2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON) 2016
DOI: 10.1109/upcon.2016.7894624
|View full text |Cite
|
Sign up to set email alerts
|

Big data analytics of IoT based Health care monitoring system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 6 publications
0
25
0
Order By: Relevance
“…Besides the real-time healthcare data, there are healthcare big data (e.g., structured eHR, electronic medical record (eMR), (non-)clinical/medical imaging data, unstructured clinical notes, etc.) which demand separate handling due to their requirement of advanced data analytics [87], [88]. In the proposed framework, both kinds of healthcare data are transmitted to specific overlaying layer (either mist or fog or cloud) based on the data type and their processing requirements.…”
Section: Perception Layermentioning
confidence: 99%
“…Besides the real-time healthcare data, there are healthcare big data (e.g., structured eHR, electronic medical record (eMR), (non-)clinical/medical imaging data, unstructured clinical notes, etc.) which demand separate handling due to their requirement of advanced data analytics [87], [88]. In the proposed framework, both kinds of healthcare data are transmitted to specific overlaying layer (either mist or fog or cloud) based on the data type and their processing requirements.…”
Section: Perception Layermentioning
confidence: 99%
“…There are several IoT authentication challenges and issues that need to be understood before employing the right security solution that can dynamically vary with the situation [21,35]. Based on certain critical situations such as IoT health applications, frequent authorization and authentication are necessary and could dynamically vary, potentially resulting in changes to the authorization of IoT devices [2]. To address these issues, automated mutual authentication without user intervention is required in supporting users from remembering passwords for a large number of devices [39].…”
Section: Iot Authentication Issues and Attacksmentioning
confidence: 99%
“…Applying the Brahmagupta-Fibonacci identity from above, we get 4 2 + 6 2 + 6 2 + 9 2 = (9 − 4) 2 + (6 + 6) 2 = 5 2 + 12 2 = (9 + 4) 2 + (6 − 6) 2 = 13 2 + 0 2 = However, in this case, there are nine sums of four squares. (1,4,6,18), (1,6,12,14), (2,2,12,15), (2,6,9,16), (4,6,6,17), (4,6,10,15), (5,8,12,12), (6,6,7,16), (6,8,9,14) Only one of these is applicable to the Brahmagupta-Fibonacci identity, providing the two sum of two squares. A faster method, using a modified binary greatest common divisor, quickly validates a sum of four squares.…”
Section: Casementioning
confidence: 99%
See 2 more Smart Citations