Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Singapore Management University

Machine learning

Discipline
Publication Year
Publication
Publication Type

Articles 31 - 60 of 102

Full-Text Articles in Physical Sciences and Mathematics

Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu Dec 2020

Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu

Research Collection School Of Computing and Information Systems

Graphics Processing Units (GPUs) are now playing a vital role in many devices and systems including computing devices, data centers, and clouds, making them the next target of side-channel attacks. Unlike those targeting CPUs, existing side-channel attacks on GPUs exploited vulnerabilities exposed by application interfaces like OpenGL and CUDA, which can be easily mitigated with software patches. In this paper, we investigate the lower-level and native interface between GPUs and CPUs, i.e., the graphics interrupts, and evaluate the side channel they expose. Being an intrinsic profile in the communication between a GPU and a CPU, the pattern of graphics interrupts …


Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas Dec 2020

Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In order to guide our students of machine learning in their statistical thinking, we need conceptually simple and mathematically defensible algorithms. In this paper, we present the Nearest Centroid algorithm (NC) algorithm as a pedagogical tool, combining the key concepts behind two foundational algorithms: K-Means clustering and K Nearest Neighbors (k- NN). In NC, we use the centroid (as defined in the K-Means algorithm) of the observations belonging to each class in our training data set and its distance from a new observation (similar to k-NN) for class prediction. Using this obvious extension, we will illustrate how the concepts of …


Base-Package Recommendation Framework Based On Consumer Behaviours In Iptv Platform, Kuruparan Shanmugalingam, Ruwinda Ranganayanke, Chanka Gunawardhaha, Rajitha Navarathna Nov 2020

Base-Package Recommendation Framework Based On Consumer Behaviours In Iptv Platform, Kuruparan Shanmugalingam, Ruwinda Ranganayanke, Chanka Gunawardhaha, Rajitha Navarathna

Research Collection School Of Computing and Information Systems

Internet Protocol TeleVision (IPTV) provides many services such as live television streaming, time-shifted media, and Video On Demand (VOD). However, many customers do not engage properly with their subscribed packages due to a lack of knowledge and poor guidance. Many customers fail to identify the proper IPTV service package based on their needs and to utilise their current package to the maximum. In this paper, we propose a base-package recommendation model with a novel customer scoring-meter based on customers behaviour. Initially, our paper describes an algorithm to measure customers engagement score, which illustrates a novel approach to track customer engagement …


Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua Nov 2020

Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua

Research Collection School Of Computing and Information Systems

Education is very important to Singapore, and the government has continued to invest heavily in our education system to become one of the world-class systems today. A strong foundation of Science, Technology, Engineering, and Mathematics (STEM) was what underpinned Singapore's development over the past 50 years. PISA is a triennial international survey that evaluates education systems worldwide by testing the skills and knowledge of 15-year-old students who are nearing the end of compulsory education. In this paper, the authors used the PISA data from 2012 and 2015 and developed machine learning techniques to predictive the students' scores and understand the …


Machine Learning Integrated Design For Additive Manufacturing, Jingchao Jiang, Yi Xiong, Zhiyuan Zhang, David W. Rosen Nov 2020

Machine Learning Integrated Design For Additive Manufacturing, Jingchao Jiang, Yi Xiong, Zhiyuan Zhang, David W. Rosen

Research Collection School Of Computing and Information Systems

For improving manufacturing efficiency and minimizing costs, design for additive manufacturing (AM) has been accordingly proposed. The existing design for AM methods are mainly surrogate model based. Due to the increasingly available data nowadays, machine learning (ML) has been applied to medical diagnosis, image processing, prediction, classification, learning association, etc. A variety of studies have also been carried out to use machine learning for optimizing the process parameters of AM with corresponding objectives. In this paper, a ML integrated design for AM framework is proposed, which takes advantage of ML that can learn the complex relationships between the design and …


The Future Of Work Now: Automl At 84.51°And Kroger, Thomas H. Davenport, Steven M. Miller Oct 2020

The Future Of Work Now: Automl At 84.51°And Kroger, Thomas H. Davenport, Steven M. Miller

Research Collection School Of Computing and Information Systems

One of the most frequently-used phrases at business events these days is “the future of work.” It’s increasingly clear that artificial intelligence and other new technologies will bring substantial changes in work tasks and business processes. But while these changes are predicted for the future, they’re already present in many organizations for many different jobs. The job and incumbents described below are an example of this phenomenon.


Co2vec: Embeddings Of Co-Ordered Networks Based On Mutual Reinforcement, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Philips Kokoh Prasetyo Oct 2020

Co2vec: Embeddings Of Co-Ordered Networks Based On Mutual Reinforcement, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

We study the problem of representation learning for multiple types of entities in a co-ordered network where order relations exist among entities of the same type, and association relations exist across entities of different types. The key challenge in learning co-ordered network embedding is to preserve order relations among entities of the same type while leveraging on the general consistency in order relations between different entity types. In this paper, we propose an embedding model, CO2Vec, that addresses this challenge using mutually reinforced order dependencies. Specifically, CO2Vec explores in-direct order dependencies as supplementary evidence to enhance order representation learning across …


European Floating Strike Lookback Options: Alpha Prediction And Generation Using Unsupervised Learning, Tristan Lim, Aldy Gunawan, Chin Sin Ong Oct 2020

European Floating Strike Lookback Options: Alpha Prediction And Generation Using Unsupervised Learning, Tristan Lim, Aldy Gunawan, Chin Sin Ong

Research Collection School Of Computing and Information Systems

This research utilized the intrinsic quality of European floating strike lookback call options, alongside selected return and volatility parameters, in a K-means clustering environment, to recommend an alpha generative trading strategy. The result is an elegant easy-to-use alpha strategy based on the option mechanisms which identifies investment assets with high degree of significance. In an upward trending market, the research had identified European floating strike lookback call option as an evaluative criterion and investable asset, which would both allow investors to predict and profit from alpha opportunities. The findings will be useful for (i) buy-side investors seeking alpha generation and/or …


Experimental Comparison Of Features And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Wei Minn Oct 2020

Experimental Comparison Of Features And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Wei Minn

Research Collection School Of Computing and Information Systems

Android platform has dominated the smart phone market for years now and, consequently, gained a lot of attention from attackers. Malicious apps (malware) pose a serious threat to the security and privacy of Android smart phone users. Available approaches to detect mobile malware based on machine learning rely on features extracted with static analysis or dynamic analysis techniques. Dif- ferent types of machine learning classi ers (such as support vector machine and random forest) deep learning classi ers (based on deep neural networks) are then trained on extracted features, to produce models that can be used to detect mobile malware. …


London Heathrow Airport Uses Real-Time Analytics For Improving Operations, Xiaojia Guo, Yael Grushka-Cockayne, Bert De Reyck Sep 2020

London Heathrow Airport Uses Real-Time Analytics For Improving Operations, Xiaojia Guo, Yael Grushka-Cockayne, Bert De Reyck

Research Collection Lee Kong Chian School Of Business

Improving airport collaborative decision making is at the heart of airport operations centers (APOCs) recently established in several major European airports. In this paper, we describe a project commissioned by Eurocontrol, the organization in charge of the safety and seamless flow of European air traffic. The project’s goal was to examine the opportunities offered by the colocation and real-time data sharing in the APOC at London’s Heathrow airport, arguably the most advanced of its type in Europe. We developed and implemented a pilot study of a real-time data-sharing and collaborative decision-making process, selected to improve the efficiency of Heathrow’s operations. …


A Hybrid Framework Using A Qubo Solver For Permutation-Based Combinatorial Optimization, Siong Thye Goh, Sabrish Gopalakrishnan, Jianyuan Bo, Hoong Chuin Lau Sep 2020

A Hybrid Framework Using A Qubo Solver For Permutation-Based Combinatorial Optimization, Siong Thye Goh, Sabrish Gopalakrishnan, Jianyuan Bo, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In this paper, we propose a hybrid framework to solve large-scale permutation-based combinatorial problems effectively using a high-performance quadratic unconstrained binary optimization (QUBO) solver. To do so, transformations are required to change a constrained optimization model to an unconstrained model that involves parameter tuning. We propose techniques to overcome the challenges in using a QUBO solver that typically comes with limited numbers of bits. First, to smooth the energy landscape, we reduce the magnitudes of the input without compromising optimality. We propose a machine learning approach to tune the parameters for good performance effectively. To handle possible infeasibility, we introduce …


Predictive Insights For Improving The Resilience Of Global Food Security Using Artificial Intelligence, Meng Leong How, Yong Jiet Chan, Sin Mei Cheah Aug 2020

Predictive Insights For Improving The Resilience Of Global Food Security Using Artificial Intelligence, Meng Leong How, Yong Jiet Chan, Sin Mei Cheah

Research Collection Lee Kong Chian School Of Business

Unabated pressures on food systems affect food security on a global scale. A human-centric artificial intelligence-based probabilistic approach is used in this paper to perform a unified analysis of data from the Global Food Security Index (GFSI). The significance of this intuitive probabilistic reasoning approach for predictive forecasting lies in its simplicity and user-friendliness to people who may not be trained in classical computer science or in software programming. In this approach, predictive modeling using a counterfactual probabilistic reasoning analysis of the GFSI dataset can be utilized to reveal the interplay and tensions between the variables that underlie food affordability, …


Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui Aug 2020

Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui

Dissertations and Theses Collection (Open Access)

It is desirable to combine machine learning and program analysis so that one can leverage the best of both to increase the performance of software analytics. On one side, machine learning can analyze the source code of thousands of well-written software projects that can uncover patterns that partially characterize software that is reliable, easy to read, and easy to maintain. On the other side, the program analysis can be used to define rigorous and unique rules that are only available in programming languages, which enrich the representation of source code and help the machine learning to capture the patterns better. …


Objsim: Efficient Testing Of Cyber-Physical Systems, Jun Sun, Zijiang Yang Jul 2020

Objsim: Efficient Testing Of Cyber-Physical Systems, Jun Sun, Zijiang Yang

Research Collection School Of Computing and Information Systems

Cyber-physical systems (CPSs) play a critical role in automating public infrastructure and thus attract wide range of attacks. Assessing the effectiveness of defense mechanisms is challenging as realistic sets of attacks to test them against are not always available. In this short paper, we briefly describe smart fuzzing, an automated, machine learning guided technique for systematically producing test suites of CPS network attacks. Our approach uses predictive ma- chine learning models and meta-heuristic search algorithms to guide the fuzzing of actuators so as to drive the CPS into different unsafe physical states. The approach has been proven effective on two …


A Machine Learning Approach For Vulnerability Curation, Yang Chen, Andrew E. Santosa, Ming Yi Ang, Abhishek Sharma, Asankhaya Sharma, David Lo Jun 2020

A Machine Learning Approach For Vulnerability Curation, Yang Chen, Andrew E. Santosa, Ming Yi Ang, Abhishek Sharma, Asankhaya Sharma, David Lo

Research Collection School Of Computing and Information Systems

Software composition analysis depends on database of open-source library vulerabilities, curated by security researchers using various sources, such as bug tracking systems, commits, and mailing lists. We report the design and implementation of a machine learning system to help the curation by by automatically predicting the vulnerability-relatedness of each data item. It supports a complete pipeline from data collection, model training and prediction, to the validation of new models before deployment. It is executed iteratively to generate better models as new input data become available. We use self-training to significantly and automatically increase the size of the training dataset, opportunistically …


Automated Identification Of Libraries From Vulnerability Data, Chen Yang, Andrew Santosa, Asankhaya Sharma, David Lo May 2020

Automated Identification Of Libraries From Vulnerability Data, Chen Yang, Andrew Santosa, Asankhaya Sharma, David Lo

Research Collection School Of Computing and Information Systems

Software Composition Analysis (SCA) has gained traction in recent years with a number of commercial offerings from various companies. SCA involves vulnerability curation process where a group of security researchers, using various data sources, populate a database of open-source library vulnerabilities, which is used by a scanner to inform the end users of vulnerable libraries used by their applications. One of the data sources used is the National Vulnerability Database (NVD). The key challenge faced by the security researchers here is in figuring out which libraries are related to each of the reported vulnerability in NVD. In this article, we …


The Future Of Work Now: Cyber Threat Attribution At Fireeye, Thomas H. Davenport, Steven M. Miller May 2020

The Future Of Work Now: Cyber Threat Attribution At Fireeye, Thomas H. Davenport, Steven M. Miller

Research Collection School Of Computing and Information Systems

One of the most frequently-used phrases at business events these days is “the future of work.” It’s increasingly clear that artificial intelligence and other new technologies will bring substantial changes in work tasks and business processes. But while these changes are predicted for the future, they’re already present in many organizations for many different jobs. The job and incumbent described below is an example of this phenomenon. It’s a clear example of an existing job that’s been transformed by AI and related tools.


Text Analytics, Nlp, And Accounting Research, Richard M. Crowley Apr 2020

Text Analytics, Nlp, And Accounting Research, Richard M. Crowley

Research Collection School Of Accountancy

The presentation covered: What is text analytics and NLP?; How text analytics has evolved in the accounting literature since the 1980s; What current (as of 2020) methods are used in the literature; What methods are on the horizon.


Are The Code Snippets What We Are Searching For? A Benchmark And An Empirical Study On Code Search With Natural-Language Queries, Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen Feb 2020

Are The Code Snippets What We Are Searching For? A Benchmark And An Empirical Study On Code Search With Natural-Language Queries, Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen

Research Collection School Of Computing and Information Systems

Code search methods, especially those that allow programmers to raise queries in a natural language, plays an important role in software development. It helps to improve programmers' productivity by returning sample code snippets from the Internet and/or source-code repositories for their natural-language queries. Meanwhile, there are many code search methods in the literature that support natural-language queries. Difficulties exist in recognizing the strengths and weaknesses of each method and choosing the right one for different usage scenarios, because (1) the implementations of those methods and the datasets for evaluating them are usually not publicly available, and (2) some methods leverage …


Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang Jan 2020

Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang

Research Collection School Of Computing and Information Systems

The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes. Our approach uses predictive machine learning models and metaheuristic search algorithms to guide the fuzzing of …


Optimal Feature Selection For Learning-Based Algorithms For Sentiment Classification, Zhaoxia Wang, Zhiping Lin Jan 2020

Optimal Feature Selection For Learning-Based Algorithms For Sentiment Classification, Zhaoxia Wang, Zhiping Lin

Research Collection School Of Computing and Information Systems

Sentiment classification is an important branch of cognitive computation—thus the further studies of properties of sentiment analysis is important. Sentiment classification on text data has been an active topic for the last two decades and learning-based methods are very popular and widely used in various applications. For learning-based methods, a lot of enhanced technical strategies have been used to improve the performance of the methods. Feature selection is one of these strategies and it has been studied by many researchers. However, an existing unsolved difficult problem is the choice of a suitable number of features for obtaining the best sentiment …


How Does Machine Learning Change Software Development Practices?, Zhiyuan Wan, Xin Xia, David Lo, Gail C. Murphy Aug 2019

How Does Machine Learning Change Software Development Practices?, Zhiyuan Wan, Xin Xia, David Lo, Gail C. Murphy

Research Collection School Of Computing and Information Systems

Adding an ability for a system to learn inherently adds uncertainty into the system. Given the rising popularity of incorporating machine learning into systems, we wondered how the addition alters software development practices. We performed a mixture of qualitative and quantitative studies with 14 interviewees and 342 survey respondents from 26 countries across four continents to elicit significant differences between the development of machine learning systems and the development of non-machine-learning systems. Our study uncovers significant differences in various aspects of software engineering (e.g., requirements, design, testing, and process) and work characteristics (e.g., skill variety, problem solving and task identity). …


One-Class Order Embedding For Dependency Relation Prediction, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo Jul 2019

One-Class Order Embedding For Dependency Relation Prediction, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

Learning the dependency relations among entities and the hierarchy formed by these relations by mapping entities into some order embedding space can effectively enable several important applications, including knowledge base completion and prerequisite relations prediction. Nevertheless, it is very challenging to learn a good order embedding due to the existence of partial ordering and missing relations in the observed data. Moreover, most application scenarios do not provide non-trivial negative dependency relation instances. We therefore propose a framework that performs dependency relation prediction by exploring both rich semantic and hierarchical structure information in the data. In particular, we propose several negative …


Ai Gets Real At Singapore's Changi Airport (Part 1), Steve Lee, Steven M. Miller May 2019

Ai Gets Real At Singapore's Changi Airport (Part 1), Steve Lee, Steven M. Miller

Asian Management Insights

Ranked as the best airport for seven consecutive years, Singapore’s Changi Airport is lauded the world over for the efficient, safe, pleasurable and seamless service it offers the millions of passengers that pass through its facilities annually. Much of Changi Airport’s success can be attributed to the organisation’s customer-oriented business focus and deeply embedded culture of service excellence, combined with a host of advanced technologies operating invisibly in the background. The framework for this technology enablement is Changi Airport Group’s (CAG’s) SMART Airport Vision—an enterprise-wide approach to connective technologies that leverages sensors, data fusion, data analytics, and artificial intelligence (AI), …


Distilling Managerial Insights And Lessons From Ai Projects At Singapore's Changi Airport (Part 2), Steve Lee, Steven M. Miller May 2019

Distilling Managerial Insights And Lessons From Ai Projects At Singapore's Changi Airport (Part 2), Steve Lee, Steven M. Miller

Asian Management Insights

Since 2017, Changi Airport group (CAG) has initiated a host of pilot projects that use connective and intelligent technologies to enable its move towards digital transformation and SMART Airport Vision. This has resulted in a first wave of deployment of AI and Machine Learning-enabled applications across various functions that can better sense, analyse, predict, and interact with people.


Deepreview: Automatic Code Review Using Deep Multi-Instance Learning, Hengyi Li, Shuting Shi, Ferdian Thung, Xuan Huo, Bowen Xu, Ming Li, David Lo Apr 2019

Deepreview: Automatic Code Review Using Deep Multi-Instance Learning, Hengyi Li, Shuting Shi, Ferdian Thung, Xuan Huo, Bowen Xu, Ming Li, David Lo

Research Collection School Of Computing and Information Systems

Code review, an inspection of code changes in order to identify and fix defects before integration, is essential in Software Quality Assurance (SQA). Code review is a time-consuming task since the reviewers need to understand, analysis and provide comments manually. To alleviate the burden of reviewers, automatic code review is needed. However, this task has not been well studied before. To bridge this research gap, in this paper, we formalize automatic code review as a multi-instance learning task that each change consisting of multiple hunks is regarded as a bag, and each hunk is described as an instance. We propose …


Confusion Prediction From Eye-Tracking Data: Experiments With Machine Learning, Joni Salminen, Mridul Nagpal, Haewoon Kwak, Jisun An, Soon-Gyo Jung, Bernard J. Jansen Mar 2019

Confusion Prediction From Eye-Tracking Data: Experiments With Machine Learning, Joni Salminen, Mridul Nagpal, Haewoon Kwak, Jisun An, Soon-Gyo Jung, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

Predicting user confusion can help improve information presentation on websites, mobile apps, and virtual reality interfaces. One promising information source for such prediction is eye-tracking data about gaze movements on the screen. Coupled with think-aloud records, we explore if user's confusion is correlated with primarily fixation-level features. We find that random forest achieves an accuracy of more than 70% when prediction user confusion using only fixation features. In addition, adding user-level features (age and gender) improves the accuracy to more than 90%. We also find that balancing the classes before training improves performance. We test two balancing algorithms, Synthetic Minority …


Stock Market Prediction Analysis By Incorporating Social And News Opinion And Sentiment, Zhaoxia Wang, Seng-Beng Ho, Zhiping Lin Feb 2019

Stock Market Prediction Analysis By Incorporating Social And News Opinion And Sentiment, Zhaoxia Wang, Seng-Beng Ho, Zhiping Lin

Research Collection School Of Computing and Information Systems

The price of the stocks is an important indicator for a company and many factors can affect their values. Different events may affect public sentiments and emotions differently, which may have an effect on the trend of stock market prices. Because of dependency on various factors, the stock prices are not static, but are instead dynamic, highly noisy and nonlinear time series data. Due to its great learning capability for solving the nonlinear time series prediction problems, machine learning has been applied to this research area. Learning-based methods for stock price prediction are very popular and a lot of enhanced …


Making A Good Thing Better: Enhancing Password/Pin-Based User Authentication With Smartwatch, Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, Robert H. Deng Dec 2018

Making A Good Thing Better: Enhancing Password/Pin-Based User Authentication With Smartwatch, Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, Robert H. Deng

Research Collection School Of Computing and Information Systems

Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password has already been revealed. This idea is motivated by our observation that a sensor-rich smartwatch is capable of tracking the wrist motions of its bearer typing a password or PIN, which can be used as an authentication factor. The major challenge in this research is that a sophisticated attacker may imitate a user’s typing behavior as shown in previous research on keystroke dynamics based user authentication. We address this …


Identifying Elderlies At Risk Of Becoming More Depressed With Internet-Of-Things, Jiajue Ou, Huiguang Liang, Hwee Xian Tan Jul 2018

Identifying Elderlies At Risk Of Becoming More Depressed With Internet-Of-Things, Jiajue Ou, Huiguang Liang, Hwee Xian Tan

Research Collection School Of Computing and Information Systems

Depression in the elderly is common and dangerous. Current methods to monitor elderly depression, however, are costly, time-consuming and inefficient. In this paper, we present a novel depression-monitoring system that infers an elderly’s changes in depression level based on his/her activity patterns, extracted from wireless sensor data. To do so, we build predictive models to learn the relationship between depression level changes and behaviors using historical data. We also deploy the system for a group of elderly, in their homes, and run the experiments for more than one year. Our experimental study gives encouraging results, suggesting that our IoT system …