2018 14th International Conference on Intelligent Environments (IE) 2018
DOI: 10.1109/ie.2018.00010
|View full text |Cite
|
Sign up to set email alerts
|

Utilising Fog Computing for Developing a Person-Centric Heart Monitoring System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Of particular interest are systems that propose solutions to optimize processing and reduce the cost of data transmission and storage over the Cloud infrastructure [24,26,71,[143][144][145], this is also very crucial in cases of emergency and vital situations when real-time analytics are urgently required for actionable insights. Tuli et al [26] incorporated ensemble deep learning in edge computing devices and deployed it for the real-life application of automatic heart disease analysis.…”
Section: Technology-aware Ecg Monitoring Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Of particular interest are systems that propose solutions to optimize processing and reduce the cost of data transmission and storage over the Cloud infrastructure [24,26,71,[143][144][145], this is also very crucial in cases of emergency and vital situations when real-time analytics are urgently required for actionable insights. Tuli et al [26] incorporated ensemble deep learning in edge computing devices and deployed it for the real-life application of automatic heart disease analysis.…”
Section: Technology-aware Ecg Monitoring Systemsmentioning
confidence: 99%
“…Similarly, wearable devices were empowered with processing capabilities to locally (at the edge) analyze the signal and identify abnormal behaviors [144]. However, wearable embedded devices, mobile edge devices, and Cloud services were combined to provide reliable, accurate, and real-time heart monitoring [25,143]. Wearable devices are remotely trained to interpret heart abnormalities and the Fog extends the Cloud by migrating data-processing closer to the production site, thus accelerating the system's responsiveness to events.…”
Section: Technology-aware Ecg Monitoring Systemsmentioning
confidence: 99%
“…Attack detection is designed to analyze the network traffic or operating behaviors presented during network operation. We extract representative attack features and judge the security and stability of system operation [7]. Currently, network attacks against power monitoring systems mainly present composite attacks, and traditional single threat source detection methods are not sufficient to detect multiple types of composite attacks.…”
Section: Active Defense Algorithm For Compound Attacks On Power Monitoring Networkmentioning
confidence: 99%
“…We use the gradient descent method to optimize the parameter a, b of J(a, b). Then at G and x p = at p +b, we can get the deviation degree at t p according to Equation (7).…”
Section: Definitionmentioning
confidence: 99%
“…The goal of this paper is to develop new, light-weight algorithms for the analysis and interpretation of ECG sensor data that can be executed in the embedded processor provided by a wearable device. The motivation here is to transfer data processing and analysis tasks to the edges of the network so that we can increase the longevity of the wearable devices by reducing energy requirements through reduced transmissions of large sensor data [21,22]. In this way, the wearable device becomes capable of analyzing and interpreting sensor-data traces to provide actionable alerts without any dependence on cloud services.…”
Section: Introductionmentioning
confidence: 99%