2017
DOI: 10.17485/ijst/2017/v10i3/110619
|View full text |Cite
|
Sign up to set email alerts
|

Application on Pervasive Computing in Healthcare – A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…To analyze the sensor signal pattern of human fall detection, much research works have been carried out. In 2017 (13) has given the review of pervasive computing for fall detection. Methods which detect human falls automatically can be categorized as (1) Thresholding-based approaches (2) Machine Learning approaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To analyze the sensor signal pattern of human fall detection, much research works have been carried out. In 2017 (13) has given the review of pervasive computing for fall detection. Methods which detect human falls automatically can be categorized as (1) Thresholding-based approaches (2) Machine Learning approaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The pervasive computers acts as a game-changer in the health care industries which throws multiple features to patients such as continues observation of heart rate, blood pressure, glucose level and so on by connecting with health experts all over the world [4,5]. There are a better awareness and engagement of customers with concern to their health results in a boosted growth for remote and personalized health care services.…”
Section: Introductionmentioning
confidence: 99%
“…The pervasive computers act as a gamechanger in the health care industries, which throws multiple features to patients such as continuous observation of heart rate, blood pressure, glucose level and so on by connecting with health experts all over the world [3]. There are various types of attacks such as TCP-SYN, UDP flood, ICMP-echo, HTTP flood, Slowloris, Slow post and Brute force attacks is discussed in this paper.…”
Section: Introductionmentioning
confidence: 99%