SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Emerging Trends in
       Analytics –
    Mobile & Real-Time
     Computational
       Intelligence
A/Prof Shonali Priyadarsini Krishnaswamy
                    &
       Dr Sivakumar Viswanathan
               I2R Confidential
Sensors, Sensors Everywhere…




           I2R Confidential
Rationale and Motivations
• Growth/ Proliferation of Mobile/Embedded
  Devices
• Increasing Computational Capacity
• Increasing Data Generation – as a
  continuous stream
• Communication Overhead vs Processing
  Overhead vs Energy Consumption
• Opportunity:
  – A new breed of intelligent mobile/pervasive
    applications
                    I2R Confidential
Data Stream Mining in
Mobile/Pervasive Environments

• Cost-efficient, Intelligent and Real-time
  Data Stream Mining techniques that can:
  – adapt to the context of diverse applications
  – cope with and leverage distributed
    computational platforms
  – take into account available resources




                     I2R Confidential
OPEN MOBILE MINER



A Toolkit for Building Mobile Data Mining
Applications



                   I2R Confidential
Situation-Aware Adaptive Data
       Stream Processing


                               •   Visualization
                               •   Mining
                               •   Adaptation
                               •   Situation Inference
                               •   Context Engine
                               •   Sensory layer




            I2R Confidential
OMM Features
• Easy deployment of mobile data mining applications on
  a range of mobile devices

• F ilit ti integration of new and existing data stream
  Facilitation i t  ti   f       d i ti d t t
  mining algorithms

• Interface with a range of input sources for data streams

• Allow flexible, application specific visualizations to be
  developed.
  de eloped

                         I2R Confidential
OMM – Open Mobile Miner




         I2R Confidential
OPEN MOBILE MINER



Real-Time ECG and Bio-Sensor Data Analysis




                   I2R Confidential
Situation-Aware Adaptation Demo




             I2R Confidential
Situation-Aware Adaptation Demo




             I2R Confidential
Visualization of Situations




          I2R Confidential
Visualization of Situations




          I2R Confidential
MobileECG




  I2R Confidential
MobileECG




  I2R Confidential
RA-Hot SAX Visualization




         I2R Confidential
MARS - Mobile Activity Recognition
            System
Enabling a Healthy Lifestyle – Innovation needs no wearable sensors – purely based on Phone sensors –
and carrying the phone while walking etc. Personalised, Train for every User.




                                           I2R Confidential
REMOTE HEALTH
MONITORING SYSTEM

A Solution for Continuous Monitoring Applications




                     I2R Confidential
System Overview




Technology:
• SOA based Mobile-healthcare services
• Real-time & Asynchronous data collection
   Real time
• Links to Personal Health Records (PHR)

                   I2R Confidential
Service Component


                         PHR




      I2R Confidential
Continuous ECG Monitoring
                SOAMOH



                             ECG Data




          I2R Confidential
Future Directions


• Novel and innovative healthcare applications
  leveraging real-time, continuous and mobile analytics
  l      i      l i         i        d   bil     l i




                        I2R Confidential
Thank You

Contenu connexe

Tendances

Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureChiyang Lin
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Jack Wong
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Erez Metula
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
How to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesHow to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesZoltán Dankó
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILECOMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILEAnkit Kumar
 
iot based home automation
iot based home automationiot based home automation
iot based home automationparvathy s m
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOTNaveensing87
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system Puneet Mishra
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationKristen Yarmey
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 

Tendances (20)

Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architecture
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
How to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesHow to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth services
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILECOMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOT
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field Communication
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

En vedette

06 MICHAEL YEE - Innovator GP Perspective
06 MICHAEL YEE - Innovator GP Perspective06 MICHAEL YEE - Innovator GP Perspective
06 MICHAEL YEE - Innovator GP Perspectivetubbit
 
Patient Centered Medical Home, A Pathway to Value-Based Reimbursement?
Patient Centered Medical  Home, A Pathway to Value-Based Reimbursement?Patient Centered Medical  Home, A Pathway to Value-Based Reimbursement?
Patient Centered Medical Home, A Pathway to Value-Based Reimbursement?Enli Health Intelligence
 
01 ASAF BITTON - Innovation in Primary Care
01 ASAF BITTON - Innovation in Primary Care01 ASAF BITTON - Innovation in Primary Care
01 ASAF BITTON - Innovation in Primary Caretubbit
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

En vedette (6)

06 MICHAEL YEE - Innovator GP Perspective
06 MICHAEL YEE - Innovator GP Perspective06 MICHAEL YEE - Innovator GP Perspective
06 MICHAEL YEE - Innovator GP Perspective
 
Patient Centered Medical Home, A Pathway to Value-Based Reimbursement?
Patient Centered Medical  Home, A Pathway to Value-Based Reimbursement?Patient Centered Medical  Home, A Pathway to Value-Based Reimbursement?
Patient Centered Medical Home, A Pathway to Value-Based Reimbursement?
 
01 ASAF BITTON - Innovation in Primary Care
01 ASAF BITTON - Innovation in Primary Care01 ASAF BITTON - Innovation in Primary Care
01 ASAF BITTON - Innovation in Primary Care
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similaire à 05 SIVA - Emerging Trends in Analytics - mobile and real time computational intelligence

Smart Sensors.pptx
Smart Sensors.pptxSmart Sensors.pptx
Smart Sensors.pptxDrHemaCR
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolutionusman sarwar
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of ThingsON Semiconductor
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimativeCleber Gomes
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimDaeyoung Kim
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 
Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Eng Ansam Hadi
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...moodman0903
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...moodman0903
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io tChintan Patel
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart WorldPriyanka2828
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart WorldPriyanka2828
 
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Aravindharamanan S
 

Similaire à 05 SIVA - Emerging Trends in Analytics - mobile and real time computational intelligence (20)

SFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy FarmSFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy Farm
 
Smart Sensors.pptx
Smart Sensors.pptxSmart Sensors.pptx
Smart Sensors.pptx
 
The Industrial Internet of Things and RTI
The Industrial Internet of Things and RTIThe Industrial Internet of Things and RTI
The Industrial Internet of Things and RTI
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolution
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of Things
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
Iot
IotIot
Iot
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
 
Fog computing
Fog computingFog computing
Fog computing
 
IOT at a glance!
IOT at a glance!IOT at a glance!
IOT at a glance!
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart World
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart World
 
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
 

Dernier

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

05 SIVA - Emerging Trends in Analytics - mobile and real time computational intelligence

  • 1. Emerging Trends in Analytics – Mobile & Real-Time Computational Intelligence A/Prof Shonali Priyadarsini Krishnaswamy & Dr Sivakumar Viswanathan I2R Confidential
  • 3. Rationale and Motivations • Growth/ Proliferation of Mobile/Embedded Devices • Increasing Computational Capacity • Increasing Data Generation – as a continuous stream • Communication Overhead vs Processing Overhead vs Energy Consumption • Opportunity: – A new breed of intelligent mobile/pervasive applications I2R Confidential
  • 4. Data Stream Mining in Mobile/Pervasive Environments • Cost-efficient, Intelligent and Real-time Data Stream Mining techniques that can: – adapt to the context of diverse applications – cope with and leverage distributed computational platforms – take into account available resources I2R Confidential
  • 5. OPEN MOBILE MINER A Toolkit for Building Mobile Data Mining Applications I2R Confidential
  • 6. Situation-Aware Adaptive Data Stream Processing • Visualization • Mining • Adaptation • Situation Inference • Context Engine • Sensory layer I2R Confidential
  • 7. OMM Features • Easy deployment of mobile data mining applications on a range of mobile devices • F ilit ti integration of new and existing data stream Facilitation i t ti f d i ti d t t mining algorithms • Interface with a range of input sources for data streams • Allow flexible, application specific visualizations to be developed. de eloped I2R Confidential
  • 8. OMM – Open Mobile Miner I2R Confidential
  • 9. OPEN MOBILE MINER Real-Time ECG and Bio-Sensor Data Analysis I2R Confidential
  • 12. Visualization of Situations I2R Confidential
  • 13. Visualization of Situations I2R Confidential
  • 14. MobileECG I2R Confidential
  • 15. MobileECG I2R Confidential
  • 16. RA-Hot SAX Visualization I2R Confidential
  • 17. MARS - Mobile Activity Recognition System Enabling a Healthy Lifestyle – Innovation needs no wearable sensors – purely based on Phone sensors – and carrying the phone while walking etc. Personalised, Train for every User. I2R Confidential
  • 18. REMOTE HEALTH MONITORING SYSTEM A Solution for Continuous Monitoring Applications I2R Confidential
  • 19. System Overview Technology: • SOA based Mobile-healthcare services • Real-time & Asynchronous data collection Real time • Links to Personal Health Records (PHR) I2R Confidential
  • 20. Service Component PHR I2R Confidential
  • 21. Continuous ECG Monitoring SOAMOH ECG Data I2R Confidential
  • 22. Future Directions • Novel and innovative healthcare applications leveraging real-time, continuous and mobile analytics l i l i i d bil l i I2R Confidential