2020
DOI: 10.1007/978-981-15-5329-5_40
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Big IoT Data Analytics for Improving QoS-Based Performance in System: Design, Opportunities, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Health research downplays the significance of multiple data processing techniques [10] despite being warned that these developments will outline their benefits and drawbacks [11] and reiterating the difficulties and problems with health record processing technique [12,13]. Longstanding research interests include the forecasting of cardiovascular risk using medical information [14,15]. The prediction's accuracy is still sufficient despite extensive attempts.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Health research downplays the significance of multiple data processing techniques [10] despite being warned that these developments will outline their benefits and drawbacks [11] and reiterating the difficulties and problems with health record processing technique [12,13]. Longstanding research interests include the forecasting of cardiovascular risk using medical information [14,15]. The prediction's accuracy is still sufficient despite extensive attempts.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The current healthcare legacy and service delivery solutions, and the existing smart contract-based serverless environment, create a lack of interoperability. It is difficult to adopt and develop a platform between patients and healthcare service delivery systems due to this disunion and weak connection [46,47].…”
Section: Cross-chain Platform Issuesmentioning
confidence: 99%
“…One of the reasons behind its success is minimum human intervention, allowing electronic devices to interact with each other directly as well as with the environment to communicate information [2]. To deploy these devices in numerous quantities over a large area requires them to be affordable concerning their battery, power, and memory computation because the most critical issue in a tiny ubiquitous device is its limited amount of resources [4]. Only a small, finite amount of energy may be available through a miniature battery to the tiny processors embedded in ubiquitous IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…Also, IoT devices generate huge data with varying confidentiality levels. Hence, for a resource-constraint device, using one encryption protocol for confidential as well as for non-confidential information [3,4] is not the optimal approach. Moreover, the cryptographic algorithm for IoT devices should be selected wisely because every cipher consumes a varying amount of computing resources including its security strength, resource requirements, memory consumption, CPU utilization, bandwidth, and battery consumption [6].…”
Section: Introductionmentioning
confidence: 99%