utility itemsets (HUI) is a current thrust field in data mining that has received numerous methodologies for addressing it effectively. The difficulty with HUI is to locate a number of items that have a high degree of utility in comparison to other different sets in a transaction database. Traditional accurate HUIM algorithms usually have to solve the exponential problem of big search spaces when the size or number of different items in the database is quite vast.
IoT is an evolving technology used in enormous applications in order to reduce the human intervention. As IoT is used in hybrid environment where it has to enable communication between multidisciplinary components it is facing lot more challenges. Security is the main issue had to be addressed. IoT devices are with limited power consumption; hence it’s not possible implement existing security algorithms as it is. Security attacks are increasing day by day; hence the dynamic solution has to be given rather than static solution. Machine learning is a promised technology that can be used in order to solve the security issues. This paper list out various work so far carried out in the area of machine learning for IoT security and solutions provided with future direction of research in this area.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.