SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Emerging Trends in
       Analytics –
    Mobile & Real-Time
     Computational
       Intelligence
A/Prof Shonali Priyadarsini Krishnaswamy
                    &
       Dr Sivakumar Viswanathan
               I2R Confidential
Sensors, Sensors Everywhere…




           I2R Confidential
Rationale and Motivations
• Growth/ Proliferation of Mobile/Embedded
  Devices
• Increasing Computational Capacity
• Increasing Data Generation – as a
  continuous stream
• Communication Overhead vs Processing
  Overhead vs Energy Consumption
• Opportunity:
  – A new breed of intelligent mobile/pervasive
    applications
                    I2R Confidential
Data Stream Mining in
Mobile/Pervasive Environments

• Cost-efficient, Intelligent and Real-time
  Data Stream Mining techniques that can:
  – adapt to the context of diverse applications
  – cope with and leverage distributed
    computational platforms
  – take into account available resources




                     I2R Confidential
OPEN MOBILE MINER



A Toolkit for Building Mobile Data Mining
Applications



                   I2R Confidential
Situation-Aware Adaptive Data
       Stream Processing


                               •   Visualization
                               •   Mining
                               •   Adaptation
                               •   Situation Inference
                               •   Context Engine
                               •   Sensory layer




            I2R Confidential
OMM Features
• Easy deployment of mobile data mining applications on
  a range of mobile devices

• F ilit ti integration of new and existing data stream
  Facilitation i t  ti   f       d i ti d t t
  mining algorithms

• Interface with a range of input sources for data streams

• Allow flexible, application specific visualizations to be
  developed.
  de eloped

                         I2R Confidential
OMM – Open Mobile Miner




         I2R Confidential
OPEN MOBILE MINER



Real-Time ECG and Bio-Sensor Data Analysis




                   I2R Confidential
Situation-Aware Adaptation Demo




             I2R Confidential
Situation-Aware Adaptation Demo




             I2R Confidential
Visualization of Situations




          I2R Confidential
Visualization of Situations




          I2R Confidential
MobileECG




  I2R Confidential
MobileECG




  I2R Confidential
RA-Hot SAX Visualization




         I2R Confidential
MARS - Mobile Activity Recognition
            System
Enabling a Healthy Lifestyle – Innovation needs no wearable sensors – purely based on Phone sensors –
and carrying the phone while walking etc. Personalised, Train for every User.




                                           I2R Confidential
REMOTE HEALTH
MONITORING SYSTEM

A Solution for Continuous Monitoring Applications




                     I2R Confidential
System Overview




Technology:
• SOA based Mobile-healthcare services
• Real-time & Asynchronous data collection
   Real time
• Links to Personal Health Records (PHR)

                   I2R Confidential
Service Component


                         PHR




      I2R Confidential
Continuous ECG Monitoring
                SOAMOH



                             ECG Data




          I2R Confidential
Future Directions


• Novel and innovative healthcare applications
  leveraging real-time, continuous and mobile analytics
  l      i      l i         i        d   bil     l i




                        I2R Confidential
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureChiyang Lin
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Jack Wong
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Erez Metula
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
How to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesHow to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesZoltán Dankó
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILECOMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILEAnkit Kumar
 
iot based home automation
iot based home automationiot based home automation
iot based home automationparvathy s m
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOTNaveensing87
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system Puneet Mishra
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationKristen Yarmey
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 

Was ist angesagt? (20)

Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architecture
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019Zetakey Universal IoT Gateway (UIG) 2019
Zetakey Universal IoT Gateway (UIG) 2019
 
Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016Iot top 10 vulnerabilities and misconceptions 2016
Iot top 10 vulnerabilities and misconceptions 2016
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
How to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth servicesHow to protect your loved ones - Secure ehealth services
How to protect your loved ones - Secure ehealth services
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILECOMPUTER LAB MANAGEMENT FOR CHINA MOBILE
COMPUTER LAB MANAGEMENT FOR CHINA MOBILE
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOT
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
IoT Home monitoring system
IoT Home monitoring system IoT Home monitoring system
IoT Home monitoring system
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field Communication
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Ähnlich wie SIVA - Emerging Trends in Analytics

Smart Sensors.pptx
Smart Sensors.pptxSmart Sensors.pptx
Smart Sensors.pptxDrHemaCR
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolutionusman sarwar
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of ThingsON Semiconductor
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimativeCleber Gomes
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimDaeyoung Kim
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 
Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Eng Ansam Hadi
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...moodman0903
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...moodman0903
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io tChintan Patel
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart WorldPriyanka2828
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart WorldPriyanka2828
 
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Aravindharamanan S
 

Ähnlich wie SIVA - Emerging Trends in Analytics (20)

SFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy FarmSFScon19 - Francesca Orlandi - Healthy Farm
SFScon19 - Francesca Orlandi - Healthy Farm
 
Smart Sensors.pptx
Smart Sensors.pptxSmart Sensors.pptx
Smart Sensors.pptx
 
The Industrial Internet of Things and RTI
The Industrial Internet of Things and RTIThe Industrial Internet of Things and RTI
The Industrial Internet of Things and RTI
 
The internet of things the next technology revolution
The internet of things the next technology revolutionThe internet of things the next technology revolution
The internet of things the next technology revolution
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of Things
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
Iot
IotIot
Iot
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
 
Fog computing
Fog computingFog computing
Fog computing
 
IOT at a glance!
IOT at a glance!IOT at a glance!
IOT at a glance!
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based Smart cities applications using IOT and cloud-based
Smart cities applications using IOT and cloud-based
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_030144_0000...
 
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
Minimal and Professional Startup Pitch Deck Presentation_20240203_024019_0000...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart World
 
Green IoT for Smart World
Green IoT for Smart WorldGreen IoT for Smart World
Green IoT for Smart World
 
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
Mobiletrendsiotandcloudintegration 150618162440-lva1-app6892
 

Kürzlich hochgeladen

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Kürzlich hochgeladen (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

SIVA - Emerging Trends in Analytics

  • 1. Emerging Trends in Analytics – Mobile & Real-Time Computational Intelligence A/Prof Shonali Priyadarsini Krishnaswamy & Dr Sivakumar Viswanathan I2R Confidential
  • 3. Rationale and Motivations • Growth/ Proliferation of Mobile/Embedded Devices • Increasing Computational Capacity • Increasing Data Generation – as a continuous stream • Communication Overhead vs Processing Overhead vs Energy Consumption • Opportunity: – A new breed of intelligent mobile/pervasive applications I2R Confidential
  • 4. Data Stream Mining in Mobile/Pervasive Environments • Cost-efficient, Intelligent and Real-time Data Stream Mining techniques that can: – adapt to the context of diverse applications – cope with and leverage distributed computational platforms – take into account available resources I2R Confidential
  • 5. OPEN MOBILE MINER A Toolkit for Building Mobile Data Mining Applications I2R Confidential
  • 6. Situation-Aware Adaptive Data Stream Processing • Visualization • Mining • Adaptation • Situation Inference • Context Engine • Sensory layer I2R Confidential
  • 7. OMM Features • Easy deployment of mobile data mining applications on a range of mobile devices • F ilit ti integration of new and existing data stream Facilitation i t ti f d i ti d t t mining algorithms • Interface with a range of input sources for data streams • Allow flexible, application specific visualizations to be developed. de eloped I2R Confidential
  • 8. OMM – Open Mobile Miner I2R Confidential
  • 9. OPEN MOBILE MINER Real-Time ECG and Bio-Sensor Data Analysis I2R Confidential
  • 12. Visualization of Situations I2R Confidential
  • 13. Visualization of Situations I2R Confidential
  • 14. MobileECG I2R Confidential
  • 15. MobileECG I2R Confidential
  • 16. RA-Hot SAX Visualization I2R Confidential
  • 17. MARS - Mobile Activity Recognition System Enabling a Healthy Lifestyle – Innovation needs no wearable sensors – purely based on Phone sensors – and carrying the phone while walking etc. Personalised, Train for every User. I2R Confidential
  • 18. REMOTE HEALTH MONITORING SYSTEM A Solution for Continuous Monitoring Applications I2R Confidential
  • 19. System Overview Technology: • SOA based Mobile-healthcare services • Real-time & Asynchronous data collection Real time • Links to Personal Health Records (PHR) I2R Confidential
  • 20. Service Component PHR I2R Confidential
  • 21. Continuous ECG Monitoring SOAMOH ECG Data I2R Confidential
  • 22. Future Directions • Novel and innovative healthcare applications leveraging real-time, continuous and mobile analytics l i l i i d bil l i I2R Confidential