Skip to main content

Showing 1–3 of 3 results for author: Kang, J J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2206.04240  [pdf

    cs.LG eess.SP

    Enhancement of Healthcare Data Transmission using the Levenberg-Marquardt Algorithm

    Authors: Angela An, James ** Kang

    Abstract: In the healthcare system, patients are required to use wearable devices for the remote data collection and real-time monitoring of health data and the status of health conditions. This adoption of wearables results in a significant increase in the volume of data that is collected and transmitted. As the devices are run by small battery power, they can be quickly diminished due to the high processi… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:2201.05962

    ACM Class: J.3

  2. Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms

    Authors: Qi An, Patryk Szewczyk, Michael N Johnstone, James ** Kang

    Abstract: Patients are often encouraged to make use of wearable devices for remote collection and monitoring of health data. This adoption of wearables results in a significant increase in the volume of data collected and transmitted. The battery life of the devices is then quickly diminished due to the high processing requirements of the devices. Given the importance attached to medical data, it is imperat… ▽ More

    Submitted 15 January, 2022; originally announced January 2022.

    Comments: 8 pages, 18 fingures

  3. arXiv:2010.09427  [pdf

    cs.CR

    A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks

    Authors: James ** Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Xi Zheng

    Abstract: Privacy protection in electronic healthcare applications is an important consideration due to the sensitive nature of personal health data. Internet of Health Things (IoHT) networks have privacy requirements within a healthcare setting. However, these networks have unique challenges and security requirements (integrity, authentication, privacy and availability) must also be balanced with the need… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.