{"id":"https://openalex.org/W4360585285","doi":"https://doi.org/10.1109/ic3i56241.2022.10072889","title":"Design and Implementation of IoT-ML Based Data Management for Sustained System Integrity","display_name":"Design and Implementation of IoT-ML Based Data Management for Sustained System Integrity","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585285","doi":"https://doi.org/10.1109/ic3i56241.2022.10072889"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072889","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072889","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013557389","display_name":"Alka Kumari","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Alka Kumari","raw_affiliation_strings":["ARKA JAIN University,Department of Computer Science,Jamshedpur,Jharkhand,India","Department of Computer Science, ARKA JAIN University, Jamshedpur, Jharkhand, India"],"affiliations":[{"raw_affiliation_string":"ARKA JAIN University,Department of Computer Science,Jamshedpur,Jharkhand,India","institution_ids":["https://openalex.org/I106826634"]},{"raw_affiliation_string":"Department of Computer Science, ARKA JAIN University, Jamshedpur, Jharkhand, India","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008848312","display_name":"Harshal Shah","orcid":"https://orcid.org/0000-0003-0047-4890"},"institutions":[{"id":"https://openalex.org/I9694494","display_name":"Parul University","ror":"https://ror.org/024v3fg07","country_code":"IN","type":"education","lineage":["https://openalex.org/I9694494"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Harshal Shah","raw_affiliation_strings":["PIET, Parul University,Department of CSE,Vadodara,Gujarat,India","Department of CSE, PIET, Parul University, Vadodara, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"PIET, Parul University,Department of CSE,Vadodara,Gujarat,India","institution_ids":["https://openalex.org/I9694494"]},{"raw_affiliation_string":"Department of CSE, PIET, Parul University, Vadodara, Gujarat, India","institution_ids":["https://openalex.org/I9694494"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013557389"],"corresponding_institution_ids":["https://openalex.org/I106826634"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31332976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":null,"first_page":"762","last_page":"767"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8636916279792786},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.7985742092132568},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7550061941146851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6586332321166992},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5742455720901489},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5404478311538696},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.5393419861793518},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5280545353889465},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4909248650074005},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45600757002830505},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4276345670223236},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.4178258180618286},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16693541407585144},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14503374695777893},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08564862608909607}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8636916279792786},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.7985742092132568},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7550061941146851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6586332321166992},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5742455720901489},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5404478311538696},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.5393419861793518},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5280545353889465},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4909248650074005},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45600757002830505},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4276345670223236},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.4178258180618286},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16693541407585144},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14503374695777893},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08564862608909607},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072889","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072889","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2790979755","https://openalex.org/W2795085730","https://openalex.org/W2890496367","https://openalex.org/W2891730168","https://openalex.org/W2910096450","https://openalex.org/W2916008479","https://openalex.org/W2921980263","https://openalex.org/W2946297772","https://openalex.org/W2979417040","https://openalex.org/W3022414928","https://openalex.org/W3041133507","https://openalex.org/W3080303574","https://openalex.org/W3134096698","https://openalex.org/W3153045320","https://openalex.org/W3162472199","https://openalex.org/W3167089526","https://openalex.org/W4393079463","https://openalex.org/W6775436241","https://openalex.org/W6863645151"],"related_works":["https://openalex.org/W2519603953","https://openalex.org/W2008702788","https://openalex.org/W4200386038","https://openalex.org/W4309713563","https://openalex.org/W4362497183","https://openalex.org/W2389620320","https://openalex.org/W3171772491","https://openalex.org/W2733803478","https://openalex.org/W2554599470","https://openalex.org/W2022352978"],"abstract_inverted_index":{"IoT":[0,40],"&ML":[1],"are":[2,96,200],"two":[3],"examples":[4],"of":[5,11,14,26,37,61,73,130,138,150,157,160,177,210],"recent":[6],"developments":[7],"in":[8],"the":[9,18,27,32,45,85,148,155,208],"management":[10,72,100,156,212],"vast":[12,59],"amounts":[13,60,159],"data":[15,29,75,99,181,211],"(ML).":[16],"In":[17],"past,":[19],"humans":[20],"were":[21,173],"responsible":[22],"for":[23,52,81],"all":[24],"aspects":[25],"big":[28,74,180],"lifecycle,":[30],"including":[31],"collection,":[33],"analysis,":[34],"and":[35,41,66,111,153,170,183,194,197,213],"acquisition":[36],"data.":[38,161],"The":[39,71,186],"Machine":[42],"Learning,":[43],"on":[44,103,202],"other":[46],"hand,":[47],"have":[48,119],"made":[49],"it":[50],"possible":[51],"machines":[53],"rather":[54],"than":[55],"people":[56],"to":[57,78,123,145],"collect":[58],"data,":[62,65],"analyses":[63],"that":[64,87,189,199],"establish":[67],"new":[68],"business":[69],"models.":[70],"has":[76,90,134],"proven":[77],"be":[79,143],"challenging":[80],"larger":[82],"companies,":[83],"despite":[84],"fact":[86],"industry":[88],"4.0":[89],"seen":[91],"tremendous":[92],"success.":[93],"Among":[94],"these":[95],"problems":[97],"with":[98,167,192],"accuracy":[101,209],"brought":[102],"by":[104],"insufficient":[105],"training,":[106],"cloud":[107,214],"computing":[108,116,215],"security":[109,113,117,125],"concerns,":[110],"blockchain":[112,124,151,184,203],"flaws.":[114,126],"Cloud":[115],"concerns":[118],"also":[120],"been":[121],"linked":[122],"As":[127],"a":[128,175],"consequence":[129],"this,":[131],"this":[132],"research":[133],"provided":[135],"an":[136],"explanation":[137],"how":[139],"machine":[140],"learning":[141],"can":[142],"utilized":[144],"both":[146],"bolster":[147],"safety":[149],"technology":[152,204],"enhance":[154],"large":[158],"A":[162],"primary":[163],"poll":[164],"was":[165],"conducted":[166],"fifty":[168],"individuals,":[169],"those":[171],"individuals":[172],"asked":[174],"series":[176],"questions":[178],"regarding":[179],"technologies":[182],"security.":[185,216],"findings":[187],"indicated":[188],"providing":[190],"employees":[191],"training":[193],"establishing":[195],"laws":[196],"regulations":[198],"based":[201],"might,":[205],"respectively,":[206],"increase":[207]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
