12

Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI
Page 2: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

Proceedings

2014 International Conference on

Identification, Information and Knowledge

in the Internet of Things

IIKI 2014

17-18 October 2014

Beijing, China

Other Sponsors Beijing Normal University

National Natural Science Foundation of China IEEE Communications Society Emerging Technical Committee in Internet of Things

College of Information Science and Technology, Beijing Normal University Research Group on the Internet of Things, Beijing Normal University

Chinese Institute of Electronics Manifesto Group Brunel University

Los Alamitos, California

Washington • Tokyo

Page 3: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

Copyright © 2014 by The Institute of Electrical and Electronics Engineers, Inc.

All rights reserved.

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy

beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at

the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright

Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service

Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ 08855-1331.

The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They

reflect the authors’ opinions and, in the interests of timely dissemination, are published as presented and without

change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE

Computer Society, or the Institute of Electrical and Electronics Engineers, Inc.

IEEE Computer Society Order Number E5402

BMS Part Number CFP14B18-ART

ISBN-13: 978-1-4799-8003-1

Additional copies may be ordered from:

IEEE Computer Society IEEE Service Center IEEE Computer Society

Customer Service Center 445 Hoes Lane Asia/Pacific Office

10662 Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., 1-4-2

P.O. Box 3014 Piscataway, NJ 08855-1331 Minami-Aoyama

Los Alamitos, CA 90720-1314 Tel: + 1 732 981 0060 Minato-ku, Tokyo 107-0062

Tel: + 1 800 272 6657 Fax: + 1 732 981 9667 JAPAN

Fax: + 1 714 821 4641 http://shop.ieee.org/store/ Tel: + 81 3 3408 3118

http://computer.org/cspress

[email protected]

[email protected] Fax: + 81 3 3408 3553

[email protected]

Individual paper REPRINTS may be ordered at: <[email protected]>

Editorial production by Randall Bilof

Art production by Mark J. Bartosik

IEEE Computer Society

Conference Publishing Services (CPS) http://www.computer.org/cps

Page 4: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

2014 International Conferenceon Identification, Informationand Knowledge in the Internet

of Things

IIKI 2014Table of Contents

Message from the Conference Chairs.......................................................................................................xi

Organizing and Program Committees......................................................................................................xii

Reviewers...................................................................................................................................................xiv

KeynotesIoT and the Need for High Performance Computing ....................................................................................1

Didier El Baz

Wearable Internet: Powering Personal Devices with the Internet of ThingsCapabilities ...................................................................................................................................................7

Antonio J. Jara

Distortion-driven Turbulence Image Blur Effect Removal using VariationalModel and Kernel Regression ......................................................................................................................8

Wensheng Zhang

Session 1: Knowledge Engineering, Big Data, and CloudComputingAn Anti-theft Electric Bicycle Tracking System Supporting Large-Scale Users ............................................9

Jun Zeng, Minbo Li, and Jia Liang

Chinese Social Media Analysis for Disease Surveillance ...........................................................................17Nanhai Yang, Xiaohui Cui, Cheng Hu, Weiping Zhu, and Chengrui Yang

A Novel Dynamic Weight Neural Network Ensemble Model ......................................................................22Kewen Li, Wenying Liu, Kang Zhao, Weishan Zhang, and Lu Liu

Towards a High Speed Video Cloud Based on Batch Processing Integratedwith Fast Processing ...................................................................................................................................28

Weishan Zhang, Liang Xu, Pengcheng Duan, Wenjuan Gong, Xin Liu,and Qinghua Lu

vv

Page 5: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

An Improved SMOTE Imbalanced Data Classification Method Basedon Support Degree .....................................................................................................................................34

Kewen Li, Wenrong Zhang, Qinghua Lu, and Xianghua Fang

Simulation and Evaluation of Decentralized SPARQL Query Processing ..................................................39Jing Zhou, Qi Huang, and Wei Yan

Chinese Temporal Relation Resolution Based on Chinese-English ParallelCorpus ........................................................................................................................................................45

Lubiao Li, Junsheng Zhang, Yanqing He, Yinsheng Zhang, and Huilin Wang

Linear Programming v-Nonparallel Support Vector Machine .....................................................................51Guangyu Zhu and Peng Zhang

Big Data Processing: Data Flow vs Control Flow (New BenchmarkingMethodology) ..............................................................................................................................................56

Anton Kos, Sašo Tomažc; Jakob Salom, Nemanja Trifunovic, Mateo Valero,and Veljko Milutinovic

Term Extraction Using Co-occurrence in Abstract and First Claim for PatentAnalysis .......................................................................................................................................................60

Peng Qu, Junsheng Zhang, Yanqing He, Wen Zeng, and Hongjiao Xu

A Short Survey on Decision Making for Task Migrations in Mobile CloudEnvironments ..............................................................................................................................................64

Weishan Zhang, Shouchao Tan, and Klaus Marius Hansen

A Cloud Based Object Recognition Platform for IOS ..................................................................................68Lianzhang Zhu, Xuexing Zheng, Pengfei Li, and Yong Wang

Online Multiperson Tracking and Counting with Cloud Computing ............................................................72Weishan Zhang, Wenshan Wang, Pengcheng Duan, Xin Liu, and Qinghua Lu

Enhancing Context-Aware Recommendation via a Unified Graph Model ..................................................76Hao Wu, Xiaoxin Liu, Yijian Pei, and Bo Li

Online Optimization of Collaborative Web Service QoS Prediction Basedon Approximate Dynamic Programming .....................................................................................................80

Xiong Luo, Hao Luo, and Xiaohui Chang

A Node Localization Approach Using Particle Swarm Optimization in WirelessSensor Networks ........................................................................................................................................84

Xihai Zhang, Tianjian Wang, and Junlong Fang

Enhanced Web Warehouse Model: A Secure Approach ............................................................................88Rashid Mehmood, Maqbool Uddin Shaikh, Liran Ma, and Rongfang Bie

Internet of Things Services for Small Towns ..............................................................................................92Yunchuan Sun, Ye Xia, Houbing Song, and Rongfang Bie

Analysis of Erdös Collaboration Graph and the Paper Citation Network ....................................................96Chengrui Yang, Xiaohui Cui, Xiaoyong Sun, Yuanda Diao, Shuai Wang,and Cheng Hu

vivi

Page 6: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

A Relational Model Based Semantic Network Knowledge RepresentationTechnology and Its Application .................................................................................................................100

Yuexin Li and Rong Xiao

Research on Database Massive Data Processing and Mining Methodbased on Hadoop Cloud Platform .............................................................................................................107

Dan Wu, Zhuorong LI, Rongfang Bie, and Mingquan Zhou

Session 2: Pervasive Service Systems and WearableComputingApplication of Inertial Navigation System in Portable Human Body Joint PowerTest System ..............................................................................................................................................111

Lin Li, Zhongqiu Ji, Ye Xia, and Rui Gong

Sensors Classification for Stress Analysis: Toward Automatic StressRecognition ...............................................................................................................................................117

Mikhail Sysoev, Andrej Kos, Urban Sedlar, and Matevž Pogacnik

Autonomous Wearable Personal Training System with Real-Time Biofeedbackand Gesture User Interface ......................................................................................................................122

Anton Umek, Sašo Tomažic, and Anton Kos

Robustness of Input Features from Noisy Silhouettes in Human PoseEstimation .................................................................................................................................................126

Wenjuan Gong, Preben Fihl, Jordi Gonzalez, Thomas B. Moueslund,Weishan Zhang, Zhen Li, and Yan Ren

The Research on Sports Events Organization and Management InformationSystem Based on Process Aware ............................................................................................................132

Yunchao Ma and Zhongqiu Ji

Session 3: Wireless and Mobile SecurityAn Encryption Depth Optimization Scheme for Fully Homomorphic Encryption ......................................137

Liquan Chen, Hongmei Ben, and Jie Huang

Mining Call Spammers from Logs .............................................................................................................142Zhipeng Liu and Weihua Duan

An Improved Multi-sensor Image Fusion Algorithm ..................................................................................146Zhuozheng Wang and John R. Deller

An Online Anomaly Learning and Forecasting Model for Large-Scale Serviceof Internet of Things ..................................................................................................................................152

Junping Wang and Shihui Duan

A Fast AES Encryption Method Based on Single LUT for Industrial WirelessNetwork .....................................................................................................................................................158

Xinqiang Luo, Yue Qi, Yadong Wan, Qin Wang, and Hong Zhang

viivii

Page 7: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

Privacy Information Security Classification Study in Internet of Things ....................................................162Xiaofeng Lu, Qi Li, Zhaowei Qu, and Pan Hui

Time Synchronization Attacks in IEEE802.15.4e Networks .....................................................................166Wei Yang, Qin Wang, Yue Qi, and Shaobo Sun

A Fuzzy Operator-Attribute-Based Signcryption Scheme on Vehicular Clouds .......................................170Zhang Wenbo, Yang Pengfei, Bao Zhenshan, Duan Lijuan, and Li Jian

Joint Social and Physical Clustering Scheme for Device-to-DeviceCommunications .......................................................................................................................................175

Chunyan Cao, Li Wang, and Mei Song

Session 4: Frontiers in Cyber-Physical SystemsA Fuzzy Filter for Color Images Corrupted by Mixed Noise ......................................................................177

Xuan Guo and Baoping Guo

Towards a Genetic Algorithm Based Approach for Task Migrations ........................................................182Weishan Zhang, Shouchao Tan, Qinghua Lu, and Xin Liu

Virtual Power Meter Supported Power Consumption Prediction of WebServices ....................................................................................................................................................188

Jiaming Jiang, Jinyang Liu, Lingfeng Wei, Lei Lei, Jing Du, and Jin Liu

The Study of MAC Protocol for Industrial Wireless Sensor Network Basedon Ultra-wide Band ...................................................................................................................................194

Wen Zeng, Junsheng Zhang, and Peng Qu

Diffusion Dynamics in Structured Online Social Networks with Push-BasedForwarding Mechanism ............................................................................................................................198

Pei Li, Fengcai Qiao, Yini Zhang, and Hui Wang

Impact of Structure Balance on Opinion Spreading in Signed Social Networks .......................................202Pei Li, Su He, Yini Zhang, and Hui Wang

Planar Waypoint Generation and Path Finding in Dynamic Environment ................................................206Daoyuan Jia, Cheng Hu, Kechen Qin, and Xiaohui Cui

A Computational Simulation Model for Understanding the Correlationof Climate Change and Population Migration ...........................................................................................212

Cheng Hu, Liang Zhou, Xiaohui Cui, and Yang Zhang

Cache-Based Periodic Query Optimization for Wireless Sensor Networks ..............................................216Deng Zhao, Zhangbing Zhou, Ke Ning, and Xiaolei Wang

An Orthogonal Cartesian Genetic Programming Algorithm for EvolvableHardware ..................................................................................................................................................220

Fuchuan Ni, Yuanxiang Li, Xiaoyan Yang, Fuchuan Ni, and Jinhai Xiang

Detection of Acute Hypotensive Episodes via Empirical Mode Decompositionand Genetic Programming ........................................................................................................................225

Dazhi Jiang, Liyu Li, Zhun Fan, and Jin Liu

viiiviii

Page 8: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

A Random Factor Extension on the PSO Algorithm .................................................................................229Huibin Zhang, Jie Lin, Yungang Wei, Lanjun Duan, and Xiaoming Zhu

Subway Fire Evacuation Simulation Model ..............................................................................................233Kechen Qin, Cheng Hu, Daoyuan Jia, Xiaohui Cui, and Yang Zhang

Session 5: Regulations, Standards, User Experience,and Industries in the Internet of ThingsEnterprise-Oriented IoT Name Service for Agriculture Product Supply ChainManagement .............................................................................................................................................237

Yi Liu, He Wang, Junyu Wang, Kan Qian, Ning Kong, Kaijiang Wang, Yiwei Shi,and Lirong Zheng

Multiplex TDMA Link Assignment with Varying Number of Sensors in IndustrialWireless Sensor Networks ........................................................................................................................242

Yanhong Yang and Shaozhong Cao

Patented Network Analysis on Cloud Computing Technology in Internetof Things ...................................................................................................................................................248

Yu Yuan, Li Ma, and Junsheng Zhang

A MapReduce Enabled Simulated Annealing Genetic Algorithm .............................................................252Luokai Hu, Jin Liu, Chao Liang, and Fuchuan Ni

Study of Intelligent Instrument Data Acquisition and Transmission on WirelessNetwork .....................................................................................................................................................256

Huating Fu and Guofeng Qin

Big and Small Data: The Fog ....................................................................................................................260Olga Ferrer-Roca, Ruben Tous, and Rodolfo Milito

Ladle Monitor System Based on Vehicle Distance Measurement and AuxiliaryJudgment Rules ........................................................................................................................................262

Cai Jun and Wang Hong-Bing

Session 6: Mobile Opportunistic NetworksImplementing PMIPv6 Protocol Based on Extended Service Set for IEEE802.11 Infrastructure WLAN .....................................................................................................................266

Deqing Zhu, Lin Zu, Yi-Hua Zhu, and Xianzhong Tian

Spacial Mobility Prediction Based Routing Schemein Delay/Disruption-Tolerant Networks .....................................................................................................274

Lichen Zhang, Zhipeng Cai, Junling Lu, and Xiaoming Wang

Secure Friend Discovery Based on Encounter History in Mobile SocialNetworks ...................................................................................................................................................280

Hongjuan Li, Yingwen Chen, Xiuzhen Cheng, Keqiu Li, and Dechang Chen

ixix

Page 9: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

The Dissemination Distance of Mobile Opportunistic Networks ...............................................................286Xia Wang, Shengling Wang, Wenshuang Liang, Rongfang Bie, and Feng Zhao

S-Disjunct Code Based MAC Protocol for Reliable Broadcast in Vehicular AdHoc Networks ...........................................................................................................................................291

Chao Wang, Xiumei Fan, Jiguo Yu, Kai Xing, Yingwen Chen, and Jiawei Liang

Nodes Density Adaptive Opportunistic Forwarding Protocol for IntermittentlyConnected Networks ................................................................................................................................297

Xiaofeng Lu, Pietro Lio, Pan Hui, and Zhaowei Qu

Reliability Evaluation of Coal Mine Internet of Things ..............................................................................301Pan Kunkun and Li Xiangong

Author Index ............................................................................................................................................303

xx

Page 10: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

IEEE Computer Society Technical & Conference

Activities Board

T&C Board Vice President

Cecilia Metra Università di Bologna, Italy

IEEE Computer Society Staff

Evan Butterfield, Director of Products and Services Lynne Harris, CMP, Senior Manager, Conference Support Services Patrick Kellenberger, Supervisor, Conference Publishing Services

IEEE Computer Society Publications

The world-renowned IEEE Computer Society publishes, promotes, and distributes a wide variety of authoritative computer science and engineering texts. These books are available from most retail outlets. Visit the CS Store at http://www.computer.org/portal/site/store/index.jsp for a list of products.

IEEE Computer Society Conference Publishing Services (CPS) The IEEE Computer Society produces conference publications for more than 300 acclaimed international conferences each year in a variety of formats, including books, CD-ROMs, USB Drives, and on-line publications. For information about the IEEE Computer Society’s Conference Publishing Services (CPS), please e-mail: [email protected] or telephone +1-714-821-8380. Fax +1-714-761-1784. Additional information about Conference Publishing Services (CPS) can be accessed from our web site at: http://www.computer.org/cps

Revised: 18 January 2012

CPS Online is our innovative online collaborative conference publishing system designed to speed the delivery of price quotations and provide conferences with real-time access to all of a project's publication materials during production, including the final papers. The CPS Online workspace gives a conference the opportunity to upload files through any Web browser, check status and scheduling on their project, make changes to the Table of Contents and Front Matter, approve editorial changes and proofs, and communicate with their CPS editor through discussion forums, chat tools, commenting tools and e-mail.

The following is the URL link to the CPS Online Publishing Inquiry Form: http://www.computer.org/portal/web/cscps/quote

306

Page 11: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

Big and Small data The FOG.

Olga Ferrer-RocaUnesco Chair of Telemedicine. Faculty of Medicine.

University of La Laguna. Tenerife. [email protected]

Ruben Tous

Barcelona Supercomputing Center (BSC) and the Universitat Politècnica de Catalunya(UPC) - BarcelonaTech

Barcelona, Spain. [email protected]

Rodolfo Milito Senior Technical Leader CTAO. Fog computing platform.

Cisco Systems. ConSentry networks. [email protected]

Abstract— Health 4.0 applications in the IoE (Internet of Everything)

framework generate and use both “Small Data”, and “Big Data”. While “Big Data” is processed in the Cloud, we advocate for “Small Data” to be processed in the Fog, which is an extension of the Cloud to the edge of the network (close to the IoT devices that stream private health-related information). Processing and storing Small Data close to the sources has enables tighter control of the data ownership, response time, and semi-autonomy require by critical applications.

Keywords—Small data; Health 4.0; mHealth; The Fog; The Cloud.

I. INTRODUCTION

The Global Health 2035 vision calls for Digital and Ubiquitous Health, and Equitable access. Realization of the vision requires the incorporation of advanced Big Data and Analytics techniques, including Data Mining and Machine Learning, making information the center piece of the advances. Natural questions emerge regarding the preservation of privacy, and keeping the control of the information in the hands of the patient. Towards these goals this paper proposes that the data generated by wearables and personal devices be processed and stored in the Fog.

II. CONCEPTS

A. Small dataSmall Data refers to patient data. The patient, who is the

owner of his/her data, must be in control of what is shared,with whom, for what purpose, and during which period. In general this data come from devices (medical or not) connected to Internet as part of the IoT (Internet of the Things) providing information that supports data of interest conducive to a healthy life.

B. Health 4.0As defined in 2012 [1] Health 4.0 is the integrated health

framework that incorporates four main innovations:1º.- Applications that meet three availability criteria: a) Anytime connections: On the move, indoors and outdoors,

day-&-night. b)Anyplace connection: On the move, outdoors, indoors, at any PC. c) Anything connection: At any PC, H2H (human to human), H2T (human to thing), T2T (thing to thing). 2º.- Applications that include image enhancement & RFID readings to be use for: a) People byfaces recognition and access to relevant information (home,work, medical, HER, PHR, medical schedule…). b) Objectby use and by owner recognition. c) Food by principle content & by diet requirements. d) Medication by principle & by indication-contraindication. 3º.-Application that includes quality controlled Web 3.0 items such as: a) HCQ Health Care Quality: ISO 13485-ISO 2700 or security. b) 3S: Social-Semantic-Services. c) Cloud accessing (SAAS, pCloud or personal Cloud were the iPhone can be included).4º.-Applications taking Web 4.0 items such as: a) KBL o Knowledge base learning, including literature base learning (LBL), Evidence Based learning (EBL), trial base learning (TBL), Image based learning (IBL) etc…b) QBE o Query by example, including query by image (QBI) etc…c) CoLD or Cloud of link data with Artificial intelligence.”

C. The FogFog [3] extends Cloud resources (processing, compute,

and networking) to the edge of the network. Through virtualization, the Fog enables the user to control his/her own data. The user determines the engagement policies of his/her PHA (personal health assistant), including what and with whom to share data, whom to associate (possibly including electric PHAs, e-PHAs) with the purpose tomaintain a healthy life.

D. PHAsThe living Personal Health Assistants are highly trained

nurses (e.g. midwives) capable to be informed and empathic, advice for every-day life, and to act as a coach. Their role goes well beyond the standard tasks of prescribing medicines and issuing orders. Nurses that handle the administrative complexity of healthcare delivery can also advise users on the use public and private care, on how to prevent complications, choose the best hospital, call an ambulance and prepare the entrance in emergency rooms, etc. PHAs follow well-designed protocols based on decision trees (“given this and that, take this course”). The protocols are based on Bayesian inference or Markovian models.

2014 International Conference on Identification, Information and Knowledge in the Internet of Things

978-1-4799-8003-1/14 $31.00 © 2014 IEEE

DOI 10.1109/IIKI.2014.60

260

Page 12: Proceedingscatai.net/blog/wp-content/uploads/2008/12/Libro... · Proceedings 2014 International Conference on Identification, Information and Knowledge in the Internet of Things IIKI

E. Intelli-agents and e-PHAsIntelligent agents, judiciously trained on the patient

Small Data, and rigorously tested and validated on the available Big Data, could eventually graduate to e-PHAs able to give recommendations in specific individual situations. The criterion for graduation should be to meet or exceed the performance of the live PHAs following the existing protocols. Rather than e-PHAs issuing rote recommendations we envision them delivering Knowledge on Demand (KoD) [6], based on the data stored in the Fog, and in respond to the stimuli of the diverse sensors that measure the individual and the environment.

III. SAHA (SMART AGENTS HEALTH ARENA) The components of the system include avatars as

embodiment of people, the Smart Agents Health Arena (SAHA) [4] as the environment in which the avatars and intelligent agents interact with the traditional professionals, medical devices and IoT in general in the health arena,including the Fog [7].

Some of this exists today although in a very primitive Health 2.0 or even analog form (see Fig 1)

Fig. 1. Existing avatars-http://sense.ly/ in http://sco.lt/4pv0KH.

A. Digital HealthDigital data is essential in Digital Health, this is the

reason why we have to define also the type of data, for what is taken and to whom it belongs. See table I [8].

TABLE I. THE FOG AND THE SMALL DATA

BIG DATA SMALL DATABelongs to Government/State Individuals/Patient

Anonymized YES NOEncrypted NO YES

Processed in The Cloud The FogResponse Months / Years Minutes / On time

Obtained from Institutions/EHRs Sensors / At home / PHRa

Processed by DB tools-DBaaS Parallel C/e-AgentsStored By Govern/Distributed By Individuals/ PHAsUseful for Decision makers for Individuals

a. Personal Health Record

B. Global HealthFollowing the Lancet Global Health 2035 [1], our next

generation will require not only to study but also to implement a secure digital health environment and a new way to provide medicine.

This include the possibility of de-localized treatment and follow up by Centers of Excellence spread all over the world, possibility that should be assume not only by private insurance but also by public health.

IV. CONCLUSIONSIn this new Healthcare delivery context empower

citizens in their own health control and delivery in several front-ends: 1) Disease and complications prevention. 2) Healthy and happiest life. 3) Humanize health [10] providing PHAs. 4) Integrate primary and secondary care. 5) Improve healthcare resources. 6) Lower health cost and health demands from tertiary care. 7) Know the center of excellence for specific diseases.

Acknowledgment We want to give a warm acknowledgment to all partner

of the H2O project (Humanization of Healthcare) [10] that working together will be able to bring into the reality Global Health in a more humanitarian model.

References

[1] Global health 2035: a world converging within a generation. The Lancet, Volume 382, Issue 9908, Pages 1898 - 1955, 7 December 2013

[2] O.Ferrer-Roca. "Health 4.0 in the i2i era" Intern J Reliable and Quality E-Healthcare, 1(1), 43-57, January-March 2012; http://www.teide.net/catai/Health%204.0%20HD.pdf .

[3] F.Bonomi, R. Milito, J.Xhu, S.Addepalli, “Fog Computing and its Role in the Internet of Things,”, SIGCOMM 2012, http://conferences.sigcomm.org/sigcomm/2012/paper/mcc/p13.pdf

[4] R. Milito. F. Bonomi and P. Monclus. Architecture for Intelligent agents/avatars in Healthcare. CTECH Forum 2010. (not published)

[5] D. Lake, Milito R., Morrow M. and Vangheese R: Internet of Things: Architectural framework for eHealth security. Journal of ICT, vol.3&4,pp: 301-330, 2014, doi: 10.13052/jicts2245-800X.133

[6] O.Ferrer-Roca, A.Figueredo, K.Franco, A.Cardenas. Telemedicine intelligent Learning. Ontology for agent technology. Trans. on Adv. Res. Jul 2005, Vol 1, N. 2, 46-54

[7] O.Ferrer-Roca. (2014) Fog computing in Health 4.0. http://catai.net/blog/2014/05/fog-computing-in-health-4-0/

[8] O. Ferrer-Roca. (2014) Big Data versus Small Data. http://catai.net/blog/2014/06/big-data-versus-small-data/

[9] O. Ferrer-Roca. (2014) Artificial Intelligence in Health 4.0 http://sco.lt/6ntTyz

[10] O. Ferrer-Roca (2014) Humanization of the Healthcare. Moving into the right direction. http://sco.lt/5BfRdh

[11] R. Tous, J. Delgado, T. Zinkl, P. Toran, G. Alcalde, M. Goetz and O. Ferrer-Roca. The Anatomy of an Optical Biopsy Semantic Retrieval System. IEEE Multimedia. April-June 2012 (vol. 19 no. 2). pp. 16-27.

261