2012
DOI: 10.1007/978-3-642-30779-9_18
|View full text |Cite
|
Sign up to set email alerts
|

A Non Invasive, Wearable Sensor Platform for Multi-parametric Remote Monitoring in CHF Patients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 5 publications
1
11
0
Order By: Relevance
“…For example, in case of tree-based algorithms, C4.5 [ 71 ] performed best with more than 90% accuracy compared with NB, but in another study [ 59 ], NB performed best with 86% ± 3.9% as compared with 85.9% ± 2.5% of C4.5; furthermore, NB consumes 71 KB less memory than C4.5. Similarly, in some other studies [ 65 , 73 ], SVM outperformed NB in all cases.…”
Section: Perdm In Resource-constrained Environmentssupporting
confidence: 76%
See 2 more Smart Citations
“…For example, in case of tree-based algorithms, C4.5 [ 71 ] performed best with more than 90% accuracy compared with NB, but in another study [ 59 ], NB performed best with 86% ± 3.9% as compared with 85.9% ± 2.5% of C4.5; furthermore, NB consumes 71 KB less memory than C4.5. Similarly, in some other studies [ 65 , 73 ], SVM outperformed NB in all cases.…”
Section: Perdm In Resource-constrained Environmentssupporting
confidence: 76%
“…Similarly, neural network-based models, such as Artificial Neural Networks (ANNs) and Multi-Layer Perception (MLP)-based NNs, are used for fall detection, energy-efficient activity recognition, WSN-based activity recognition, and simple and complex activity recognition [ 21 , 65 , 71 , 72 ]. Statistical classifiers, including Support Vector Machines (SVM), Quadratic Discriminant Analysis (QDA), Linear Discriminant Analysis (LDA) and k Nearest Neighbors (kNN), are implemented for activity recognition, injury rehabilitation, physiological data analysis, optimized energy consumption, stress profiling, physical activity recognition, discrimination between stress and cognitive load, real-time activity recognition, and application usage prediction in mobile phones [ 65 , 73 79 ].…”
Section: Perdm In Resource-constrained Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…The set C k contains the items of the form <Tid, [4]> where each I k represents a large k-itemset with transaction identifier (Tid).…”
Section: Fpm In Mobile Devicesmentioning
confidence: 99%
“…Numerous data mining algorithms are successfully exploited in smartphones to comply with computation and resource constraints and give the optimal performance. For example classification algorithms are used for activity recognition [2], energy efficiency [3], physiological data analysis [4], personalization, privacy and adaption [5], intelligent distributed classification [6], fall detection [7], injury rehabilitation [8], discrimination between stress and cognitive load [9], and application usage prediction in mobile phones [10] amongst other. Such a wide-scale adoption of data mining algorithms has stimulated the researchers to explore new opportunities for mobile data mining inside smartphones.…”
Section: Introductionmentioning
confidence: 99%