Infrequent pattern mining in smart healthcare environment using data summarization

被引:13
作者
Ahmed, Mohiuddin [1 ]
Ullah, Abu S. S. M. Barkat [1 ]
机构
[1] Canberra Inst Technol, Ctr Cyber Secur & Games, Canberra, ACT 2601, Australia
关键词
Summarization; Clustering; Information theory; Cyber physical systems; Smart health care; Big data; NETWORK; FRAMEWORK;
D O I
10.1007/s11227-018-2376-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A summarization technique creates a concise version of large amount of data (big data!) which reduces the computational cost of analysis and decision-making. There are interesting data patterns, such as rare anomalies, which are more infrequent in nature than other data instances. For example, in smart healthcare environment, the proportion of infrequent patterns is very low in the underlying cyber physical system (CPS). Existing summarization techniques overlook the issue of representing such interesting infrequent patterns in a summary. In this paper, a novel clustering-based technique is proposed which uses an information theoretic measure to identify the infrequent frequent patterns for inclusion in a summary. The experiments conducted on seven benchmark CPS datasets show substantially good results in terms of including the infrequent patterns in summaries than existing techniques.
引用
收藏
页码:5041 / 5059
页数:19
相关论文
共 45 条
[31]  
Hore P, 2004, IEEE INT CONF FUZZY, P143
[32]   The Internet of Things for Health Care: A Comprehensive Survey [J].
Islam, S. M. Riazul ;
Kwak, Daehan ;
Kabir, Md. Humaun ;
Hossain, Mahmud ;
Kwak, Kyung-Sup .
IEEE ACCESS, 2015, 3 :678-708
[33]  
Jiawei Han, 1994, SIGMOD Record, V23, DOI 10.1145/191843.191979
[34]  
Jiawei Han, 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P250
[35]   A Hybrid Approach to Clustering in Big Data [J].
Kumar, Dheeraj ;
Bezdek, James C. ;
Palaniswami, Marimuthu ;
Rajasegarar, Sutharshan ;
Leckie, Christopher ;
Havens, Timothy Craig .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (10) :2372-2385
[36]  
Pelleg D., 2000, P 17 INT C MACH LEAR, V1, P727, DOI DOI 10.1007/3-540-44491-2_3
[37]  
Pouzols FM, 2011, STUD COMPUT INTELL, V342, P147
[38]  
Saleem K, 2017, SECURITY CYBER PHYS, P233, DOI DOI 10.1007/978-3-319-47617-9_12
[39]  
Suthaharan Shan, 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2010), P269, DOI 10.1109/ISSNIP.2010.5706782
[40]  
Viet Ha-Thuc, 2008, 2008 IEEE International Conference on Research, Innovation and Vision for the Future in Computing and Communication Technologies (RIVF 2008), P240, DOI 10.1109/RIVF.2008.4586362