Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391628
Huma Hasan Rizvi, Rabia Noor Enam, S. Khan, Jawaid Akram
The recent class of internet of things (IoT) is the internet of underwater things and is consider as networks of smart interconnected underwater objects. IoUT is anticipated to facilitate various practical applications, such as underwater exploration, environmental monitoring, disaster prevention, military and others. With these areas of applications IoUT consider as prospective technologies towards developing smart cites globally and connecting not only cities but also connect oceans, stream and lake. To support the concept of IoUT, UWSn have become apparent or prominent network system. Majority of the researcher have deployed hierarchical and topological structure of terrestrial network to underwater sensor network. Underwater sensor network faces unique challenges like narrow bandwidth, propagation delay, difficulty to charge and low reliability and due to these challenges a separate hierarchical or topological mechanism is required. In order to be effective a designing of routing protocol is essential. The main aspect of this article is to analyze routing protocols in term of strength and weakness of routing operation and highlight issues of routing protocol.
{"title":"A Survey on Internet of Underwater Things: Perspective on Protocol Design for Routing","authors":"Huma Hasan Rizvi, Rabia Noor Enam, S. Khan, Jawaid Akram","doi":"10.1109/GCWOT49901.2020.9391628","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391628","url":null,"abstract":"The recent class of internet of things (IoT) is the internet of underwater things and is consider as networks of smart interconnected underwater objects. IoUT is anticipated to facilitate various practical applications, such as underwater exploration, environmental monitoring, disaster prevention, military and others. With these areas of applications IoUT consider as prospective technologies towards developing smart cites globally and connecting not only cities but also connect oceans, stream and lake. To support the concept of IoUT, UWSn have become apparent or prominent network system. Majority of the researcher have deployed hierarchical and topological structure of terrestrial network to underwater sensor network. Underwater sensor network faces unique challenges like narrow bandwidth, propagation delay, difficulty to charge and low reliability and due to these challenges a separate hierarchical or topological mechanism is required. In order to be effective a designing of routing protocol is essential. The main aspect of this article is to analyze routing protocols in term of strength and weakness of routing operation and highlight issues of routing protocol.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124726536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391594
Shaheena Noor, Humera Noor Minhas, Muhammad Imran Saleem, Vali Uddin, Najma Ismat
Smart homes and offices are becoming more and more common with the advances in computer vision research and technology. Identifying the human activities and scenarios are basic components of such systems. This is important not only for the eco-system to work independently, but also to allow robots to be able to assist humans. This is specially true in the more complicated medical setups, e.g. dentistry, where we need subtle cues e.g. eye motion to identify scenarios. We present a hierarchical model in this paper for robustly recognizing scenarios and procedures in a dental setup by using the objects seen in eye gaze trajectories like material and equipment used by the dentist, and symptoms of the patient. We utilize the fact that by identifying the objects viewed during an activity and linking them over time to create more complicated scenarios, the problem of scenario recognition can be hierarchically solved. We performed experiments on a dental dataset and showed that combining multiple parameters results in a better precision and accuracy compared to any of them individually. Our experiments show that the accuracy increased from 45.18% to 94.42% when we used a combination of parameters vs. a single one.
{"title":"Inside-out Vision for Procedure Recognition in Dental Environment","authors":"Shaheena Noor, Humera Noor Minhas, Muhammad Imran Saleem, Vali Uddin, Najma Ismat","doi":"10.1109/GCWOT49901.2020.9391594","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391594","url":null,"abstract":"Smart homes and offices are becoming more and more common with the advances in computer vision research and technology. Identifying the human activities and scenarios are basic components of such systems. This is important not only for the eco-system to work independently, but also to allow robots to be able to assist humans. This is specially true in the more complicated medical setups, e.g. dentistry, where we need subtle cues e.g. eye motion to identify scenarios. We present a hierarchical model in this paper for robustly recognizing scenarios and procedures in a dental setup by using the objects seen in eye gaze trajectories like material and equipment used by the dentist, and symptoms of the patient. We utilize the fact that by identifying the objects viewed during an activity and linking them over time to create more complicated scenarios, the problem of scenario recognition can be hierarchically solved. We performed experiments on a dental dataset and showed that combining multiple parameters results in a better precision and accuracy compared to any of them individually. Our experiments show that the accuracy increased from 45.18% to 94.42% when we used a combination of parameters vs. a single one.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/gcwot49901.2020.9391629
G. Noonan
Conference Brochure
会议手册
{"title":"Conference Brochure","authors":"G. Noonan","doi":"10.1109/gcwot49901.2020.9391629","DOIUrl":"https://doi.org/10.1109/gcwot49901.2020.9391629","url":null,"abstract":"Conference Brochure","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391624
Mohsin Murad, I. Tasadduq, P. Otero
Multicarrier acoustic communication has enabled wireless underwater transmission at higher data rates. Several multicarrier modulation systems have been explored in the past for data transmission. Orthogonal frequency division multiplexing (OFDM) fights-off inter-symbol-interference due to orthogonality of the carriers. However, it is susceptible to time variations which introduces inter-carrier-interference. Being double selective, the underwater acoustic (UWA) channel is both time and frequency variant. Time variations and multipath fading makes it a complex channel to estimate. In this paper, we explore linear frequency domain equalization techniques available for radio OFDM systems and compare their performance for a shallow underwater acoustic channel. The underwater channel model used is based on Rician shadowed distribution with Doppler shifts. We compare the performance of a linear equalizer with pilot estimated channel against a zero-forcing equalizer where the channel is assumed to be known. Results collected through Monte Carlo simulations show that for a 128-subcarrier OFDM system and a transmitter-receiver separation of 800 m, a gain of almost 7dB is obtained at a BER of 10−3 when a zero-forcing equalizer is used. Moreover, when the subcarriers are increased to 256, this gain almost doubles. In conclusion, the zero-forcing equalizer outperforms the LS equalizer for an underwater acoustic channel.
{"title":"Linear Equalization Techniques for Underwater Acoustic OFDM Communication","authors":"Mohsin Murad, I. Tasadduq, P. Otero","doi":"10.1109/GCWOT49901.2020.9391624","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391624","url":null,"abstract":"Multicarrier acoustic communication has enabled wireless underwater transmission at higher data rates. Several multicarrier modulation systems have been explored in the past for data transmission. Orthogonal frequency division multiplexing (OFDM) fights-off inter-symbol-interference due to orthogonality of the carriers. However, it is susceptible to time variations which introduces inter-carrier-interference. Being double selective, the underwater acoustic (UWA) channel is both time and frequency variant. Time variations and multipath fading makes it a complex channel to estimate. In this paper, we explore linear frequency domain equalization techniques available for radio OFDM systems and compare their performance for a shallow underwater acoustic channel. The underwater channel model used is based on Rician shadowed distribution with Doppler shifts. We compare the performance of a linear equalizer with pilot estimated channel against a zero-forcing equalizer where the channel is assumed to be known. Results collected through Monte Carlo simulations show that for a 128-subcarrier OFDM system and a transmitter-receiver separation of 800 m, a gain of almost 7dB is obtained at a BER of 10−3 when a zero-forcing equalizer is used. Moreover, when the subcarriers are increased to 256, this gain almost doubles. In conclusion, the zero-forcing equalizer outperforms the LS equalizer for an underwater acoustic channel.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391595
Rabia Noor Enam, Muhammad Tahir, S. Mustafa, Rukaiya Rukaiya
The recent advancements open up many significant energy optimization techniques in Internet of Things. The smart systems can now achieve paramount level of control of user comfort while reducing use of energy. Our main purpose is to construct smart environment monitoring and surveillance system using wireless sensor network (WSN) mainly focus on plantation, bridge monitoring and industrial products. The system periodically measures temperature, light and humidity levels of the atmosphere. When a critical change in the environmental variables is detected, the network administrator or the employee of that building will be notified via a text message on their cell phone. Thus, they will be able to act to critical changes as quickly as possible and it may be able to intercept effects of the critical change. Results are obtained in the field tests reasonably ensure that the WSN possess excellent package delivery high power efficiency.
{"title":"EMAS: Environment Monitoring and Smart Alert System for Internet of Things (IoT)","authors":"Rabia Noor Enam, Muhammad Tahir, S. Mustafa, Rukaiya Rukaiya","doi":"10.1109/GCWOT49901.2020.9391595","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391595","url":null,"abstract":"The recent advancements open up many significant energy optimization techniques in Internet of Things. The smart systems can now achieve paramount level of control of user comfort while reducing use of energy. Our main purpose is to construct smart environment monitoring and surveillance system using wireless sensor network (WSN) mainly focus on plantation, bridge monitoring and industrial products. The system periodically measures temperature, light and humidity levels of the atmosphere. When a critical change in the environmental variables is detected, the network administrator or the employee of that building will be notified via a text message on their cell phone. Thus, they will be able to act to critical changes as quickly as possible and it may be able to intercept effects of the critical change. Results are obtained in the field tests reasonably ensure that the WSN possess excellent package delivery high power efficiency.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391596
A. A. Siddique, M. F. Saleem
In this era, technology has played a vital role to link two people from a large distances via video conferencing through wireless channels. Bandwidth of the wireless channel is limited for communication, so in this regard compression becomes necessary. Compression is an integral part of video coding as it reduces the size of the video at a cost of some quality lost. Every video contains temporal activity, it is vital to study the temporal analysis before compression. Two different frame within the same video sequence contain a lot of redundant information. Due to the process of compression, video sequence is distorted. This distortion tends to increase if the video contain more temporal activity and reduces if it contain less. There are certain types of distortion that corrupts the signal such as ringing, ghosting, etc. It is important to keep an eye on the Frame rate (FPS) because a system needs to process each frames at a rate of 1/(number of frames) in a second. Compression algorithm requires extensive hardware to encode the motion vector information along with the residual frame. The difference mean opinion score (DMOS) that were obtained from the masses obtained resembles the results obtained after monitoring the motion activity in the sequence before compression and decompression.
{"title":"Effects of Inter-Frame Coding on Video Sequences Containing Temporal Activity","authors":"A. A. Siddique, M. F. Saleem","doi":"10.1109/GCWOT49901.2020.9391596","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391596","url":null,"abstract":"In this era, technology has played a vital role to link two people from a large distances via video conferencing through wireless channels. Bandwidth of the wireless channel is limited for communication, so in this regard compression becomes necessary. Compression is an integral part of video coding as it reduces the size of the video at a cost of some quality lost. Every video contains temporal activity, it is vital to study the temporal analysis before compression. Two different frame within the same video sequence contain a lot of redundant information. Due to the process of compression, video sequence is distorted. This distortion tends to increase if the video contain more temporal activity and reduces if it contain less. There are certain types of distortion that corrupts the signal such as ringing, ghosting, etc. It is important to keep an eye on the Frame rate (FPS) because a system needs to process each frames at a rate of 1/(number of frames) in a second. Compression algorithm requires extensive hardware to encode the motion vector information along with the residual frame. The difference mean opinion score (DMOS) that were obtained from the masses obtained resembles the results obtained after monitoring the motion activity in the sequence before compression and decompression.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117145899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391610
Shiraz Ali Wagan, M. Junaid, Nawab Muhammad Faseeh Qureshi, D. Shin, Kee-Hyun Choi
Nowadays, companies are transitioning towards security-based technology to secure data at the maximum level and there are several solutions provided to solve the big data security issues. The existing solutions are highly multidisciplinary security embedded, but still, there are openings to solve the upcoming Hadoop technology like Apache Ozone which is scalable, redundant, and more importantly a distributed object storage for Hadoop. With the growing information and technology, the volume of data traffic is transmitted over storage that requires extensive security measures and privacy in the environment of big data. In this paper, we describe our efforts towards the traditional way of securing the data and compare different methods to secure the data in Hadoop technology and suggested an optimum solution.
{"title":"Comparative Survey on Big data Security Applications, A Blink on Interactive Security Mechanism in Apache Ozone","authors":"Shiraz Ali Wagan, M. Junaid, Nawab Muhammad Faseeh Qureshi, D. Shin, Kee-Hyun Choi","doi":"10.1109/GCWOT49901.2020.9391610","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391610","url":null,"abstract":"Nowadays, companies are transitioning towards security-based technology to secure data at the maximum level and there are several solutions provided to solve the big data security issues. The existing solutions are highly multidisciplinary security embedded, but still, there are openings to solve the upcoming Hadoop technology like Apache Ozone which is scalable, redundant, and more importantly a distributed object storage for Hadoop. With the growing information and technology, the volume of data traffic is transmitted over storage that requires extensive security measures and privacy in the environment of big data. In this paper, we describe our efforts towards the traditional way of securing the data and compare different methods to secure the data in Hadoop technology and suggested an optimum solution.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114991306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391616
J. Sorribes, Lourdes Peñalver, C. Calafate, Jaime Lloret
In ad hoc wireless networks, the devices are equipped with limited range radio transceivers for communications. This type of networks does not have a communications infrastructure right after the deployment, and nodes do not know which other nodes are within their transmission range (neighbors). So, each node must discover its neighbors as a first step. In this paper we present two approaches to the neighbor discovery problem in static one-hop scenarios: TDMA-based (Time Division Multiple Access based) and Leader-based protocols. To assess the performance of these approaches we performed simulation experiments using the Castalia 3.2 simulator, comparing the proposed protocols against two protocols widely used in the literature as reference - the PRR (Probabilistic Round Robin) protocol and the Hello protocol - measuring two metrics: neighbor discovery time and number of discovered neighbors, for all the protocols tested. Results show that the leader-based and TDMA-based protocols outperform state-of-the-art solutions in the presence of collisions regarding both metrics, while finding that the TDMA-based protocol $(O(N^{2}))$ is slower than the leader-based approach $(O(N))$. The TDMA-based proposal decreases time consumption at least at a factor of 6 in comparison with Hello protocol and a factor of 3 compared to PRR protocol. Furthermore, the leader-based protocol reduces the time consumption at least at a factor of $6N$ in comparison with Hello and a factor of $3N$ compared to PRR protocol.
{"title":"Collision-Aware Deterministic Neighbor Discovery in Static Ad Hoc Wireless Networks","authors":"J. Sorribes, Lourdes Peñalver, C. Calafate, Jaime Lloret","doi":"10.1109/GCWOT49901.2020.9391616","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391616","url":null,"abstract":"In ad hoc wireless networks, the devices are equipped with limited range radio transceivers for communications. This type of networks does not have a communications infrastructure right after the deployment, and nodes do not know which other nodes are within their transmission range (neighbors). So, each node must discover its neighbors as a first step. In this paper we present two approaches to the neighbor discovery problem in static one-hop scenarios: TDMA-based (Time Division Multiple Access based) and Leader-based protocols. To assess the performance of these approaches we performed simulation experiments using the Castalia 3.2 simulator, comparing the proposed protocols against two protocols widely used in the literature as reference - the PRR (Probabilistic Round Robin) protocol and the Hello protocol - measuring two metrics: neighbor discovery time and number of discovered neighbors, for all the protocols tested. Results show that the leader-based and TDMA-based protocols outperform state-of-the-art solutions in the presence of collisions regarding both metrics, while finding that the TDMA-based protocol $(O(N^{2}))$ is slower than the leader-based approach $(O(N))$. The TDMA-based proposal decreases time consumption at least at a factor of 6 in comparison with Hello protocol and a factor of 3 compared to PRR protocol. Furthermore, the leader-based protocol reduces the time consumption at least at a factor of $6N$ in comparison with Hello and a factor of $3N$ compared to PRR protocol.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391620
M. Junaid, Shiraz Ali Wagan, Nawab Muhammad Faseeh Qureshi, Choon-Sung Nam, D. Shin
In today's digital world data is producing at a rapid speed and handling this massive diverse data become more challenging. The environment of big data is capable of handling data efficiently from data warehouses and in real-time. In Big data environment, Apache Spark is cluster-based, open-source computing technology explicitly designed for bulky data handling. Apache spark services are to perform composite Analytics through in-memory processing. This plays an active role in making meaningful exploration through machine learning and processes a large amount of data. Machine learning API is known as Mllib. It is highly prominent and efficient for big data platforms also offers excellent functionalities. In this paper, we have performed an experiment to look at the analytical qualities of Mllib in the apache spark environment. Likewise, we have highlighted the modern tendencies of Machine learning in big data studies and provides an understanding of upcoming work.
{"title":"Big data Predictive Analytics for Apache Spark using Machine Learning","authors":"M. Junaid, Shiraz Ali Wagan, Nawab Muhammad Faseeh Qureshi, Choon-Sung Nam, D. Shin","doi":"10.1109/GCWOT49901.2020.9391620","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391620","url":null,"abstract":"In today's digital world data is producing at a rapid speed and handling this massive diverse data become more challenging. The environment of big data is capable of handling data efficiently from data warehouses and in real-time. In Big data environment, Apache Spark is cluster-based, open-source computing technology explicitly designed for bulky data handling. Apache spark services are to perform composite Analytics through in-memory processing. This plays an active role in making meaningful exploration through machine learning and processes a large amount of data. Machine learning API is known as Mllib. It is highly prominent and efficient for big data platforms also offers excellent functionalities. In this paper, we have performed an experiment to look at the analytical qualities of Mllib in the apache spark environment. Likewise, we have highlighted the modern tendencies of Machine learning in big data studies and provides an understanding of upcoming work.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131750002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-06DOI: 10.1109/GCWOT49901.2020.9391621
Menaa Nawaz, Jameel Ahmed, Ghulam Abbas, Mujeeb ur Rehman
In the past few years, the idea of trading information while multiple devices are connected and communicating with each other, has grabbed huge attention. For processing this large amount of information, data connectivity and data analytics techniques have become essential for making decisions in variety of areas. Applying Internet of Things (IoT) solutions in healthcare systems is one of the rising areas that researchers are interested in. The usage of IoT technology has brought convenience for patients and physicians by real-time monitoring and managing healthcare and patient information. Corporations are in competition with each other to create IoT based devices with specific cloud interface but with least capability to analyse the data. In this research, an implementation of IoT based healthcare system using bio-medical sensors has been presented. This paper also aims to provide the analysis of cloud data acquired through biomedical sensors using signal analysis techniques for anomaly detection.
{"title":"Signal Analysis and Anomaly Detection of IoT-Based Healthcare Framework","authors":"Menaa Nawaz, Jameel Ahmed, Ghulam Abbas, Mujeeb ur Rehman","doi":"10.1109/GCWOT49901.2020.9391621","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391621","url":null,"abstract":"In the past few years, the idea of trading information while multiple devices are connected and communicating with each other, has grabbed huge attention. For processing this large amount of information, data connectivity and data analytics techniques have become essential for making decisions in variety of areas. Applying Internet of Things (IoT) solutions in healthcare systems is one of the rising areas that researchers are interested in. The usage of IoT technology has brought convenience for patients and physicians by real-time monitoring and managing healthcare and patient information. Corporations are in competition with each other to create IoT based devices with specific cloud interface but with least capability to analyse the data. In this research, an implementation of IoT based healthcare system using bio-medical sensors has been presented. This paper also aims to provide the analysis of cloud data acquired through biomedical sensors using signal analysis techniques for anomaly detection.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"171 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122573909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}