{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:27:24Z","timestamp":1766050044558,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T00:00:00Z","timestamp":1656115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T00:00:00Z","timestamp":1656115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10844-022-00721-9","type":"journal-article","created":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T05:07:54Z","timestamp":1656133674000},"page":"679-704","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A data-driven situation-aware framework for predictive analysis in smart environments"],"prefix":"10.1007","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2727-9286","authenticated-orcid":false,"given":"Hoda","family":"Gholami","sequence":"first","affiliation":[]},{"given":"Carl K.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Pavan","family":"Aduri","sequence":"additional","affiliation":[]},{"given":"Anxiang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Banafsheh","family":"Rekabdar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,25]]},"reference":[{"key":"721_CR1","unstructured":"Ad\u00e1mek, J., Herrlich, H., & Strecker, G.E. (2004). Abstract and concrete categories the joy of cats."},{"key":"721_CR2","unstructured":"Aktas, M.S, Nacar, M.A, & Menczer, F. (2004). Personalizing pagerank based on domain profiles. In Proc. of webKDD (pp. 22\u201325). Citeseer."},{"key":"721_CR3","doi-asserted-by":"crossref","unstructured":"Alshammari, N., Alshammari, T., Sedky, M., Champion, J., & Bauer, C. (2017). Openshs: Open smart home simulator. Sensors, pp. 1003\u20131007.","DOI":"10.3390\/s17051003"},{"key":"721_CR4","unstructured":"Andrei, Z. (1997). Broder. on the resemblance and containment of documents. In Proceedings. Compression and complexity of sequences 1997 (cat. no. 97TB100171) (pp. 21\u201329). IEEE."},{"key":"721_CR5","unstructured":"Ashton, K., et al. (2009). That \u2018internet of things\u2019 thing. RFID journal, pp. 97\u2013114."},{"key":"721_CR6","doi-asserted-by":"crossref","unstructured":"Bao, L., & Intille, S.S (2004). Activity recognition from user-annotated acceleration data. In International conference on pervasive computing (pp. 1\u201317). Springer.","DOI":"10.1007\/978-3-540-24646-6_1"},{"key":"721_CR7","doi-asserted-by":"crossref","unstructured":"Bibri, S.E. (2018). The iot for smart sustainable cities of the future: an analytical framework for sensor-based big data applications for environmental sustainability. Sustainable cities and society, pp. 230\u2013253.","DOI":"10.1016\/j.scs.2017.12.034"},{"key":"721_CR8","doi-asserted-by":"crossref","unstructured":"Boissy, P., Choquette, S., Hamel, M., & Noury, N. (2007). User-based motion sensing and fuzzy logic for automated fall detection in older adults. Telemedicine and e-Health, pp. 683\u2013694.","DOI":"10.1089\/tmj.2007.0007"},{"key":"721_CR9","doi-asserted-by":"crossref","unstructured":"Bouchard, K., Gaboury, S., Bouchard, B., Bouzouane, A., & Giroux, S. (2016). Smart homes in the era of big data. Trends in Ambient Intelligent Systems. pp. 117\u2013137.","DOI":"10.1007\/978-3-319-30184-6_5"},{"key":"721_CR10","doi-asserted-by":"crossref","unstructured":"Brdiczka, O., & Crowley, J.L. (2008). Patrick Reignier. Learning situation models in a smart home. IEEE Transactions on Systems Man, and Cybernetics, Part B (Cybernetics), pp. 56\u201363.","DOI":"10.1109\/TSMCB.2008.923526"},{"key":"721_CR11","doi-asserted-by":"crossref","unstructured":"Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, pp. 107\u2013117.","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"721_CR12","doi-asserted-by":"crossref","unstructured":"Broder, A.Z, Charikar, M., Frieze, A.M, & Mitzenmacher, M. (2000). Min-wise independent permutations. Journal of Computer and System Sciences, pp. 630\u2013659.","DOI":"10.1006\/jcss.1999.1690"},{"key":"721_CR13","doi-asserted-by":"crossref","unstructured":"Chang, C.K, Jiang, Hsin-yi, Ming, H., & Oyama, K. (2009). Situ: a situation-theoretic approach to context-aware service evolution. IEEE Transactions on Services Computing, pp. 261\u2013275.","DOI":"10.1109\/TSC.2009.21"},{"key":"721_CR14","doi-asserted-by":"crossref","unstructured":"Chang, C., & Schilit, B.N. (2014). Aware computing [guest editors\u2019 introduction]. Computer, pp. 20\u201321.","DOI":"10.1109\/MC.2014.80"},{"key":"721_CR15","doi-asserted-by":"crossref","unstructured":"Chen, L., Nugent, C.D, & Wang, H. (2011). A knowledge-driven approach to activity recognition in smart homes. IEEE Transactions on Knowledge and Data Engineering, pp. 961\u2013974.","DOI":"10.1109\/TKDE.2011.51"},{"key":"721_CR16","doi-asserted-by":"crossref","unstructured":"Datar, M., Immorlica, N., Indyk, P., & Mirrokni, V.S. (2004). Locality-sensitive hashing scheme based on p-stable distributions. In Proceedings of the twentieth annual symposium on Computational geometry (pp. 253\u2013262).","DOI":"10.1145\/997817.997857"},{"key":"721_CR17","unstructured":"Dave, E., et al. (2011). How the next evolution of the internet is changing everything. The Internet of Things."},{"key":"721_CR18","doi-asserted-by":"crossref","unstructured":"Dogan, O., & Gurcan, O.F. (2022). Applications of big data and green iot-enabling technologies for smart cities. In Research anthology on big data analytics, architectures, and applications (pp. 1090\u20131109). IGI Global.","DOI":"10.4018\/978-1-6684-3662-2.ch052"},{"key":"721_CR19","doi-asserted-by":"crossref","unstructured":"Eirinaki, M., & Vazirgiannis, M. (2005). Usage-based pagerank for web personalization. In Fifth IEEE international conference on data mining (ICDM\u201905) (pp. 130\u2013137). IEEE.","DOI":"10.1109\/ICDM.2005.148"},{"key":"721_CR20","doi-asserted-by":"crossref","unstructured":"Geetha, V., Kamath, S.S, & Salvi, S.S. (2021). Smart home environment: Artificial intelligence-enabled iot framework for smart living and smart health. In AI-Based services for smart cities and urban infrastructure (pp. 310\u2013325). IGI global.","DOI":"10.4018\/978-1-7998-5024-3.ch015"},{"key":"721_CR21","doi-asserted-by":"crossref","unstructured":"Gholami, H., & Chang, C.K (2016). Situation-aware decision making in smart homes. In International conference on smart homes and health telematics (pp. 71\u201382). Springer.","DOI":"10.1007\/978-3-319-39601-9_7"},{"key":"721_CR22","doi-asserted-by":"crossref","unstructured":"Gholami, H., & Chang, C.K (2017). Situation-aware data-driven decision making in smart environments using the mapreduce. In 2017 IEEE 41St annual computer software and applications conference (COMPSAC) (pp. 722\u2013730). IEEE.","DOI":"10.1109\/COMPSAC.2017.214"},{"key":"721_CR23","doi-asserted-by":"crossref","unstructured":"Hagras, H. (2007). Embedding computational intelligence in pervasive spaces. IEEE Pervasive Computing, pp. 85\u201389.","DOI":"10.1109\/MPRV.2007.54"},{"key":"721_CR24","doi-asserted-by":"crossref","unstructured":"Hajjaji, Y., Boulila, W., Farah, I.R., Romdhani, I., & Hussain, A. (2021). Big data and iot-based applications in smart environments: A systematic review. Computer Science Review, pp. 100318.","DOI":"10.1016\/j.cosrev.2020.100318"},{"key":"721_CR25","doi-asserted-by":"crossref","unstructured":"Indyk, P., & Motwani, R. (1998). Approximate nearest neighbors: towards removing the curse of dimensionality. In Proceedings of the thirtieth annual ACM symposium on Theory of computing (pp. 604\u2013613).","DOI":"10.1145\/276698.276876"},{"key":"721_CR26","unstructured":"Jacobson, N. (2012). Basic algebra I Courier Corporation."},{"key":"721_CR27","unstructured":"Jafari, O., Maurya, P., Nagarkar, P., Islam, K.M., & Crushev, C. (2021). A survey on locality sensitive hashing algorithms and their applications. arXiv:2102.08942."},{"key":"721_CR28","doi-asserted-by":"crossref","unstructured":"Jakkula, V., Cook, D.J, & Crandall, A.S (2007). Temporal pattern discovery for anomaly detection in a smart home. In 3rd IET Conf on Intelligent Environments (IE) (pp. 339\u2013345).","DOI":"10.1049\/cp:20070390"},{"key":"721_CR29","doi-asserted-by":"crossref","unstructured":"Javad Akhlaghinia, M., Lotfi, A., Langensiepen, C., & Sherkat, N. (2008). A fuzzy predictor model for the occupancy prediction of an intelligent inhabited environment. In 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence) (pp. 939\u2013946). IEEE.","DOI":"10.1109\/FUZZY.2008.4630482"},{"key":"721_CR30","doi-asserted-by":"crossref","unstructured":"Katal, A., Wazid, M., & Goudar, R.H (2013). Big data: issues, challenges, tools and good practices. In 2013 Sixth international conference on contemporary computing (IC3) (pp. 404\u2013409). IEEE.","DOI":"10.1109\/IC3.2013.6612229"},{"key":"721_CR31","unstructured":"Kautz, H., Etzioni, O., Fox, D., Weld, D., & Shastri, L. (2003). Foundations of assisted cognition systems. University of Washington. Computer science department, Technical Report, Tech. Rep."},{"key":"721_CR32","doi-asserted-by":"crossref","unstructured":"Kumar, S. (2022). Collaborative processing using the internet of things for post-disaster management. In Internet of things and its applications (pp. 383\u2013406). Springer.","DOI":"10.1007\/978-3-030-77528-5_20"},{"key":"721_CR33","doi-asserted-by":"crossref","unstructured":"Kumar, V., Badal, N., & Mishra, R. (2021). Elderly fall detection using iot and image processing. Journal of Discrete Mathematical Sciences and Cryptography, pp. 681\u2013695.","DOI":"10.1080\/09720529.2019.1692451"},{"key":"721_CR34","doi-asserted-by":"crossref","unstructured":"Kwon, O., Shim, J.M., & Lim, G. (2012). Single activity sensor-based ensemble analysis for health monitoring of solitary elderly people. Expert Systems with Applications, pp. 5774\u20135783.","DOI":"10.1016\/j.eswa.2011.11.090"},{"key":"721_CR35","unstructured":"Li, Y., Bandar, Z., McLean, D., O\u2019shea, J., & et al. (2004). A method for measuring sentence similarity and iits application to conversational agents. In FLAIRS Conference (pp. 820\u2013825)."},{"key":"721_CR36","unstructured":"Li, H., Zhang, Q., & Duan, P. (2008). A novel one-pass neural network approach for activities recognition in intelligent environments. In 2008 7Th world congress on intelligent control and automation (pp. 50\u201354). IEEE."},{"key":"721_CR37","doi-asserted-by":"crossref","unstructured":"Mohanty, S., Mohanty, S., Pattnaik, P.K., Vaidya, A., & Hol, A. (2022). Smart healthcare analytics using internet of things: An overview. Smart Healthcare Analytics: State of the Art, pp. 1\u201311.","DOI":"10.1007\/978-981-16-5304-9_1"},{"key":"721_CR38","doi-asserted-by":"crossref","unstructured":"Monekosso, D.N, & Remagnino, P. (2009). Anomalous behavior detection: Supporting independent living. Intelligent Environments, pp. 33\u201348.","DOI":"10.1007\/978-1-84800-346-0_3"},{"key":"721_CR39","doi-asserted-by":"crossref","unstructured":"Motwani, R., & Raghavan, P. (1995). Randomized algorithms. Cambridge University Press.","DOI":"10.1017\/CBO9780511814075"},{"key":"721_CR40","doi-asserted-by":"crossref","unstructured":"Noury, N., & Hadidi, T. (2012). Computer simulation of the activity of the elderly person living independently in a health smart home. Computer methods and programs in biomedicine, pp. 1216\u20131228.","DOI":"10.1016\/j.cmpb.2012.07.004"},{"key":"721_CR41","doi-asserted-by":"crossref","unstructured":"Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2013). Context aware computing for the internet of things: a survey. IEEE communications surveys & tutorials, pp. 414\u2013454.","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"721_CR42","doi-asserted-by":"crossref","unstructured":"Rajaraman, A., & Ullman, J.D. (2011). Mining of massive datasets. Cambridge University Press.","DOI":"10.1017\/CBO9781139058452"},{"key":"721_CR43","doi-asserted-by":"crossref","unstructured":"Rayan, R.A, & Tsagkaris, C. (2022). Iot technologies for smart healthcare. In Assistive technology intervention in healthcare (pp. 29\u201346). CRC Press.","DOI":"10.1201\/9781003207856-3"},{"key":"721_CR44","unstructured":"Richardson, M., & Domingos, P. (2002). The intelligent surfer: Probabilistic combination of link and content information in pagerank. In Advances in neural information processing systems."},{"key":"721_CR45","doi-asserted-by":"crossref","unstructured":"Rivera-Illingworth, F., Callaghan, V., & Hagras, H. (2005). A neural network agent based approach to activity detection in ami environments. In Proceedings of the IEE International Workshop on Intelligent Environments (pp. 92\u2013100).","DOI":"10.1049\/ic:20050222"},{"key":"721_CR46","doi-asserted-by":"crossref","unstructured":"Rivera-Illingworth, F., Callaghan, V., & Hagras, H. (2006). Towards the detection of temporal behavioural patterns in intelligent environments. In International conference on intelligent environments (pp. 119\u2013120). IET.","DOI":"10.1049\/cp:20060633"},{"key":"721_CR47","doi-asserted-by":"crossref","unstructured":"Rumee, A.R. (2021). Iot system for remote monitoring of mangrove forest the sundarbans. Journal of Computer Sciences Institute, pp. 254\u2013258.","DOI":"10.35784\/jcsi.2703"},{"key":"721_CR48","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, D., Tentori, M., & Favela, Jes\u00fas. (2008). Activity recognition for the smart hospital. IEEE intelligent systems, pp. 50\u201357.","DOI":"10.1109\/MIS.2008.18"},{"key":"721_CR49","doi-asserted-by":"crossref","unstructured":"Sayeed, S., Ahmad, A.F., & Peng, T.C. (2022). Smartic: a smart tool for big data analytics and iot. F1000Research, pp. 17\u201318.","DOI":"10.12688\/f1000research.73613.1"},{"key":"721_CR50","doi-asserted-by":"crossref","unstructured":"Schmidt, C.F., Sridharan, N.S, & Goodson, J.L. (1978). The plan recognition problem: an intersection of psychology and artificial intelligence. Artificial Intelligence, pp. 45\u201383.","DOI":"10.1016\/0004-3702(78)90012-7"},{"key":"721_CR51","doi-asserted-by":"crossref","unstructured":"Serna, A., Pigot, H\u00e9l\u00e8ne, & Rialle, V. (2007). Modeling the progression of alzheimer\u2019s disease for cognitive assistance in smart homes. User Modeling and User-Adapted Interaction, pp. 415\u2013438.","DOI":"10.1007\/s11257-007-9032-y"},{"key":"721_CR52","unstructured":"Shrivastava, A., & Li, P. (2014). In defense of minhash over simhash. In Artificial intelligence and statistics (pp. 886\u2013894). PMLR."},{"key":"721_CR53","unstructured":"Sundmaeker, H., Guillemin, P., Friess, P., & Woelffl\u00e9, S. (2010). Vision and challenges for realising the internet of things. Cluster of European research projects on the internet of things, European Commision, pp. 34\u201336."},{"key":"721_CR54","doi-asserted-by":"crossref","unstructured":"Suryadevara, N.K., Mukhopadhyay, S.C, Wang, R., & Rayudu, R.K. (2013). Forecasting the behavior of an elderly using wireless sensors data in a smart home. Engineering Applications of Artificial Intelligence, pp. 2641\u20132652.","DOI":"10.1016\/j.engappai.2013.08.004"},{"key":"721_CR55","doi-asserted-by":"crossref","unstructured":"Taher, H. (2003). Haveliwala. Topic-sensitive pagerank: A context-sensitive ranking algorithm for web search. IEEE transactions on knowledge and data engineering, pp. 784\u2013796.","DOI":"10.1109\/TKDE.2003.1208999"},{"key":"721_CR56","doi-asserted-by":"crossref","unstructured":"Tapia, E.M., Intille, S.S, & Larson, K. (2004). Activity recognition in the home using simple and ubiquitous sensors. In International conference on pervasive computing (pp. 158\u2013175). Springer.","DOI":"10.1007\/978-3-540-24646-6_10"},{"key":"721_CR57","unstructured":"Wang, J., Shen, H.T., Song, J., & Ji, J. (2014). Hashing for similarity search: A survey. arXiv:1408.2927."},{"key":"721_CR58","doi-asserted-by":"crossref","unstructured":"Xie, H., & Chang, C.K (2015). Detection of new intentions from users using the crf method for software service evolution in context-aware environments. In 2015 IEEE 39Th annual computer software and applications conference (pp. 71\u201376). IEEE.","DOI":"10.1109\/COMPSAC.2015.60"},{"key":"721_CR59","doi-asserted-by":"crossref","unstructured":"Yau, S.S, Davulcu, H., Mukhopadhyay, S., Huang, D., & Yao, Y. (2005). Adaptable situation-aware secure service-based (as\/sup 3\/) systems. In Eighth IEEE international symposium on object-oriented real-time distributed computing (ISORC\u201905) (pp. 308\u2013315). IEEE.","DOI":"10.1109\/ISORC.2005.7"},{"key":"721_CR60","unstructured":"Zaslavsky, A., Perera, C., & Georgakopoulos, D. (2013). Sensing as a service and big data. arXiv:1301.0159."},{"key":"721_CR61","doi-asserted-by":"crossref","unstructured":"Zheng, H., Wang, H., & Black, N. (2008). Human activity detection in smart home environment with self-adaptive neural networks. In 2008 IEEE International conference on networking, sensing and control (pp. 1505\u20131510). IEEE.","DOI":"10.1109\/ICNSC.2008.4525459"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-022-00721-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10844-022-00721-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-022-00721-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:49:33Z","timestamp":1700765373000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10844-022-00721-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,25]]},"references-count":61,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["721"],"URL":"https:\/\/doi.org\/10.1007\/s10844-022-00721-9","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"type":"print","value":"0925-9902"},{"type":"electronic","value":"1573-7675"}],"subject":[],"published":{"date-parts":[[2022,6,25]]},"assertion":[{"value":"18 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}