SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Emerging Trends in
       Analytics –
    Mobile & Real-Time
     Computational
       Intelligence
A/Prof Shonali Priyadarsini Krishnaswamy
                    &
       Dr Sivakumar Viswanathan
               I2R Confidential
Sensors, Sensors Everywhere…




           I2R Confidential
Rationale and Motivations
• Growth/ Proliferation of Mobile/Embedded
  Devices
• Increasing Computational Capacity
• Increasing Data Generation – as a
  continuous stream
• Communication Overhead vs Processing
  Overhead vs Energy Consumption
• Opportunity:
  – A new breed of intelligent mobile/pervasive
    applications
                    I2R Confidential
Data Stream Mining in
Mobile/Pervasive Environments

• Cost-efficient, Intelligent and Real-time
  Data Stream Mining techniques that can:
  – adapt to the context of diverse applications
  – cope with and leverage distributed
    computational platforms
  – take into account available resources




                     I2R Confidential
OPEN MOBILE MINER



A Toolkit for Building Mobile Data Mining
Applications



                   I2R Confidential
Situation-Aware Adaptive Data
       Stream Processing


                               •   Visualization
                               •   Mining
                               •   Adaptation
                               •   Situation Inference
                               •   Context Engine
                               •   Sensory layer




            I2R Confidential
OMM Features
• Easy deployment of mobile data mining applications on
  a range of mobile devices

• F ilit ti integration of new and existing data stream
  Facilitation i t  ti   f       d i ti d t t
  mining algorithms

• Interface with a range of input sources for data streams

• Allow flexible, application specific visualizations to be
  developed.
  de eloped

                         I2R Confidential
OMM – Open Mobile Miner




         I2R Confidential
OPEN MOBILE MINER



Real-Time ECG and Bio-Sensor Data Analysis




                   I2R Confidential
Situation-Aware Adaptation Demo




             I2R Confidential
Situation-Aware Adaptation Demo




             I2R Confidential
Visualization of Situations




          I2R Confidential
Visualization of Situations




          I2R Confidential
MobileECG




  I2R Confidential
MobileECG




  I2R Confidential
RA-Hot SAX Visualization




         I2R Confidential
MARS - Mobile Activity Recognition
            System
Enabling a Healthy Lifestyle – Innovation needs no wearable sensors – purely based on Phone sensors –
and carrying the phone while walking etc. Personalised, Train for every User.




                                           I2R Confidential
REMOTE HEALTH
MONITORING SYSTEM

A Solution for Continuous Monitoring Applications




                     I2R Confidential
System Overview




Technology:
• SOA based Mobile-healthcare services
• Real-time & Asynchronous data collection
   Real time
• Links to Personal Health Records (PHR)

                   I2R Confidential
Service Component


                         PHR




      I2R Confidential
Continuous ECG Monitoring
                SOAMOH



                             ECG Data




          I2R Confidential
Future Directions


• Novel and innovative healthcare applications
  leveraging real-time, continuous and mobile analytics
  l      i      l i         i        d   bil     l i




                        I2R Confidential
Thank You

Más contenido relacionado

La actualidad más candente

Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureChiyang Lin
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Jack Wong
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Erez Metula
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
How to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesHow to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesZoltán Dankó
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILECOMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILEAnkit Kumar
 
iot based home automation
iot based home automationiot based home automation
iot based home automationparvathy s m
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOTNaveensing87
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system Puneet Mishra
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationKristen Yarmey
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 

La actualidad más candente (20)

Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architecture
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
How to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesHow to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth services
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILECOMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOT
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field Communication
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Similar a SIVA - Emerging Trends in Analytics

Smart Sensors.pptx
Smart Sensors.pptxSmart Sensors.pptx
Smart Sensors.pptxDrHemaCR
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolutionusman sarwar
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of ThingsON Semiconductor
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimativeCleber Gomes
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimDaeyoung Kim
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 
Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Eng Ansam Hadi
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...moodman0903
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...moodman0903
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io tChintan Patel
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart WorldPriyanka2828
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart WorldPriyanka2828
 
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Aravindharamanan S
 

Similar a SIVA - Emerging Trends in Analytics (20)

SFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy FarmSFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy Farm
 
Smart Sensors.pptx
Smart Sensors.pptxSmart Sensors.pptx
Smart Sensors.pptx
 
The Industrial Internet of Things and RTI
The Industrial Internet of Things and RTIThe Industrial Internet of Things and RTI
The Industrial Internet of Things and RTI
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolution
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of Things
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
Iot
IotIot
Iot
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
 
Fog computing
Fog computingFog computing
Fog computing
 
IOT at a glance!
IOT at a glance!IOT at a glance!
IOT at a glance!
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart World
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart World
 
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

SIVA - Emerging Trends in Analytics

  • 1. Emerging Trends in Analytics – Mobile & Real-Time Computational Intelligence A/Prof Shonali Priyadarsini Krishnaswamy & Dr Sivakumar Viswanathan I2R Confidential
  • 3. Rationale and Motivations • Growth/ Proliferation of Mobile/Embedded Devices • Increasing Computational Capacity • Increasing Data Generation – as a continuous stream • Communication Overhead vs Processing Overhead vs Energy Consumption • Opportunity: – A new breed of intelligent mobile/pervasive applications I2R Confidential
  • 4. Data Stream Mining in Mobile/Pervasive Environments • Cost-efficient, Intelligent and Real-time Data Stream Mining techniques that can: – adapt to the context of diverse applications – cope with and leverage distributed computational platforms – take into account available resources I2R Confidential
  • 5. OPEN MOBILE MINER A Toolkit for Building Mobile Data Mining Applications I2R Confidential
  • 6. Situation-Aware Adaptive Data Stream Processing • Visualization • Mining • Adaptation • Situation Inference • Context Engine • Sensory layer I2R Confidential
  • 7. OMM Features • Easy deployment of mobile data mining applications on a range of mobile devices • F ilit ti integration of new and existing data stream Facilitation i t ti f d i ti d t t mining algorithms • Interface with a range of input sources for data streams • Allow flexible, application specific visualizations to be developed. de eloped I2R Confidential
  • 8. OMM – Open Mobile Miner I2R Confidential
  • 9. OPEN MOBILE MINER Real-Time ECG and Bio-Sensor Data Analysis I2R Confidential
  • 12. Visualization of Situations I2R Confidential
  • 13. Visualization of Situations I2R Confidential
  • 14. MobileECG I2R Confidential
  • 15. MobileECG I2R Confidential
  • 16. RA-Hot SAX Visualization I2R Confidential
  • 17. MARS - Mobile Activity Recognition System Enabling a Healthy Lifestyle – Innovation needs no wearable sensors – purely based on Phone sensors – and carrying the phone while walking etc. Personalised, Train for every User. I2R Confidential
  • 18. REMOTE HEALTH MONITORING SYSTEM A Solution for Continuous Monitoring Applications I2R Confidential
  • 19. System Overview Technology: • SOA based Mobile-healthcare services • Real-time & Asynchronous data collection Real time • Links to Personal Health Records (PHR) I2R Confidential
  • 20. Service Component PHR I2R Confidential
  • 21. Continuous ECG Monitoring SOAMOH ECG Data I2R Confidential
  • 22. Future Directions • Novel and innovative healthcare applications leveraging real-time, continuous and mobile analytics l i l i i d bil l i I2R Confidential