ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب IoT and Big Data Technologies for Health Care: Third EAI International Conference, IoTCare 2022, Virtual Event, December 12-13, 2022, Proceedings

دانلود کتاب اینترنت اشیا و فناوری‌های داده بزرگ برای مراقبت‌های بهداشتی: سومین کنفرانس بین‌المللی EAI، IoTCare 2022، رویداد مجازی، 12-13 دسامبر 2022، مجموعه مقالات

IoT and Big Data Technologies for Health Care: Third EAI International Conference, IoTCare 2022, Virtual Event, December 12-13, 2022, Proceedings

مشخصات کتاب

IoT and Big Data Technologies for Health Care: Third EAI International Conference, IoTCare 2022, Virtual Event, December 12-13, 2022, Proceedings

ویرایش:  
نویسندگان:   
سری: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 501 
ISBN (شابک) : 3031335449, 9783031335440 
ناشر: Springer-EAI 
سال نشر: 2023 
تعداد صفحات: 348
[349] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 11 Mb 

قیمت کتاب (تومان) : 46,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب IoT and Big Data Technologies for Health Care: Third EAI International Conference, IoTCare 2022, Virtual Event, December 12-13, 2022, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا و فناوری‌های داده بزرگ برای مراقبت‌های بهداشتی: سومین کنفرانس بین‌المللی EAI، IoTCare 2022، رویداد مجازی، 12-13 دسامبر 2022، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب اینترنت اشیا و فناوری‌های داده بزرگ برای مراقبت‌های بهداشتی: سومین کنفرانس بین‌المللی EAI، IoTCare 2022، رویداد مجازی، 12-13 دسامبر 2022، مجموعه مقالات

این کتاب مجموعه مقالات داوری سومین کنفرانس بین‌المللی EAI در مورد اینترنت اشیا و فناوری‌های کلان داده برای مراقبت‌های بهداشتی، IotCARE 2022 است که به‌طور مجازی طی 12 تا 13 دسامبر 2022 برگزار شد. 23 مقاله موجود در این جلد با دقت بررسی و انتخاب شدند. 67 ارسالی. این مقالات جدیدترین نتایج را در فناوری‌های کلان داده برای سلامت الکترونیک و مراقبت الکترونیکی ارائه می‌دهند. مقالات در بخش‌های موضوعی زیر سازماندهی شده‌اند: فناوری‌های کلان داده برای سلامت الکترونیک. و فناوری های کلان داده برای مراقبت الکترونیکی.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the refereed proceedings of the Third EAI International Conference on IoT and Big Data Technologies for Health Care, IotCARE 2022, which took place virtually during December 12-13, 2022. The 23 papers included in this volume were carefully reviewed and selected from 67 submissions. The papers are present newest results in big data technologies for e-health and for e-care. The papers are organized in the following topical sections: big data technologies for e-health; and big data technologies for e-care.



فهرست مطالب

Preface
Organization
Contents
Big Data Technologies for e-Health
A Review of Computer-Assisted Techniques Performances in Malaria Diagnosis
	1 Introduction
	2 Related Works
	3 Materials and Methods
	4 Data Acquisition
		4.1 Coloring Methods
	5 Pretreatment of Images
		5.1 Segmentation Methods
		5.2 Feature Extraction Methods
		5.3 Feature Selection Methods
	6 Classification Methods
		6.1 Interpretation of Results
	7 Discussions
	8 Conclusion
	References
Research on Cloud Health Privacy Information Protection Algorithm Based on Data Mining
	1 Introduction
	2 Health Privacy Information Protection Algorithm on the Cloud
		2.1 Build a Differential Privacy Information Protection Model
		2.2 Setting up Health Privacy Information Protection Indicators on the Cloud
		2.3 Extracting Information Privacy Patterns Based on Data Mining
		2.4 Data Support Setting Privacy Information Protection Algorithm
	3 Experimental Studies
		3.1 Experiment Preparation
		3.2 Results and Analysis
	4 Conclusion
	References
Data Security Mining Method for Social Media Users’ Mental Health Status Test Based on Machine Learning Algorithm
	1 Introduction
	2 Test Data Clustering
	3 Feature Extraction of Mental Health Status of Social Media Users
	4 Building a Data Mining Model Based on Machine Learning Algorithms
	5 Design the Data Analysis Algorithm for Social Media Users’ Mental Health State Test
	6 Experimental Test
		6.1 Acquisition and Preprocessing of Raw Data
		6.2 Model Accuracy Test
	7 Conclusion
	References
Early Warning Method of College Students Mental Subhealth Based on Internet of Things
	1 Introduction
	2 Collection and Transmission of Information on College Students’ Mental Subhealth
	3 Design of Early Warning Methods for College Students’ Mental Sub-Health
		3.1 Information Analysis of College Students' Mental Subhealth
		3.2 Early Warning Information Arrangement of College Students’ Mental Subhealth
		3.3 Design Early Warning Information Transmission Scheme
	4 Experiment Analysis
		4.1 Experimental Analysis on the Positioning Accuracy of Early Warning Nodes
		4.2 An Experimental Analysis on the Accuracy of Grades for Assessing Students’ Mental Sub-Health State
		4.3 Experimental Analysis on Transmission Speed of Early Warning Information
	5 Discussion
	6 Conclusion
	References
Automatic Assessment Method of College Students Psychological Stress Based on Medical Big Data
	1 Introduction
	2 Medical Big Data Acquisition and Analysis Processing
		2.1 Crawlers Acquire Medical Big Data
		2.2 Medical Big Data Preprocessing
	3 Analysis on the Evaluation Index of College Students’ Psychological Stress
	4 Medical Big Data Mining
	5 Realize the Psychological Stress Assessment of College Students
	6 Test Study
		6.1 Test Content
		6.2 Test Result
	7 Conclusion
	References
Research on Medical Sensitive Data Protection Algorithm Based on Differential Privacy
	1 Introduction
	2 Differential Privacy Protection Technology for Medical Sensitive Data
		2.1 Laplace Mechanism and Index Mechanism
		2.2 Query Control Model
		2.3 Calculation of Security Trust Degree
	3 Medical Sensitive Data Protection Methods
		3.1 R-tree Clustering Structure
		3.2 Sensitivity
		3.3 Sensitive Point Search
	4 Case Analysis
	5 Conclusion
	References
Classification and Storage Method of Medical Health Monitoring Data Based on Bayesian Algorithm
	1 Introduction
	2 Classification and Storage of Medical Health Monitoring Data
		2.1 Data Collection and Integration
		2.2 Data Classification
		2.3 Data Classification Storage
	3 Storage Test
		3.1 Experimental Data and Test Environment
		3.2 Test Results
	4 Conclusion
	References
Analysis on the Balance of Health Care Resource Allocation Based on Improved Machine Learning
	1 Introduction
	2 Space Accessibility Calculation of Health Care Services
	3 Prediction of Health Resource Demand Based on Improved Machine Learning
	4 Build a Supply-Demand Coordination Model
	5 Analysis on the Balance of Health Resources Allocation
	6 Experimental Study
		6.1 Overview of the Study Area
		6.2 Prediction and Analysis of Health Resource Demand
		6.3 Analysis of Resource Allocation Balance
	7 Conclusion
	References
Data Acquisition Method of Human Injury in Sports Based on Internet of Things
	1 Introduction
	2 Analysis of Human Motion Characteristics
	3 Motion State Description
	4 Multi-sensor Data Fusion in Human Motion
	5 Establishing a Sports Injury Data Collection Model Based on the Internet of Things
	6 Experimental Studies
		6.1 Experiment Preparation
		6.2 Results and Analysis
	7 Conclusion
	References
Big Data Technologies for e-Care
The Psychosocial Therapy Mode Intervened in the Emotion Management of Property Management Staff
	1 Introduction
	2 Psychosocial Therapy Model Involved in the Application of Emotional Management of Property Management Employees
		2.1 Emotion Management
		2.2 Analysis of the Causes of Emotional Problems of Property Management Employees
		2.3 Analysis of the Application of Psychotherapy Model to Emotional Management Methods of Property Employees
		2.4 The Psychotherapy Model is Applied to the Analysis of Countermeasures for the Emotional Management of Property Employees
	3 Psychosocial Treatment Model Involved in the Experimental Study of the Emotions of Property Management Employees
		3.1 Experimental Protocol
		3.2 Research Methods
	4 Psychosocial Treatment Model Involved in the Emotional Experiment Analysis of Property Management Staff
		4.1 Analysis of the Overall Situation of Emotional Management of Property Personnel
		4.2 Analysis of Property Management STaff's Awareness of Emotional Management
	5 Conclusion
	References
Personalized Recommendation Method of Maternal and Child Health Education Resources Based on Association Rule Mining Algorithm
	1 Introduction
	2 Get the Characteristics of Digital Teaching Resources
	3 Build a User Interest Preference Model
	4 Establish Maternal and Child Health Care Knowledge Base
	5 Design Personalized Recommendation Method Based on Association Rule Mining Algorithm
	6 Simulation Experiments
		6.1 Build up the Experimental Environment
		6.2 Experimental Results
	7 Conclusion
	References
Methods of Integrating Ideological and Political Education into Health Management in Colleges and Universities Based on Internet of Things Technology
	1 Introduction
	2 Integrate Ideological and Political Education into Health Management in Colleges and Universities
		2.1 Integration Method of Ideological and Political Education into Health Management in Colleges and Universities
		2.2 Evaluation Algorithm of Integrating Ideological and Political Education into Health Management in Colleges and Universities
		2.3 The Realization of Integrating Ideological and Political Education into Health Management
	3 Analysis of Experimental Results
	4 Suggestions on Integrating Ideological and Political Education into Health Management in Colleges and Universities
	5 Conclusion
	References
Data Mining of Psychological Tendency and Health of Ideological and Political Students in Higher Vocational Tourism English Courses
	1 Introduction
	2 The Design of Data Mining Method for Students’ Psychological Tendency Health
		2.1 Cleaning Student Mental Health Data
		2.2 Designing an Algorithm of Students’ Psychological Tendency Health Data Classification Based on SVM
		2.3 Calculate the Correlation Between the Characteristics of Students’ Psychological Tendency and Health Data
		2.4 Optimal Modeling of Students’ Psychological Tendency Health Data
		2.5 Realization of Students’ Psychological Tendency Health Data Mining
	3 Experimental Comparative Analysis
		3.1 Experimental Data Source
		3.2 Data Purification
		3.3 Result Analysis
	4 Conclusion
	References
Intelligent Imaging Method of Nuclear Magnetic Resonance Medical Devices Based on Compression Sensing
	1 Introduction
	2 Collect Magnetic Field Imaging Signal
	3 Extracting NMR Pulse Sequence
	4 Recognizing Dynamic Features of Medical Device Images
	5 Optimization of Intelligent Imaging Mode Based on Compressed Sensing
	6 Simulation Experiment Analysis
		6.1 Experimental Preparation
		6.2 Experimental Result
	7 Conclusion
	References
Evaluation of Post Fitness of Employees in Health Care Enterprises Based on Big Data
	1 Introduction
	2 Health Care Enterprise Staff Post Fitness Evaluation
		2.1 Selection Principles and Ideas of Fitness Evaluation Indicators
		2.2 Establish a Fitness Evaluation Index System
		2.3 Index Identification and Quantification
		2.4 Calculate Fitness
	3 Empirical Analysis
		3.1 Experimental Preparation
		3.2 Overall Analysis of Fitness
	4 Concluding Remarks
	References
Design of Telemedicine and Health Care System Based on Embedded Technology
	1 Introduction
	2 Embedded Applications of Telehealth Care Systems
	3 System Hardware Structure Design
		3.1 Embedded Server Side
		3.2 Monitoring Network Terminal
		3.3 Data Acquisition Terminal
		3.4 Embedded Monitor
	4 Software Part Design
		4.1 Telemedicine Information Search Based on Embedded Technology
		4.2 Physiological Signal Monitoring
		4.3 Monitoring Signal Transmission Based on Multi-threading
	5 Experiments
		5.1 Construction of Virtual Experimental Environment
		5.2 Experimental Setup
		5.3 Analysis of Experimental Data
		5.4 Experimental Results and Analysis
	6 Conclusion
	References
Anomaly Detection Method of Healthcare Internet of Things Gateway Supporting Edge Computing
	1 Introduction
	2 Research on Anomaly Detection of Internet of Things Gateways Based on Edge Computing
		2.1 Determination of Gateway Status Indicators
		2.2 Anomaly Detection Task Offloading Based on Edge Computing
		2.3 Gateway Anomaly Detection Based on Deep Learning
	3 Detection Method Application Test
		3.1 Gateway Status Indicators
		3.2 Sample Preparation
		3.3 Task Offloading Scheme
		3.4 Anomaly Detection Results
		3.5 Method Performance Test
	4 Conclusion
	References
Research on Fast Encryption of Electronic Health Record Data Based on Privacy Protection
	1 Introduction
	2 Related Work
	3 Methods
		3.1 User Privacy Protection
		3.2 Authority Assignment
		3.3 Logic Analysis of Electronic Information Resources
		3.4 Encryption of Electronic Information Resources
	4 Experiment
	5 Conclusion
	References
Research on Secure Storage of Healthcare Data in the Environment of Internet of Things
	1 Introduction
	2 Trusted Identification and Verification of Storage Resource Provision and Use Requests
		2.1 Data resource security analysis.
		2.2 Trusted Identities for Storage Resource Provision and Use Requests
		2.3 Compliance Verification of Storage Resource Provision and Usage Requests
	3 Implementation of Secure Storage of Healthcare Data
		3.1 Data Distance Calculation
		3.2 Spatial Data Division
		3.3 Establish a Spatial Database
		3.4 Realize Distributed Storage of Cyberspace Data
	4 Experimental Analysis
		4.1 Initialization Time Overhead
		4.2 Key Distribution Time Overhead
		4.3 Encryption Time Overhead
		4.4 Retrieval Time Overhead
		4.5 Comparison of Encrypted Information Theft
		4.6 Comparison of Information Changed
	5 Conclusion
	References
Architecture of Wide Area Health Monitoring System
	1 Introduction
	2 System Architecture
	3 System Implementation
	4 Discussion
	5 Conclusions
	References
Internet of Things Technologies in Healthcare for People with Hearing Impairments
	1 Introduction
	2 The Internet of Things (IoT): An Overview
		2.1 IoT in Healthcare
	3 Related Work
	4 Challenges and Future Work
	5 Conclusion
	References
Artificial Intelligence-Based Early Warning Method for Abnormal Operation and Maintenance Data of Medical and Health Equipment
	1 Introduction
	2 Research on Abnormal Early Warning of Medical and Health Care Equipment Operation and Maintenance Data
		2.1 Establish the Overall Framework of Data Anomaly Warning
		2.2 Establish Abnormal Data Detection Model Based on Artificial Intelligence Technology
		2.3 Medical and Health Care Equipment Operation and Maintenance Data Abnormal Warning
	3 Performance Test of Data Anomaly Early Warning Method
		3.1 Preparation of Experimental Data
		3.2 Experimental Results of Nonlinear Data
		3.3 Experimental Results and Analysis of Anomaly Detection and Evaluation
	4 Concluding Remarks
	References
Abnormal Signal Recognition Method of Wearable Sensor Based on Machine Learning
	1 Introduction
	2 Design of Abnormal Signal Recognition Method of Wearable Sensor
		2.1 Set the Judgment Standard of Wearable Sensor Abnormality
		2.2 Collect Wearable Sensor Signal
		2.3 Fusion Processing of Wearable Sensor Signals
		2.4 Extracting Sensor Signal Characteristics Using Machine Learning Algorithm
		2.5 Realize Abnormal Signal Recognition of Wearable Sensor
	3 Experimental Analysis of Recognition Performance Test
		3.1 Prepare Wearable Sensor Research Samples
		3.2 Configure the Experimental Environment
		3.3 Generate Wearable Sensor Signal
		3.4 Input Machine Learning Algorithm Working Parameters
		3.5 Describe the Performance Test Process
		3.6 Set Identification Performance Quantitative Test Indicators
		3.7 Analysis of Experimental Results
	4 Conclusion
	References
Author Index




نظرات کاربران