Nobody downloaded yet

Taxonomy on existing techniques of reducing false alarms in sensor-based healthcare monitoring systems - Annotated Bibliography Example

Comments (0) Cite this document
Summary
The studies are categorically divided into two: technical approach and sensor configuration. Sensor controls are further sub-divided into classification, clustering,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Taxonomy on existing techniques of reducing false alarms in sensor-based healthcare monitoring systems
Read TextPreview

Extract of sample "Taxonomy on existing techniques of reducing false alarms in sensor-based healthcare monitoring systems"

Download file to see previous pages According to Qassim, Patel and Modzhin (2014), fuzzy logic risk analysis is implemented to reduce false alarm instances and maintain sufficient level of security against serious attacks in intrusion and detection systems. The primary purpose of an intrusion and detection system is to identify attackers trying to infiltrate a network and expose vulnerable resources. By using a Fuzzy Logic-Risk Analysis (FLRA) model, the Qassim et al. (2014) aimed to reduce instances of false positives. By calculating the significance and severity of each suspected attack, the system establishes whether an activity can be classified as attempted attack or normal behavior miss judged by the detection system. The model comprises four layers: integrated interface, knowledge manager, autonomic manager, and resource manager. The topmost layer represents the integration point of the system administrator and the intrusion detection system. At this level, strategies and policies are defined and implemented. The section responsible for false positive reduction is the Intrusion Detection Manager. This second layer referred as the Fuzzy Logic-Risk Analysis Intrusion Detection Manager is responsible comprises of four modules: monitor module, analyzer, planner module and control module. All the modules act systematically to detect any attempts of intrusion, eliminate false positives and perform necessary changes to the protected element. Fuzzy Logic-Risk Analysis model works in two mechanisms: identifying the risk and assessing the risk. Once the risk has been identified it is assessed using weighted averages and consequently categorized. Threats are categorized based on their ability to cause harm to asset elements. Once the risk has been identified, residual and exposed risks are analyzed using Fuzzy logic from which different countermeasures are applied to mitigate it. FLRA model works by taking the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Taxonomy on existing techniques of reducing false alarms in Annotated Bibliography”, n.d.)
Taxonomy on existing techniques of reducing false alarms in Annotated Bibliography. Retrieved from https://studentshare.org/information-technology/1690957-taxonomy-on-existing-techniques-of-reducing-false-alarms-in-sensor-based-healthcare-monitoring-systems
(Taxonomy on Existing Techniques of Reducing False Alarms in Annotated Bibliography)
Taxonomy on Existing Techniques of Reducing False Alarms in Annotated Bibliography. https://studentshare.org/information-technology/1690957-taxonomy-on-existing-techniques-of-reducing-false-alarms-in-sensor-based-healthcare-monitoring-systems.
“Taxonomy on Existing Techniques of Reducing False Alarms in Annotated Bibliography”, n.d. https://studentshare.org/information-technology/1690957-taxonomy-on-existing-techniques-of-reducing-false-alarms-in-sensor-based-healthcare-monitoring-systems.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Taxonomy on existing techniques of reducing false alarms in sensor-based healthcare monitoring systems

Condition Monitoring Photovoltaic Energy Systems-based reliability

...?Condition Monitoring Photovoltaic Energy Systems-Based Reliability Table of Contents Literature Review 3 Major PV Modules and Types 3 Common Reliability Issues 5 Reliability Issues of Various PV Modules 11 Opinions 14 Suggestions 14 Works Cited 15 Literature Review Reliability is essential for maintaining the growth of Photovoltaic (PV) method to generate electricity through solar energy. ‘Reliability’ in this sense is the chance of failure of PV system or its parts over time which includes numerous materials, components and subcomponents. It is in this context that each of these parts and components are subjected to frequent failures of instruments which can result in...
11 Pages(2750 words)Research Paper

Inpatient Falls and bed alarms

...system can reduce the fall rates. Lippincott Williams & Wilkins (2007) has stated in “Best Practices: Evidence-Based Nursing Procedures” that the introduction of a pressure pad alarm can help in restraining a high risk patient. The pressure sensor pad is placed under the bed linens. When the patient tries to get out of bed the pressure is reduced which sets off an alarm. Another alarm device is worn by the patient above the knee. This kind of alarm system can effectively reduce fall rates among patient (Lippincott Williams & Wilkins, 2007). The study of...
9 Pages(2250 words)Dissertation

Taxonomy

...? Taxonomy                   Among the nine phyla of the animal kingdom, Phylum Porifera and Phylum Cnidaria lack organ systems. Moreover, they lack cephalization, as only six phyla show it – Mollusca, Arthropoda, Chordata, and the three worm phyla. It is also interesting to note that only the members of the Phylum Cnidaria do not possess all three germ layers. When it comes to the number of species, no phyla can outnumber the arthropods, which include arachnids, crustaceans, insects and other subphyla. As to the development of the fish, the armored fishes developed first, then followed by the jawless fishes, the cartilaginous and finally the bony fish. Lastly, when it comes to the development of their...
4 Pages(1000 words)Assignment

Southeast Asian in the US Ques 2

5 Pages(1250 words)Essay

Adopting Linear Wireless Sensor Networks for Border Monitoring

...consumption means more human dependence and more rapid change of systems and utilities. While mostly the activities are monitored from satellites and aerial planes, it might not be feasible to land on the border areas every time therefore energy dependency should be reduced. Another limitation faced in the existing surveillance networks is the degree of accuracy and range of coverage being provided by each of them. Other issues being faced through the modern surveillance systems include the false alarms that get on due to the natural factors like wind and animals and birds. Line of sight aspect: The line sight factor...
8 Pages(2000 words)Literature review

Sensor

...to measure the force being applied by the leg on the exoskeleton. This can be done by simply applying acoustic sensors between the knee and ankle of the human leg and the resulting signals can be transformed into energy magnitude. From this force being exerted on the lower limb can be determined easily. Acoustic sensors are not able to provide direct signal to the control system as the signal is too low when observed in terms of voltage. Therefore, we need pre-processing circuitry to reduce hardware induced noise as well as improve signal quality. BU-7135 is an accelerometer based acoustic myographic sensor. It is covered with a silicon...
12 Pages(3000 words)Research Paper

Privacy Concerns of Sensor Networks

...the network and marking the root of the malicious problem. The IDS works either by preventing known attacks by matching attack signatures against the monitored system, or by anomaly detection, in which anomalies in data profiles are identified. The first of these solutions has the drawback of not recognizing new attacks; the second has the drawback of creating a high number of false alarms. What are some of the other problems with sensor networks, other than privacy and security issues? One of the problems with sensor networks is the risk of data misrepresentation, as all relevant information is impossible to gather in the sensornet...
2 Pages(500 words)Coursework

Performance Based Budgeting - management systems and techniques

...management (Marc, 2007). These two strategies work under the specification that planning and strategies are connected to execution and measurement. Additionally, the two frameworks argue that linking results and resources is an accurate way of determining the cost of a particular outcome. Segal & Summers (2002) argues that this reduces the risks involved in deficits and over expenditures. Many organizations fail to prosper in the current economic system because they cannot measure the cost of their outcome. These organizations still apply ancient modes of budgeting where there is indirect cost allocation. This is harmful to even the smallest unit in existence in the society. For...
6 Pages(1500 words)Term Paper

Taxonomy

...fast when a trailer merges the traffic 20 Unsafe crossing Crossing as another car speeds along 21 Failure to look forward while driving Looking behind while driving forward 22 Inappropriate overtaking Overtaking before examining the traffic condition 23 Failure to slow down at the bump points A car speeding at bumps 24 Driving in a vehicle with tyres in bad condition Worn out tyres 25 Overloading the vehicle A trailer carrying excess weight Tools and techniques for management of road safety on highway Taking a safe automobile drive to test a car out on a highway will require a lot of discipline and caution. In this regard, ensure that your car is fitted with tools such as air bag and speed limit among others that are...
3 Pages(750 words)Case Study

Christian Believes

4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Annotated Bibliography on topic Taxonomy on existing techniques of reducing false alarms in sensor-based healthcare monitoring systems for FREE!

Contact Us