Predictive Analytics by Using Bayesian Model Averaging for Large-Scale Internet of Things

被引:9
作者
Zhu, Xinghui [1 ]
Kui, Fang [1 ]
Wang, Yongheng [2 ]
机构
[1] Hunan Agr Univ, Coll Informat Sci & Technol, Changsha 410128, Hunan, Peoples R China
[2] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2013年
关键词
NETWORKS;
D O I
10.1155/2013/723260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Massive events can be produced today because of the rapid development of the Internet of Things (IoT). Complex event processing, which can be used to extract high-level patterns from raw data, has become an essential part of the IoT middleware. Prediction analytics is an important technology in supporting proactive complex event processing. In this paper, we propose the use of dynamic Bayesian model averaging to develop a high-accuracy prediction analytic method for large-scale IoT application. This method, which is based on a new multilayered adaptive dynamic Bayesian network model, uses Gaussian mixture models and expectation-maximization inference for basic Bayesian prediction. Bayesian model averaging is implemented by using Markov chain Monte Carlo approximation, and a novel dynamic Bayesian model averaging method is proposed based on event context clustering. Simulation experiments show that the proposed prediction analytic method has better accuracy compared to traditional methods. Moreover, the proposed method exhibits acceptable performance when implemented in large-scale IoT applications.
引用
收藏
页数:10
相关论文
共 29 条
[1]  
[Anonymous], 2011, 3 INT C ADV SYST SIM
[2]  
[Anonymous], 2002, The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems
[3]  
[Anonymous], 2001, PROC 18 INT C MACH L
[4]  
Artikis A., 2012, P 6 ANN ACM INT C DI, P32
[5]   Predicting traffic flow using Bayesian networks [J].
Castillo, Enrique ;
Maria Menendez, Jose ;
Sanchez-Cambronero, Santos .
TRANSPORTATION RESEARCH PART B-METHODOLOGICAL, 2008, 42 (05) :482-509
[6]  
Cho HC, 2008, INT J CONTROL AUTOM, V6, P444
[7]   RFID Authentication Efficient Proactive Information Security within Computational Security [J].
Dolev, Shlomi ;
Kopeetsky, Marina ;
Shamir, Adi .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (01) :132-149
[8]  
Engel Y., 2012, Proceedings of the 6th ACM international conference on distributed event based systems pp, P107, DOI [10.1145/2335484.2335496, DOI 10.1145/2335484.2335496]
[9]  
Engel Y., 2011, P 5 ACM INT C DISTRI, DOI DOI 10.1145/2002259.2002279
[10]  
Etzion O., 2010, EVENT PROCESSING ACT