8,091 Hits in 7.1 sec

Using Control Theory to Guide Load Shedding in Medical Data Stream Management System [chapter]

Zijing Hu, Hongyan Li, Baojun Qiu, Lv-an Tang, Yu Fan, Haibin Liu, Jianlong Gao, Xinbiao Zhou
2005 Lecture Notes in Computer Science  
The load shedding problem is vital to a Data Stream Management System (DSMS).  ...  This paper presents the design, implementation, and evaluation of a load shedding method under the guide of the feedback control theory, in order to solve practical problems in medical environment.  ...  System Design with the Guide of Control Theory First, let us see how a DSMS runs.  ... 
doi:10.1007/11596370_21 fatcat:7abrvcnubjg7tgtzxgh7fiykmy

DSEC: A Data Stream Engine Based Clinical Information System [chapter]

Yu Fan, Hongyan Li, Zijing Hu, Jianlong Gao, Haibin Liu, Shiwei Tang, Xinbiao Zhou
2006 Lecture Notes in Computer Science  
shedding mechanism used to avoid system crash when high data rate occurs.  ...  In DSEC, data stream technology as well as traditional computer mechanism is used to process medical data and improve the quality of service in hospitals.  ...  effect, find out the abnormity and trigger data alert when necessary. • Load shedding: Guided by control theory, we have designed load shedding module to avoid system crash when the data rate exceeds the  ... 
doi:10.1007/11610113_127 fatcat:bg3g2yezcbgu3a7ssczzx7hnhq

Data-Driven Stream Mining Systems for Computer Vision [chapter]

Shuvra S. Bhattacharyya, Mihaela van der Schaar, Onur Atan, Cem Tekin, Kishan Sudusinghe
2014 Advances in Computer Vision and Pattern Recognition  
In this chapter, we discuss the state of the art and future challenges in adaptive stream mining systems for computer vision.  ...  We discuss these challenges in this chapter, and we also discuss important directions for research in addressing such challenges using dynamic, data-driven methodologies.  ...  Acknowledgments This work is supported by the US Air Force Office of Scientific Research under the DDDAS Program.  ... 
doi:10.1007/978-3-319-09387-1_12 fatcat:am4bf2g7tjbd3h3vefpeaxvvum

Review of Power Spatio-Temporal Big Data Technologies for Mobile Computing in Smart Grid

Ying Ma, Chao Huang, Yu Sun, Guang Zhao, Yunjie Lei.
2019 IEEE Access  
Through data analysis and technical discussion, it hopes to provide technical support and decision support for relevant practitioners in the PSTBD field.  ...  of things, video, medical treatment, retail and so on.  ...  It also helps to identify the main factors and prevention and control points (such as cutting machine or load shedding) in grid operation, and provides targets for reflection virtual modeling and adaptive  ... 
doi:10.1109/access.2019.2957181 fatcat:txr7efdc3vd5lk2c3v2khm3ooa

Big Data Major Security Issues

Adel Al-Zahrani, Mohammed Al-Hebbi
2022 Tehnički glasnik  
So, a total of 12 papers have been extracted and analyzed to add to the corpus of literature by concentrating on several critical issues in the big data analytics sector as well as shedding light on how  ...  While studies have proven that big data poses issues, their approaches to overcoming these obstacles vary. The most frequently mentioned challenges were data, process, privacy, and management.  ...  This might cause serious harm to patients if a medical monitoring system sensor delivers inaccurate data.  ... 
doi:10.31803/tg-20220124135330 fatcat:skxvwgnl4nhuhmht4qqft2kqoi

Incorporating UTAUT Predictors for Understanding Home Care Patients' and Clinician's Acceptance of Healthcare Telemedicine Equipment

Anne Kohnke, Matthew L Cole, Richard Bush
2014 Journal of Technology Management & Innovation  
Drawing from the Unified Theory of Acceptance in Technology (UTAUT), this study investigated the predictors of behavioral intention to use Telehealth equipment by patients, clinicians, and agency personnel  ...  Survey data were provided by 126 participants recruited from an eligible population who were either currently using the Telehealth equipment or were familiar with it.  ...  their medical data.  ... 
doi:10.4067/s0718-27242014000200003 fatcat:4x6tren5znc67pysyjkcavjvxm

Protecting Groundwater for Health: Managing the Quality of Drinking-water Sources

Oliver Schmoll
2013 Water Intelligence Online  
consumption, and that is used to irrigate crops.  ...  This book points to a rational and systematic way of assessing the risks and to cost-effective approaches to manage them.  ...  ACKNOWLEDGEMENTS Jeff Soller and Nigel French provided useful information on animal studies.  ... 
doi:10.2166/9781780405810 fatcat:fxsp6ktocfgmfezrf4cge6hy3e

D2.1 Definition and Description of the 6G BRAINS Primary Use Cases and Derivation of User Requirements

Alexander Artemenko, Yue Zhang, Uwe Wostradowski, John Cosmas, Qi Wang, Jose M. Alcaraz Calero, Enrique Chirivella Perez, Pablo Salva Garcia, Ruben Ricart Sanchez, Bruno Parreira, Marco Araújo, Israel Koffmann (+4 others)
2021 Zenodo  
The most challenging use cases build the basis for our requirements analysis summarized in this document in form of technical use case descriptions, derived user requirements, KPI specifications, as well  ...  ., can bring known applications to a new level of their performance or can even enable totally new applications that were impossible until now.  ...  VIAVI Peak UE data rate (L3) >1 Gbps/UE For high data rate video streaming scenario, to support up to 32 UEs video streaming simultaneously.  ... 
doi:10.5281/zenodo.5185388 fatcat:ttwmlpnqzjcnvi2lnamsnzglyi

Editorial: First Quarter 2015IEEE Communications Surveys and Tutorials

Ekram Hossain
2015 IEEE Communications Surveys and Tutorials  
Code-division multiple access (CDMA) is a channel access methodology that has been used in 2G and 3G cellular systems.  ...  The research of SM has reached sufficient maturity to motivate its comparison to state-of-theart MIMO communications, as well as to inspire its application to other emerging wireless systems such as relay-aided  ...  In OFDM, a large number of closely spaced orthogonal subcarriers are used to carry data. The data are divided into several parallel data streams or channels, one for each subcarrier.  ... 
doi:10.1109/comst.2015.2406352 fatcat:irwl3gmfyne4nmqk3xhir3ccgm

When Things Matter: A Data-Centric View of the Internet of Things [article]

Yongrui Qin, Quan Z. Sheng, Nickolas J.G. Falkner, Schahram Dustdar, Hua Wang, Athanasios V. Vasilakos
2014 arXiv   pre-print
This article surveys the main techniques and state-of-the-art research efforts in IoT from data-centric perspectives, including data stream processing, data storage models, complex event processing, and  ...  Open research issues for IoT data management are also discussed.  ...  Motivated by this, several load shedding algorithms are designed, including CPU-bound load shedding, · Qin et al. memory-bound load shedding, and dual-bound load shedding (with both CPU-and memory-bound  ... 
arXiv:1407.2704v2 fatcat:crbago2kqrbsbaoaig63yfvbua

The UK Programmable Fixed and Mobile Internet Infrastructure: Overview, capabilities and use cases deployment

Hamada Alshaer, Navdeep Uniyal, Konstantinos Katsaros, Konstantinos Antonakoglou, Steven Simpson, Hanaa Abumarshoud, Hamid Falaki, Paul McCherry, Charalampos Rotsos, Toktam Mahmoodi, Dritan Kaleshi, David Hutchison (+2 others)
2020 IEEE Access  
The aim is to enable students, researchers and enterprises to interconnect with and carry out remote experiments using these test-beds.  ...  Using Software Defined Networking (SDN) and Network Function Virtualisation (NFV) technologies, these distributed test-beds are integrated using a multi-domain NFV Orchestrator.  ...  A haptic communication system is deployed across the network to enable medical experts to guide the paramedic using haptic interfaces with kinesthetic and tactile feedback, as shown in Fig. 16 .  ... 
doi:10.1109/access.2020.3020894 fatcat:hso4d2ljtfeu7buyvasg374jde

When things matter: A survey on data-centric internet of things

Yongrui Qin, Quan Z. Sheng, Nickolas J.G. Falkner, Schahram Dustdar, Hua Wang, Athanasios V. Vasilakos
2016 Journal of Network and Computer Applications  
This article reviews the main techniques and state-of-the-art research efforts in IoT from data-centric perspectives, including data stream processing, data storage models, complex event processing, and  ...  Open research issues for IoT data management are also discussed.  ...  We express our gratitude to the anonymous reviewers for their comments and suggestions which have greatly helped us to improve this work.  ... 
doi:10.1016/j.jnca.2015.12.016 fatcat:4roub2ifdjgide4kxhmqqrk44i

Behavioral Intervention Improves Treatment Outcomes Among HIV-Infected Individuals Who Have Delayed, Declined, or Discontinued Antiretroviral Therapy: A Randomized Controlled Trial of a Novel Intervention

Marya Gwadz, Charles M. Cleland, Elizabeth Applegate, Mindy Belkin, Monica Gandhi, Nadim Salomon, Angela Banfield, Noelle Leonard, Marion Riedel, Hannah Wolfe, Isaiah Pickens, Kelly Bolger (+3 others)
2015 Aids and Behavior  
Primary endpoints were adherence, evaluated via ART concentrations in hair samples, and HIV viral load suppression. The intervention was feasible and acceptable.  ...  Primary endpoints were adherence, evaluated via ART concentrations in hair samples, and HIV viral load suppression. The intervention was feasible and acceptable.  ...  Data Analysis Fisher's exact test was used to compare intervention and control conditions on all categorical outcomes.  ... 
doi:10.1007/s10461-015-1054-6 pmid:25835462 pmcid:PMC4567451 fatcat:2r3mdwjynvg35nvfgamtnay7rq

Integrating behavioral and social sciences components into a competency-based MD program curriculum: A qualitative study on opinions of faculty members

Shahnam Sedigh Maroufi, Shoaleh Bigdeli, Ladan Fata, Seyed Kamran Soltani Arabshahi
2017 Medical Journal of The Islamic Republic of Iran  
Data were analyzed using content analysis.  ...  ↑What is "already known" in this topic: Physicians should know the concepts of behavioral and social sciences to manage patients by application of multifaceted and holistic methods.  ...  Acknowledgements The authors would like to express their gratitude to faculty members and experts of Center for Educational Research in Medical Sciences (CERMS), Faculty of Medicine and staff of Teaching  ... 
doi:10.18869/mjiri.31.17 pmid:28955667 pmcid:PMC5609331 fatcat:6l3c2iipffcfxek6cgqwlipsge

The Six Technical Gaps between Intelligent Applications and Real-Time Data Mining: A Critical Review

Simon Fong, Hang Yang
2011 Journal of Emerging Technologies in Web Intelligence  
A discussion follows on the possibilities of future intelligent applications that are empowered by data stream mining.  ...  In the literature many research papers can be found on a wide variety of data mining techniques that enable intelligent applications operating in real-time.  ...  Dataset summarizing include Sampling [9] , Load shedding [10, 11] , and Sketching [12, 13] ; Sub-data stream analyzing exploits Synopsis [12, 14] and Aggregation [15, 16, 17] .  ... 
doi:10.4304/jetwi.3.2.63-73 fatcat:bkuyfss6tzbjhcrj26ew45cv54
« Previous Showing results 1 — 15 out of 8,091 results