2017
DOI: 10.1109/tcc.2015.2440269
|View full text |Cite
|
Sign up to set email alerts
|

BDCaM: Big Data for Context-Aware Monitoring—A Personalized Knowledge Discovery Framework for Assisted Healthcare

Abstract: Context-aware monitoring is an emerging technology that provides real-time personalised health-care services and a rich area of big data application. In this paper, we propose a knowledge discovery-based approach that allows the context-aware system to adapt its behaviour in runtime by analysing large amounts of data generated in ambient assisted living (AAL) systems and stored in cloud repositories. The proposed BDCaM model facilitates analysis of big data inside a cloud environment. It first mines the trends… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 96 publications
(47 citation statements)
references
References 45 publications
0
47
0
Order By: Relevance
“…For example, the classical association rules mining algorithm (i.e., Apriori [1]) is identified as a top 3 algorithm in data mining [2]. It is widely utilized in many fields including market supervision and management [3], web browsing preference prediction [4], intrusion detection [5], health-care services [6], to just name a few. The traditional algorithms for frequent itemsets mining and association rules mining mainly consider how to mine on plaintext domain, so they lack security and privacy concerns.…”
Section: Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the classical association rules mining algorithm (i.e., Apriori [1]) is identified as a top 3 algorithm in data mining [2]. It is widely utilized in many fields including market supervision and management [3], web browsing preference prediction [4], intrusion detection [5], health-care services [6], to just name a few. The traditional algorithms for frequent itemsets mining and association rules mining mainly consider how to mine on plaintext domain, so they lack security and privacy concerns.…”
Section: Motivationsmentioning
confidence: 99%
“…Various countermeasures (including secret-key dividing, ciphertext characterizing and mining share) are adopted to resist different kinds of attacks from the data owners, the cloud, and the outside adversary. Schemes [8], [11], [12] Schemes [6]- [9] Classic Solutions…”
Section: Main Contributionsmentioning
confidence: 99%
“…b) Discovery: DM requires to construct the observed data model or to identify the patterns in the observed data. The model fitting assumes the role [29] of information extraction: The model is a part of the interactive KDD process which the model typically refers to as a subjective human judgment, whether it points to useful information or not. Two basic mathematical structures are used statistically and logically in constructing model [30].…”
Section: Table I the Important Basic Steps Of Kdd Processmentioning
confidence: 99%
“…A variety of context awareness solutions exist on AmI system where the research focus is restricted to specific services such as extracting context information, context reasoning (Jianping and Yu 2010), activity monitoring (Kozina et al 2011;Forkan et al 2015), and different application settings (Gravier et al 2015;Sain et al 2010). Most of these systems have proposed different context modeling approaches depending on the problem domains.…”
Section: Principles Of Context-aware Middlewarementioning
confidence: 99%