{"id":"https://openalex.org/W4285813950","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825083","title":"Federated Quality Profiling: A quality evaluation of patient monitoring at the Edge","display_name":"Federated Quality Profiling: A quality evaluation of patient monitoring at the Edge","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813950","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825083"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9825083","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825083","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082296670","display_name":"Alramzana Nujum Navaz","orcid":"https://orcid.org/0000-0003-2787-523X"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Alramzana Nujum Navaz","raw_affiliation_strings":["College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University,Department of Information Systems and Security","Department of Information Systems and Security, College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University"],"raw_orcid":"https://orcid.org/0000-0003-2787-523X","affiliations":[{"raw_affiliation_string":"College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University,Department of Information Systems and Security","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Information Systems and Security, College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022074764","display_name":"Mohamed Adel Serhani","orcid":"https://orcid.org/0000-0001-7001-3710"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohamed Adel Serhani","raw_affiliation_strings":["College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University,Department of Information Systems and Security","Department of Information Systems and Security, College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University"],"raw_orcid":"https://orcid.org/0000-0001-7001-3710","affiliations":[{"raw_affiliation_string":"College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University,Department of Information Systems and Security","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Information Systems and Security, College of Information Technology United Arab Emirates University Al Ain United Arab Emirates University","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013508860","display_name":"Hadeel T. El Kassabi","orcid":"https://orcid.org/0000-0002-7992-5748"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hadeel T. El Kassabi","raw_affiliation_strings":["Gina Cody School of Engineering and Computer Science Concordia University,Department of Computer Science and Software Engineering,Montreal,Canada","Department of Computer Science and Software Engineering, Gina Cody School of Engineering and Computer Science Concordia University, Montreal, Canada"],"raw_orcid":"https://orcid.org/0000-0002-7992-5748","affiliations":[{"raw_affiliation_string":"Gina Cody School of Engineering and Computer Science Concordia University,Department of Computer Science and Software Engineering,Montreal,Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Gina Cody School of Engineering and Computer Science Concordia University, Montreal, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082296670"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.1043,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.26974033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1015","last_page":"1021"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.940500020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.8456201553344727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.796281635761261},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5931990146636963},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.5556883811950684},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5393718481063843},{"id":"https://openalex.org/keywords/data-quality","display_name":"Data quality","score":0.5364307761192322},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5302906632423401},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.49337854981422424},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.41310855746269226},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38277122378349304},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.305922269821167},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1246039867401123}],"concepts":[{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.8456201553344727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.796281635761261},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5931990146636963},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.5556883811950684},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5393718481063843},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.5364307761192322},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5302906632423401},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.49337854981422424},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.41310855746269226},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38277122378349304},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.305922269821167},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1246039867401123},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9825083","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825083","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2499612753","https://openalex.org/W3111802945","https://openalex.org/W2946096271","https://openalex.org/W2295423552","https://openalex.org/W1598471830","https://openalex.org/W3107369729","https://openalex.org/W1596854558","https://openalex.org/W2902823524","https://openalex.org/W4245815800","https://openalex.org/W2499364091"],"abstract_inverted_index":{"Continuous":[0],"monitoring":[1],"of":[2,13,55,124,133,153],"patients":[3],"involves":[4],"collecting":[5],"and":[6,22,27,34,74,136],"analyzing":[7],"sensory":[8],"data":[9,20,25,42],"from":[10],"a":[11,92,108,147],"multitude":[12],"sources.":[14],"To":[15],"overcome":[16],"communication":[17],"overhead,":[18],"ensure":[19],"privacy":[21],"security,":[23],"reduce":[24],"loss,":[26],"maintain":[28],"efficient":[29],"resource":[30],"usage":[31],"the":[32,41,46,63,105,122,131,143,151],"processing":[33],"analytics":[35],"are":[36],"moved":[37],"close":[38],"to":[39,101,120],"where":[40],"is":[43],"located":[44],"(e.g.,":[45],"Edge).":[47],"Data":[48,97],"quality":[49,110],"(DQ)":[50],"can":[51,70],"be":[52],"degraded":[53],"because":[54],"imprecise":[56],"or":[57,67],"malfunctioning":[58],"sensors,":[59],"dynamic":[60],"changes":[61],"in":[62],"environment,":[64],"transmission":[65],"failures,":[66],"delays.":[68],"Therefore,":[69],"mislead":[71],"clinical":[72],"judgments":[73],"cause":[75],"incorrect":[76],"actions,":[77],"if":[78],"not":[79],"managed":[80],"properly.":[81],"In":[82],"this":[83],"paper,":[84],"inspired":[85],"by":[86],"Federated":[87,96],"Learning":[88],"(FL),":[89],"we":[90],"propose":[91],"novel":[93],"approach":[94],"using":[95],"Quality":[98],"(FDQ)":[99],"Profiling":[100],"assess":[102],"DQ":[103,128,145],"at":[104],"edge":[106],"considering":[107,130],"global":[109],"profile":[111],"aggregated":[112],"based":[113],"on":[114,127,150],"local":[115],"profiles.":[116],"We":[117],"conducted":[118],"experiments":[119],"evaluate":[121],"effect":[123],"FDQ":[125],"profiling":[126],"improvement":[129],"assessment":[132],"outlier":[134],"detection":[135],"unbalanced":[137],"data.":[138],"The":[139],"results":[140],"demonstrated":[141],"that":[142],"improved":[144],"has":[146],"positive":[148],"impact":[149],"accuracy":[152],"four":[154],"conventional":[155],"machine":[156],"learning":[157],"models.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
