Abstract
We propose a genetic algorithm based alert technique for user safety and security within specific area in real time considering distinct health related factors to judge behavioral and psychological status depending on deviations in typical user movement as user protection is one of the major concerns in our society to defend health issues, human trafficking, and to aware users during emergency. Users’ emergency health status and typical health status are compared for generating health-based alert. Alert and weightage factors are introduced to calculate fitness function for proposed framework to attain higher efficiency in case of user protection. Fitness function is calculated to monitor user health status. Each user health status is compared with predefined threshold values in typical and emergency situations. In case, fitness function values are not in desired range in respect of a specific users’ health status, an immediate alert has been raised.
Similar content being viewed by others
References
Lianchao Jin F, Tan S, Jiang, (2020) Generative adversarial network technologies and applications in computer vision. Comput Intell Neurosci. https://doi.org/10.1155/2020/1459107
Yu D, YA-Zhi L, Xiang-Yang G, Wen-Dong W (2014) Road traffic and geography topology based opportunistic routing for VANETs. J. China Univ. Posts Telecommun. 21(4):32–39
Md. Alian HMO, Abulila Ahmed J, Lokesh K, Daehoon K, Nam Sung NCAP (2017) Network-driven packet context-aware power management for client-server architecture, IEEE International Symposium on High Performance Computer Architecture (HPCA), Austin, TX, USA, pp. 37–41
Chi-Tsun C, Chi KT, LauFrancis CM (2011) A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks. IEEE Sens J 11(3):699–710
Sreenivas M, Srinivas T (2008) Effectiveness of distribution network. Int J Inform Syst Supply Chain Manage (IJISSCM) 9:4
Al-Shaer E, Abdel-Wahab H, Maly K (1999) HiFi: a new monitoring architecture for distributed systems management, Proceedings of 19th IEEE International Conference on Distributed Computing Systems, Austin, TX,USA,pp. 171–178
Changjiang J, Min X, Weiren S (2011) Overview of cluster-based routing protocols in wireless sensor networks, International Conference on Electric Information and Control Engineering, pp. 3414–3417
Aykut K, Sedat A (2018) A survey on security threats and authentication approaches in wireless sensor networks, 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4
Rasha HT, Omar MdA, Omar HT, Nicolae T (2016) Patient monitoring system based on e-health sensors and web services, 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1–6
Markus Z, Thomas N, Andreas K (2015) Tracking human locomotion by relative positional feet tracking,IEEE Virtual Reality (VR), pp.317–318
Wenfeng Z, Zhenping L (2013) The multi-covering emergency service facility location problem with considering disaster losses, 11th International Symposium on Operations Research and its Applications in Engineering, Technology and Management (ISORA 2013), pp. 1–6
Yixiao Z, Yihai H, Zhaoxiang C, Xiao XH, Zheng H (2018) Big Operational data oriented health diagnosis based on weibull proportional hazards model for multi-state manufacturing system, Prognostics and System Health Management Conference (PHM-Chongqing), 2018, Chongqing, China, https://doi.org/10.1109/PHM-Chongqing.2018.00082
Archana PKM, Prateek T (2016) The best clustering algorithms in data mining, International Conference on Communication and Signal Processing (ICCSP), pp. 2042–2046
Semeh SB, Sami N (2016) Pattern recognition approach in multidimensional databases: application to the global terrorism database. Int J Adv Comput Sci Appl (IJACSA) 7:8
Niccolo G (2017) Genetic algorithms for small enterprises default prediction: empirical evidence from italy, nature-inspired computing: concepts, methodologies, tools, and applications, pp. 571–608
Yakhchali SH, Ghodsypour SH (2008) A hybrid genetic algorithms for computing the float of an activity in networks with imprecise durations. Proc IEEE Int Conf Fuzzy Syst, pp. 1789–1794
Bajrami X, Murturi I (2018) An efficient approach to monitoring environmental conditions using a wireless sensor network and NodeMCU. e & i Elektro technik und Informations technik 135(3):294–301
Sathishkumar M, Rajini S (2015) Smart surveillance system using PIR sensor network and GSM. Int J Adv Res Comput Eng Technol (IJARCET) 4:1
Bruno L, Pascoal Joao F (2018) Towards real-time patient prioritization in hospital emergency services. IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom),, Ostrava, Czech Republic, pp. 1–4
Suryanarayanan S, Manmadhan S, Rakesh N (2017) Design and development of real time patient monitoring system with GSM technology. J Cases Inform Technol 19(4):22–36
Antonio L, Gaetano V, Mimma N, Claudio G, Enzo SP (2015) Complexity index from a personalized wearable monitoring system for assessing remission in mental health. IEEE J Biomedical Health Inf 19(1):132–139
Elefelious BG, Scott D, McCrickard (2015) Comparing literature claims and user claims for mobile user interface design: A case study considering m-health application, International Conference on Collaboration Technologies and Systems (CTS), Atlanta, USA, pp. 418–425
Robben S, Englebienne G, Krose B (2017) Delta features from ambient sensor data are good predictors of change in functional health. IEEE J Biomedical Health Inf 21(4):986–993
Onuma M (2015) Using word-cooccurrence to determine health problems from health-care documents, 12th International Joint Conference on Computer Science and Software Engineering (JCSSE), Songkhla, Thailand, pp. 78–81
Rok Young C, Phillip PH (2014) Exploration, exploitation, and growth through new product development: the moderating effects of firm age and environmental adversity, IEEE Transactions on Engineering Management, vol. 61, issue 3, 2014, pp. 428–437
Yang J, Wang J (2017) Tag clustering algorithm LMMSK: improved K-means algorithm based on latent semantic analysis. J Syst Eng Electron 28(2):374–384
Noureddine B (2016) How Good is the Euclidean Distance Metric for the Clustering Problem, 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). Kumamoto, Japan, pp 312–315
Semeh SB, Sami N (2017) A computational cost-effective clustering algorithm in multidimensional space using the manhattan metric: application to the global terrorism database. Int J Comput Syst Eng 11:6
Anwiti J, Anand R, Rupali B (2012) Design, Analysis and implementation of modified k-mean algorithm for large data-set to increase scalability and efficiency, Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, India, pp. 627–631
De M, Kundu A, De Sarkar NR (2019) Simulation on real time monitoring for user healthcare information. Deep learning techniques for biomedical and health informatics. Elsevier, Amsterdam
He C, Xing J, Li J, Yang Q, Wang R, Zhang X (2015) A new optimal sensor placement strategy based on modified modal assurance criterion and improved adaptive genetic algorithm for structural health monitoring. Math Prbl Eng 2015:1–10
Yi TH, Li HN, Gu M (2011) Optimal sensor placement for health monitoring of high-rise structure based on genetic algorithm. Math Prbl Eng 2011:1–12. https://doi.org/10.1155/2011/395101
Brenda Jerop DR, Segera D (2021) An efficient PCA-GA-HKSVM-based disease diagnostic assistant. BioMed Res Int. https://doi.org/10.1155/2021/4784057
Acknowledgements
The research work is funded by Computer Innovative Research Society, West Bengal, India. Award number is “2021/CIRS/R&D/1001-01-14/HOTDPHCMGA”.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
De, M., Kundu, A. A hybrid optimization for threat detection in personal health crisis management using genetic algorithm. Int. j. inf. tecnol. 14, 2603–2618 (2022). https://doi.org/10.1007/s41870-022-00927-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-022-00927-8