Skip to main content
Log in

A hybrid optimization for threat detection in personal health crisis management using genetic algorithm

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

We propose a genetic algorithm based alert technique for user safety and security within specific area in real time considering distinct health related factors to judge behavioral and psychological status depending on deviations in typical user movement as user protection is one of the major concerns in our society to defend health issues, human trafficking, and to aware users during emergency. Users’ emergency health status and typical health status are compared for generating health-based alert. Alert and weightage factors are introduced to calculate fitness function for proposed framework to attain higher efficiency in case of user protection. Fitness function is calculated to monitor user health status. Each user health status is compared with predefined threshold values in typical and emergency situations. In case, fitness function values are not in desired range in respect of a specific users’ health status, an immediate alert has been raised.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Lianchao Jin F, Tan S, Jiang, (2020) Generative adversarial network technologies and applications in computer vision. Comput Intell Neurosci. https://doi.org/10.1155/2020/1459107

    Article  Google Scholar 

  2. Yu D, YA-Zhi L, Xiang-Yang G, Wen-Dong W (2014) Road traffic and geography topology based opportunistic routing for VANETs. J. China Univ. Posts Telecommun. 21(4):32–39

    Article  Google Scholar 

  3. Md. Alian HMO, Abulila Ahmed J, Lokesh K, Daehoon K, Nam Sung NCAP (2017)  Network-driven packet context-aware power management for client-server architecture, IEEE International Symposium on High Performance Computer Architecture (HPCA), Austin, TX, USA, pp. 37–41

  4. Chi-Tsun C, Chi KT, LauFrancis CM (2011) A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks. IEEE Sens J 11(3):699–710

    Article  Google Scholar 

  5. Sreenivas M, Srinivas T (2008) Effectiveness of distribution network. Int J Inform Syst Supply Chain Manage (IJISSCM) 9:4

    Google Scholar 

  6. Al-Shaer E, Abdel-Wahab H, Maly K (1999) HiFi: a new monitoring architecture for distributed systems management, Proceedings of 19th IEEE International Conference on Distributed Computing Systems, Austin, TX,USA,pp. 171–178

  7. Changjiang J, Min X, Weiren S (2011) Overview of cluster-based routing protocols in wireless sensor networks, International Conference on Electric Information and Control Engineering, pp. 3414–3417

  8. Aykut K, Sedat A (2018) A survey on security threats and authentication approaches in wireless sensor networks, 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4

  9. Rasha HT, Omar MdA, Omar HT, Nicolae T (2016) Patient monitoring system based on e-health sensors and web services, 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1–6

  10. Markus Z, Thomas N, Andreas K (2015) Tracking human locomotion by relative positional feet tracking,IEEE Virtual Reality (VR), pp.317–318

  11. Wenfeng Z, Zhenping L (2013) The multi-covering emergency service facility location problem with considering disaster losses, 11th International Symposium on Operations Research and its Applications in Engineering, Technology and Management (ISORA 2013), pp. 1–6

  12. Yixiao Z, Yihai H, Zhaoxiang C, Xiao XH, Zheng H (2018) Big Operational data oriented health diagnosis based on weibull proportional hazards model for multi-state manufacturing system, Prognostics and System Health Management Conference (PHM-Chongqing), 2018, Chongqing, China, https://doi.org/10.1109/PHM-Chongqing.2018.00082

  13. Archana PKM, Prateek T (2016) The best clustering algorithms in data mining, International Conference on Communication and Signal Processing (ICCSP), pp. 2042–2046

  14. Semeh SB, Sami N (2016) Pattern recognition approach in multidimensional databases: application to the global terrorism database. Int J Adv Comput Sci Appl (IJACSA) 7:8

    Google Scholar 

  15. Niccolo G (2017) Genetic algorithms for small enterprises default prediction: empirical evidence from italy, nature-inspired computing: concepts, methodologies, tools, and applications, pp. 571–608

  16. Yakhchali SH, Ghodsypour SH (2008) A hybrid genetic algorithms for computing the float of an activity in networks with imprecise durations. Proc IEEE Int Conf Fuzzy Syst, pp. 1789–1794

  17. Bajrami X, Murturi I (2018) An efficient approach to monitoring environmental conditions using a wireless sensor network and NodeMCU. e & i Elektro technik und Informations technik 135(3):294–301

  18. Sathishkumar M, Rajini S (2015) Smart surveillance system using PIR sensor network and GSM. Int J Adv Res Comput Eng Technol (IJARCET) 4:1

    Google Scholar 

  19. Bruno L, Pascoal Joao F (2018) Towards real-time patient prioritization in hospital emergency services. IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom),, Ostrava, Czech Republic, pp. 1–4

  20. Suryanarayanan S, Manmadhan S, Rakesh N (2017) Design and development of real time patient monitoring system with GSM technology. J Cases Inform Technol 19(4):22–36

    Article  Google Scholar 

  21. Antonio L, Gaetano V, Mimma N, Claudio G, Enzo SP (2015) Complexity index from a personalized wearable monitoring system for assessing remission in mental health. IEEE J Biomedical Health Inf 19(1):132–139

    Article  Google Scholar 

  22. Elefelious BG, Scott D, McCrickard (2015) Comparing literature claims and user claims for mobile user interface design: A case study considering m-health application, International Conference on Collaboration Technologies and Systems (CTS), Atlanta, USA, pp. 418–425

  23. Robben S, Englebienne G, Krose B (2017) Delta features from ambient sensor data are good predictors of change in functional health. IEEE J Biomedical Health Inf 21(4):986–993

    Article  Google Scholar 

  24. Onuma M (2015) Using word-cooccurrence to determine health problems from health-care documents, 12th International Joint Conference on Computer Science and Software Engineering (JCSSE), Songkhla, Thailand, pp. 78–81

  25. Rok Young C, Phillip PH (2014) Exploration, exploitation, and growth through new product development: the moderating effects of firm age and environmental adversity, IEEE Transactions on Engineering Management, vol. 61, issue 3, 2014, pp. 428–437

  26. Yang J, Wang J (2017) Tag clustering algorithm LMMSK: improved K-means algorithm based on latent semantic analysis. J Syst Eng Electron 28(2):374–384

    Article  Google Scholar 

  27. Noureddine B (2016) How Good is the Euclidean Distance Metric for the Clustering Problem, 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). Kumamoto, Japan, pp 312–315

  28. Semeh SB, Sami N (2017) A computational cost-effective clustering algorithm in multidimensional space using the manhattan metric: application to the global terrorism database. Int J Comput Syst Eng 11:6

    Google Scholar 

  29. Anwiti J, Anand R, Rupali B (2012) Design, Analysis and implementation of modified k-mean algorithm for large data-set to increase scalability and efficiency, Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, India, pp. 627–631

  30. De M, Kundu A, De Sarkar NR (2019) Simulation on real time monitoring for user healthcare information. Deep learning techniques for biomedical and health informatics. Elsevier, Amsterdam

    Google Scholar 

  31. He C, Xing J, Li J, Yang Q, Wang R, Zhang X (2015) A new optimal sensor placement strategy based on modified modal assurance criterion and improved adaptive genetic algorithm for structural health monitoring. Math Prbl Eng 2015:1–10

    Google Scholar 

  32. Yi TH, Li HN, Gu M (2011) Optimal sensor placement for health monitoring of high-rise structure based on genetic algorithm. Math Prbl Eng 2011:1–12. https://doi.org/10.1155/2011/395101

    Article  Google Scholar 

  33. Brenda Jerop DR, Segera D (2021) An efficient PCA-GA-HKSVM-based disease diagnostic assistant. BioMed Res Int. https://doi.org/10.1155/2021/4784057

    Article  Google Scholar 

Download references

Acknowledgements

The research work is funded by Computer Innovative Research Society, West Bengal, India. Award number is “2021/CIRS/R&D/1001-01-14/HOTDPHCMGA”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anirban Kundu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

De, M., Kundu, A. A hybrid optimization for threat detection in personal health crisis management using genetic algorithm. Int. j. inf. tecnol. 14, 2603–2618 (2022). https://doi.org/10.1007/s41870-022-00927-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-00927-8

Keywords

Navigation