This document describes the design of an online medical diagnosis system called Doctors-Online. The system allows patients to have video consultations with doctors by transmitting vital health data like temperature via Bluetooth. It uses a 3-tier architecture with presentation, business, and data layers. Doctors can view patient records, diagnose issues, and send prescriptions during secure video conferences. The system aims to provide convenient remote healthcare.
Scalable and secure sharing of personal health records in cloud computing usi...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Scalable and secure sharing of personal health records in cloud computing usi...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A cloud solution for medical image processingIJERA Editor
The rapid growth in the use of Electronic Health Records across the globe along with the rich mix of multimedia held within an EHR combined with the increasing level of detail due to advances in diagnostic medical imaging means increasing amounts of data can be stored for each patient. Also lack of image processing and analysis tools for handling the large image datasets has compromised researchers and practitioner‟s outcome. Migrating medical imaging applications and data to the Cloud can allow healthcare organizations to realize significant cost savings relating to hardware, software, buildings, power and staff, in addition to greater scalability, higher performance and resilience. This paper reviews medical image processing and its challenges, states cloud computing and cloud computing benefits due to medical image processing. Also, this paper introduces tools and methods for medical images processing using the cloud. Finally a method is provided for medical images processing based on Eucalyptus cloud infrastructure with image processing software “ImageJ” and using improved genetic algorithm for the allocation and distribution of resources. Based on conducted simulations and experimental results, the proposed method brings high scalability, simplicity, flexibility and fully customizability in addition to 40% cost reduction and twice increase in speed.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Content-Infused OGC Web Services Enabling Dynamic Quality Assessment in Obser...Cybera Inc.
Presentation by Janet Fredericks during the Sensor Web Ontology and Semantics paper session of the Sensor Web Enablement workshop (held during the 2011 Cybera Summit).
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A cloud solution for medical image processingIJERA Editor
The rapid growth in the use of Electronic Health Records across the globe along with the rich mix of multimedia held within an EHR combined with the increasing level of detail due to advances in diagnostic medical imaging means increasing amounts of data can be stored for each patient. Also lack of image processing and analysis tools for handling the large image datasets has compromised researchers and practitioner‟s outcome. Migrating medical imaging applications and data to the Cloud can allow healthcare organizations to realize significant cost savings relating to hardware, software, buildings, power and staff, in addition to greater scalability, higher performance and resilience. This paper reviews medical image processing and its challenges, states cloud computing and cloud computing benefits due to medical image processing. Also, this paper introduces tools and methods for medical images processing using the cloud. Finally a method is provided for medical images processing based on Eucalyptus cloud infrastructure with image processing software “ImageJ” and using improved genetic algorithm for the allocation and distribution of resources. Based on conducted simulations and experimental results, the proposed method brings high scalability, simplicity, flexibility and fully customizability in addition to 40% cost reduction and twice increase in speed.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Content-Infused OGC Web Services Enabling Dynamic Quality Assessment in Obser...Cybera Inc.
Presentation by Janet Fredericks during the Sensor Web Ontology and Semantics paper session of the Sensor Web Enablement workshop (held during the 2011 Cybera Summit).
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Laboratory Information Management SystemMike Taylor
Laboratory Information Management System for scientists. Collaboration tool for healthcare industry for equipment sharing with social networking features
Io t and cloud based computational framework, evolutionary approach in health...owatheowais
The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main advantages and novelties of the proposed system is the flexibility in computing the health application by using resources from available devices inside the body area network of the user. This proposed framework can be applied to other mobile environments, especially those where intensive data acquisition and high processing needs take place. Finally, we present a case study in order to validate our proposal that consists in monitoring footballers’ heart rates during a football match. The real-time data acquired by these devices presents a clear social objective of being able to predict not only situations of sudden death but also possible injuries.
1. Doctors-OnLine
C. K. Yeo, C. T. Lau, B. S. Lee
School of Computer Engineering
Nanyang Technological University
Nanyang Avenue
S 639798
Republic of Singapore
Email: {asckyeo, asctlau, ebslee}@ntu.edu.sg
Abstract 1. Introduction
This paper describes the design and The increased mobility of rising
development of a Java web application that population of cosmopolitans and tourists
implements the facilities of an online clinic. have heralded the need for vital and personal
Emulation of face-to-face consultation and information, especially financial and
co-diagnosis with other doctors are medical, to be available conveniently and
accomplished via multipoint video and quickly. With the advent and prevalence of
audio conferencing. Patient record and the Internet worldwide, it seems logical that
appointment data management is achieved Internet offers a highly suitable conduit and
through JDBC 2.0 API with a relational this led to the fruition and development of
database. A hardware measurement kit this project, online medical diagnosis
enables vital patient health data to be system.
measured and transmitted to the patient's
PC via Bluetooth Interface. The data is The online medical diagnosis system is
then forwarded to the doctor during a literally an online clinic. It allows patients to
consultation. Presciptions are sent via email request for appointments and doctors to meet
to the patient as well as to the selected up with them via video conferencing. Thus,
pharmacy so that they can be ready for it is possible for doctors and patients to
collection by the patient or be delivered to interact visually and audibly. Moreover, the
the patient. Web-based user interfaces are system also provides a kit to the patient that
generated with Java Servlet 2.2 API and will measure and transmit the patient's health
security is accomplished with Java Secure signs such as body temperature via the
Socket Extension 1.0.2 over the Secure Internet to the doctor. This will aid in the
Socket Layer. doctor's assessment or diagnosis.
Keywords: remote diagnosis, BlueTooth As with any clinic, patient medical
interface, wireless communication, audio, records are stored in the system and is
video conferencing available online to both doctors and patients.
International Journal of The Computer, The Internet and Management, Vol. 10, No3, 2002, p 15 -22
15
2. However, only doctors have the permission • Provide video, audio and text
and the professional knowledge to update communications to fully emulate
such records. The patient, on the other hand, physical consultation
benefits from the ability to peruse his or her • Accept patients’ vital health signs such
medical records whenever necessary. as body temperature which are sent over
the Internet to the doctor for diagnosis
Enhydra Java Application Server 3.01 is without patient intervention
used to deploy and manage this system. The • Manage patient medical records
back-end relational database employed is including diagnosis, prescription, image
Inprise Interbase 6.01. Both Enhydra and and document attachments
Interbase are Open Source projects. Video • Allow prescriptions to be emailed to
conferencing capability is achieved with patients upon request
Microsoft Netmeeting 3.01. • Keep track of both doctors and patients
appointments
• Include encryption technology to protect
sensitive and confidential medical
2. System Architecture information
The online clinic system is designed to: This is designed as a Java web
application and is based on a three-tier
• Allow doctors and patients to interact architecture [1]. The architecture comprises
from any place and at any time three separate logical layers, namely, the
presentation layer, business layer and the
data layer. This is illustrated in Figure 1.
HTTP
response
HTTP Presentation
Presentation Presentation
request Manager
Objects Layer
Application
Objects
Session
Manager Business Business
Objects Layer
Data Data
Objects Layer
Database
Manager Database
JDBC
Figure 1 Doctors-Online Application Framework
16
3. 2.1 Presentation Layer The Enhydra Database Manager [2] is
responsible for the state of a database
The presentation layer contains connection, the current SQL statement being
presentation objects. These objects are executed by the data object and the result to
loaded and executed by the Enhydra be passed to the data layer. Java Database
Presentation Manager. Connectivity (JDBC) 2.0 API is employed to
communicate with the database servers.
When a patient browser sends an HTTP
request to the server, the Presentation The separation of business logic and
Manager passes the request to the user interface add flexibility to the design of
corresponding presentation object that will this web application. Multiple user interfaces
be instantiated and called. The presentation can be built and deployed without changing
object may further pass the data to and the business layer. Similarly, a change in the
receive data from the business layer. It then data source used may only affect the data
formats the data for display and generates the layer and leaves both the business and
HTTP response back to the patient browser. presentation layers untouched, thereby
Java Servlet API 2.2 is used for the improving maintainability and increasing
generation of HTML pages. performance.
2.2 Business Layer
3. Patient Health Measurement Kit
The business layer contains business
objects. Business objects define the The Patient Health Measurement Kit is a
application’s business logic, including wireless hardware device designed to capture
algorithms and specialised functions, but not the vital health data of the patient. Figure 2
data access or display functions. It serves to shows its block diagram. It comprises a
evaluate information sent by the presentation temperature sensor, an analogue to digital
layer and also transform the data from the converter (ADC) to convert the sensor
data layer into the appropriate form required voltage into digital values for input into the
for display by the presentation layer. PC. The entire kit is controller by an 8-bit
microcontroller, the AT89C51, a flash
The Enhydra Session Manager creates a memory version of the MCS-51 family [3].
unique session object whenever a patient The microcontroller uses serial interface to
logs on. Patient-specific information will be connect to the bluetooth development kit [4]
placed in the session object by the for data transfer. Vital signs of a human
application object. Both the presentation include body temperature, pulse rate and
objects and business objects will make use of blood pressure. However, for this system,
the session information. only the temperature measurement is
implemented. The recordings of pulse rate
and blood pressure have been planned for
2.3 Data Layer future implementation. The setup and
Data layer contains data objects that will operation of the system is shown in Figure 3.
interface with the persistent data source. In
this case, the data source is a relational
database.
International Journal of The Computer, The Internet and Management, Vol. 10, No3, 2002, p 15 -22
17
4. Thermistor Analog-to- Micro- Bluetooth
Probe Digital Controller Interface
Converter
Figure 2 Overview of Health Measurement Kit
At the time of appointment, the patient chronological order. Besides this, the doctor
launches the Visual Basic program. The will be able to see whether a patient has
program automatically directs the browser to logged in as well as the generated
access the patient login page for the patient NetMeeting link and a hypertext link to the
to login. The patient will then be prompted examination page of the patient containing
to measure his vital signs. The controller the vital health data that was transmitted
transmits the measured value to the patient’s from the Patient Health Measurement Kit.
computer through the Bluetooth interface The doctor will also be able to access the
[5][6]. This reading is captured by the Visual corresponding patient’s medical records.
Basic program through the RS232 serial port Such medical records can be retrieved by the
which is interfaced to the Stonestreet doctor as shown in Figure 3 for discussion
Bluetooth receiver. Once the readings have with the patient.
stabilised, the program will be sent via the
Internet to the Doctors-Online server. The When the doctor is ready to interact with
server will then capture these data and the patient, he will click on the NetMeeting
presents them to the doctor for diagnosis. link bringing up the NetMeeting software.
The NetMeeting software on the doctor’s
The login procedure is required in order computer shall ‘call’ the NetMeeting
to confirm the identity of the patient in software on the patient’s computer as
concern and ensure that the data is sent over determined by the IP address. If the call is
a secured Internet communication channel. successful, video conferencing will be
established between the doctor and the
patient via ILS servers. The flow of
information is shown in Figure 3. The doctor
4. Video Conferencing and Diagnosis can, in addition, establish a new video link to
another doctor to co-diagnose the patient's
At the same time the Visual Basic condition.
program is been executed, the NetMeeting
software is also activated. Once the patient Based on the health information and the
has successfully logged in, the application interaction, the doctor can proceed to
object determines and stores the IP address diagnose the patient. The diagnosis shall be
of the patient’s computer. This address is stored as part of the patient medical record
used in the generation of a NetMeeting link into the database. In order to fully implement
that will be presented to the doctor in his the features of a patient’s medical records,
appointment page. the doctor can choose to upload files to the
database. In other words, the Doctor-Online
On the appointment page of the doctor, a system will also act as a virtual hard disk.
list of appointments will be displayed in This allows X-ray scans (shown in Figure 4),
18
5. detail medical history and other vital 5. Security
information to be uploaded. The patient will
be able to download these files for perusal. Due to the sensitive nature of medical
However, a patient is not allowed to upload. information, security is a vital aspect of this
The doctor has read, write and delete access system. Communication channels between
to the attachments. The upload is done via a the patient and server and that between the
POST request to the Doctors-Online server doctor and the server will be secured. Strong
over Secure Sockets Layer. encryption is employed with the use of
Secure Sockets Layer. This is accomplished
Prescriptions are made and sent via through the provision of the export version
email to the patient as well as to the of Java Secure Socket Extension 1.0.2.
pharmacy selected by the patient. The patient Through the relaxing of US export laws,
can either collect the prescription personally cryptically strong algorithms are made
or have the prescription be delivered. available [7].
Patient Health
Measurement Kit
Bluetooth
Visual
Basic
Doctors
Online
Servers
NetMeetin Doctor
ILS NetMeetin
Patient Compute
Computer
Figure 3 Flow of Information between Patient and Doctor
International Journal of The Computer, The Internet and Management, Vol. 10, No3, 2002, p 15 -22
19
6. 6. System Evaluation • The online medical records allow vital
medical information of any patient to be
6.1 Commercial Potential available to doctors, wherever they may
be, to aid in their diagnosis
The commercial potential of this system • Invaluable to business travellers,
are summarised as follows: tourists, elderly, patients who are
physically immobile
• Allows patients, wherever and whenever • Overcomes the problem of travelling in
they may be, to seek medical attention adverse weather conditions and over
from their very own doctors vast distances to seek consultation
• Allows doctors and specialists who are • Allows prompt round-the-clock
geographically distributed to co- healthcare services
diagnose a patient's conditions • Reduces queues in clinics for trivial
• Allows physical bio-medical ailments
measurements to be taken and
transmitted direct to doctors
Figure 4 Web-based User Interface of Doctors Online
20
7. 6.2 Comparison with Related Systems • Ease of Use. The use of wireless
technology renders the health
LifeShirt [8] is a comfortable, washable mesaurement kit less cumbersome to be
garment that can be worn at home, work or used. Moreover, it also allows data to be
play. Sensors embedded in the LifeShirt transmitted automatically to the patient's
continuously monitor 40 psychological signs PC as well as to the doctor, without the
and record the data in a small recorder that need for patient's intervention unlike
clips on the patient's belt. Patients can upload LifeShirt where manual uploading is
data stored in the LifeShirt to an Internet- required. This seamless integration
connected PC via a handheld computer. through the Internet together with the use
These readings go to the LifeShirt Data of video conferencing can thus fully
centre, a high-security website where staff emulate a face-to-face consultation.
physicians can analyse the data and make it
available for online viewing by the doctor
and his patient.
7. Conclusion
Micropaq [9] is an ambulatory patient
monitor from Welch Allyn Protocl Inc. It is a The feasibility of implementing an
patient worn telemetry monitor with the online clinic is demonstrated with the
display, alarms and parameters of a Doctors Online system. The system is
standalone portable vital signs monitor. The designed as a Java web application with a
Micropaq monitor is principally designed for modular three-tier architecture to increase
use in cardiac care with ambulatory patients flexibility, facilitate maintenance and
connected wirelessly to Protocol's network improve overall performance. Doctors-
and a central nursing workstation. It can be Online has been designed to facilitate patient
used as a portable or spot-check monitor on to remotely consult his family doctor at any
hospital medical-surgical floors or as a basic time from any place. Consultation is effected
transport monitor when critical patients are via audio and video conferencing to fully
moved from one hospital department to emulate physical consultation. Discussion
another. with doctors other than the family doctor is
accomplished via multipoint audio/video
Although the patient health communications. Physical examination is
measurement toolkit proposed pales in facilitated by providing patients with a kit to
features and complexity when compared to measure health signs such as body
LifeShirt and Micropaq, the Doctors-Online temperature as well as through video.
system as a whole has the following Measured data is transmitted directly to the
advantages in addition to the commercial doctor via Internet. Security is maintained
potential mentioned above: with the use of Secure Socket Layer (SSL).
• Low Cost. Only basic vital signs such as There is room for improvement in the
body temperature, pulse rate and blood system. For instance, code reusability can be
pressure are required for minor medical improved by the use of Enterprise Java
diagnosis. These limited requirements, Beans (EJB) and reduce video conferencing
coupled with low-cost components make dependence on platform and browser by
the hardware affordable for the patients. offering more diverse conferencing choices
other than NetMeeting.
International Journal of The Computer, The Internet and Management, Vol. 10, No3, 2002, p 15 -22
21
8. REFERENCES
[1] Programmer to Programmer.
Professional Java Server Programming.
Wrox Press Ltd. 1999. USA.
[2] Ian Evans, Laurel Klein, Michael Maceri,
C. Rand McKinney. Getting Started with
Lutris Enhydra. Lutris Technologies, Inc.
2000. USA. Online document available
at http://www.lutris.com/documentation.
[3] I. Scott MacKenzie, The 8051
Microcontroller, Prentice Hall, 1999.
[4] Stone Street Bluetooth Development Kit,
http://www.stonestreetone.com/bluetooth
/products/bdk/
[5] Bluetooth Special Interest Group,
Specifications of the Bluetooth System
version, 1.0B, vol. 1 and 2,
http://www.bluetooth.com, Dec 1999.
[6] Brent Miller, Chatschik Bisdikian,
Bluetooth Revealed - The Insider's Guide
to an Open Specification for Global
Wireless Communications, Prentice Hall,
2001.
[7] Java Secure Socket Extension,
http://www.java.sun.com/products/jsse.
[8] LifeShirt,
http://ww.vivometrics.com/Products/prod
ucts_flash.html.
[9] Micropaq,
http://www.protocol.com/company/press/
000309micropaq.asp.
_____
22