22 research outputs found

    An intelligent information forwarder for healthcare big data systems with distributed wearable sensors

    Get PDF
    © 2016 IEEE. An increasing number of the elderly population wish to live an independent lifestyle, rather than rely on intrusive care programmes. A big data solution is presented using wearable sensors capable of carrying out continuous monitoring of the elderly, alerting the relevant caregivers when necessary and forwarding pertinent information to a big data system for analysis. A challenge for such a solution is the development of context-awareness through the multidimensional, dynamic and nonlinear sensor readings that have a weak correlation with observable human behaviours and health conditions. To address this challenge, a wearable sensor system with an intelligent data forwarder is discussed in this paper. The forwarder adopts a Hidden Markov Model for human behaviour recognition. Locality sensitive hashing is proposed as an efficient mechanism to learn sensor patterns. A prototype solution is implemented to monitor health conditions of dispersed users. It is shown that the intelligent forwarders can provide the remote sensors with context-awareness. They transmit only important information to the big data server for analytics when certain behaviours happen and avoid overwhelming communication and data storage. The system functions unobtrusively, whilst giving the users peace of mind in the knowledge that their safety is being monitored and analysed

    A Personalized Facet-Weight Based Ranking Method for Service Component Retrieval

    Get PDF
    With the recent advanced computing, networking technologies and embedded systems, the computing paradigm has switched from mainframe and desktop computing to ubiquitous computing, one of whose visions is to provide intelligent, personalized and comprehensive services to users. As a new paradigm, Active Services is proposed to generate such services by retrieving, adapting, and composing of existing service components to satisfy user requirements. As the popularity of this paradigm and hence the number of service components increases, how to efficiently retrieve components to maximally meet user requirements has become a fundamental and significant problem. However, traditional facet-based retrieval methods only simply list out all the results without any kind of ranking and do not lay any emphasis on the differences of importance on each facet value in user requirements, which makes it hard for user to quickly select suitable components from the resulting list. To solve the problems, this paper proposes a novel personalized facet-weight based ranking method for service component retrieval, which assigns a weight for each facet to distinguish the importance of the facets, and constructs a personalized model to automatically calculate facet-weights for users according to their histo -rical retrieval records of the facet values and the weight setting. We optimize the parameters of the personalized model, evaluate the performance of the proposed retrieval method, and compare with the traditional facet-based matching methods. The experimental results show promising results in terms of retrieval accuracy and execution time

    New Horizons of Parallel and Distributed Computing

    No full text

    A Secure Synchronized Reading system over time-critical online contests

    No full text
    The time-critical online contest environment calls for an elegant and precise management system to start a contest online. The management system should simultaneously follow three rules of security that are confidentiality, anonymity and fairness. We present in this paper a novel system named Secure Synchronized Reading (SSR) system as well as its corresponding security model according to the three rules. SSR can evoke a synchronized start for all competitors in a contest at the intended time by employing a Randomness-reused Identity-Based Encryption (RIBE) scheme. It can avoid huge differences among delivery delays of heterogeneous competitors and any false start by an adverse competitor. Consequently when an online contest begins, the SSR system performs quasi real-time with ignorable communication delays in the security model. As a complement, the analysis on the provable security of SSR is given finally, as well as a further analysis on the achievement of synchronization. ? 2014 IEEE.EI

    A Network Evaluation for LAN, MAN and WAN Grid Environments

    No full text
    Abstract. The performance of network protocols on different usage scenarios differs significantly, making the protocol choice a difficult question. This had motivated a work that aims to evaluate the TCP, UDP and Sendfile (a POSIXdefined zero-copy TCP access technique) protocols on LAN, MAN and WAN environments, in order to find the most adequate configuration for each protocol. The protocols were evaluated on default configurations, without any applicationspecific optimizations
    corecore