DOI QR코드

DOI QR Code

A Design of Application through Physical Therapy Big Data Analytics

  • Choi, Woo-Hyeok (Department of Physical therapy, Catholic University of Pusan) ;
  • Huh, Jun-Ho (Department of Software, Catholic University of Pusan)
  • 투고 : 2018.09.17
  • 심사 : 2018.09.26
  • 발행 : 2018.09.30

초록

According to the National Health Insurance Corporation in 2008, there were 17,764,428 physical therapy patients, exceeding 31 percent for the population covered by health insurance. This means that three out of 10 Koreans received physical therapy. And now, 10 years later, due to the aging population and the increase in the sports population, the number of patients with physical therapy is expected to be much more than a decade ago. Among them, many physical therapy patients were orthopedic and neurologic disorder. However, in the medical field applied to physical therapy, it is widely applied across all medical fields, including orthopedics, neurosurgery, pediatrics, gynecology, thoracic surgery and dentistry. It is believed that various cases of patients receiving physical therapy will be secured. as mentioned earlier, there will be a large number of patients with physical therapy treatments, making big data analytics easier. based on this, physical therapy applications are thought to be helpful in the analogy of disease and the development of effective physical therapy and will ultimately promote the development of physical therapy.

키워드

참고문헌

  1. Jun-Ho Huh,; "Big Data Analysis for Personalized Health Activities: Machine Learning Processing for Automatic Keyword Extraction Approach," Symmetry, MDPI, 2018, Vol.10, No.4, pp. 1-30.
  2. Sangdo Lee,; Jun-Ho Huh,; "An effective security measures for nuclear power plant using big data analysis approach," The Journal of Supercomputing, Springer US, pp.1-28, 2018.
  3. Jordan, M.I.; Mitchell, T.M.; "Machine learning: Trends, perspectives, and prospects," Science, 2015, 349, 255- 260. https://doi.org/10.1126/science.aaa8415
  4. LeCun, Y.; Bengio, Y.; Hinton, G.; "Deep learning," Nature, 2015, 521, 436-444. https://doi.org/10.1038/nature14539
  5. Bayes, T.; "An essay towards solving a problem in the doctrine of chances," Stud. Hist. Stat. Probab. 1970, 1, 134-153.
  6. Hastie, T.; Tibshirani, R.; Friedman, J.; "The Elements of Statistical Learning: Data Mining, Inference and Prediction," Springer Berlin, Germany, 2008.
  7. Murphy, K.P.; "Machine Learning: A Probabilistic Perspective," MIT Press: Cambridge, MA, USA, 2012.
  8. Huh, J.H.; Kim, H.B.; Seo, K.; "A preliminary analysis model of big data for prevention of bioaccumulation of heavy metal-based pollutants: Focusing on the atmospheric data analyses," Adv. Sci. Technol. Lett. SERSC, 2016, 129, 159-164.
  9. Wu, X.; Fan, W.; Peng, J.; Zhang, K.; Yu, Y.; "Iterative sampling based frequent itemset mining for big data," Int. J. Mach. Learn. Cybern. 2015, 6, 875-882. https://doi.org/10.1007/s13042-015-0345-6
  10. Luo, Y.; Yang, B.; Xu, L.; Hao, L.; Liu, J.; Yao, Y.; Van de Vosse, F.; "Segmentation of the left ventricle in cardiac MRI using a hierarchical extreme learning machine model," Int. J. Mach. Learn. Cybern. 2017.
  11. Lee Yeon Hee.; "Use and Challenges of Public Big Data in the Field of Health and Welfare," Health and Welfare Forum. 2015.
  12. Lee Ji Hye et al.; "Big Data Utilization Trends in Healthcare Sector," Journal of the Korean Institute of Communication Sciences, 32: 1, 2014, 63-75.
  13. Breastfeeding," "Protection of Big Data Environment and Privacy," IT and Legal Research 8 (2014): 193-259.
  14. Kang, Hyeong-jung, Lee, Kyung-hee,; "A Plan for Activating the Elderly Community in an Aging Society," Journal of Korean Society for Living Environment 24, 3, 2017, 380-388. https://doi.org/10.21086/ksles.2017.06.24.3.380
  15. Yoon Sang-Oh,; "A Study on the Classification of Risk Types of Big Data," Journal of Korean Local Information Science 16: 2, 2013, 93-122.
  16. Lee Hye Rim, Jo Jae Yeon, Yun Ji Won,; "Healthcare Security Issues from the Viewpoint of Cyber Physical System in Cloud Environment," Journal of Information Security, 24.6, 2014, 7-13