SlideShare a Scribd company logo
1 of 4
Download to read offline
Analysis of Smart Mobile Applications for Healthcare under Dynamic
Context Changes
Abstract:
Smart mobile medical computing systems (SMDCSes), e.g., mobile medical
applications use context information from the environment to provide
useful and often critical healthcare services such as continuous monitoring
and control of blood glucose levels by infusion of insulin. Given the
unsupervised nature of operation of SMDCSes, context changes that are
unaccounted for can cause unprecedented faults leading to violation of
requirements such as safety, energy sustainability and reliability. Analysis
of SMDCSes for testing requirements violations necessitates consideration
of context dependent interactions between the SMDCS software,
represented by discrete operating modes and its environment, represented
by nonlinear partial differential equations over space and time. An
intractable number of context change sequence and lack of closed form
solutions to differential equations makes the requirements analysis of
SMDCSes a challenging task. This paper proposes a novel technique to
analyze SMDCSes taking into account the dynamic changes in the context
and the constant interaction of the computing systems with the physical
environment. To show the usage of the technique, Ayushman pervasive
health monitoring system is considered as an example SMDCS. Analytical
results show that practices considered healthy for a person such as mobility
may not be beneficial when an SMDCS is controlling health.
Existing System:
In critical infrastructures such as healthcare systems, context changes may
trigger hazardous consequences for the user. Indeed the Food and Drugs
Administration (FDA) has considered SMDCSes in healthcare as medical
electrical equipments and has recommended strict safety guidelines for
them.
FDA has recognized three types of health apps:
a) Display apps
b) Diagnostic apps
c) Controller apps
Encourage the use of safety verification tools such as static software testing
for safety critical mobile apps.
Further, a key feature of SMDCSes is their pervasive and unobtrusive
operation. Hence, apart from safety a key requirement for SMDCSes is
sustainability, i.e., their long term operation with limited energy from
sources such as batteries or scavenging systems.
Proposed System:
The wireless channel is prone to errors due to interference, the packets
containing accurate blood oxygen level can get corrupted or dropped at
random. If the controller does not obtain an accurate estimation of the
blood oxygen level it can cause unstable or oscillatory infusion rates, which
can induce respiratory distress.
Thus, receiving the correct control information despite wireless
interference is important.
Wireless interference patterns change drastically with location context of
the user e.g., the packet delivery rate of a medium may vary from indoors
to outdoors.
Location context changes are governed by user mobility. In such a scenario
the user mobility pattern may be unsafe for his health.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

What's hot

BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSUsmanYakubuMaaruf
 
Nuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online LibraryNuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online Librarygracefulhate2373
 
How to Successfully Select, Implement and Use an EMR in your Medical Practice
How to Successfully Select, Implement and Use an EMR in your Medical PracticeHow to Successfully Select, Implement and Use an EMR in your Medical Practice
How to Successfully Select, Implement and Use an EMR in your Medical Practicealanbrookstone
 
LABORATORY INFORMATION SYSTEM
LABORATORY INFORMATION SYSTEMLABORATORY INFORMATION SYSTEM
LABORATORY INFORMATION SYSTEMprince maurya
 
The Electronic Medical Record - David Beausang
The Electronic Medical Record - David BeausangThe Electronic Medical Record - David Beausang
The Electronic Medical Record - David Beausanghealthcareisi
 
Ehr system implementation and ongoing maintenance
Ehr system implementation and ongoing maintenanceEhr system implementation and ongoing maintenance
Ehr system implementation and ongoing maintenanceBharath Kumar Reddy Chinta
 
Technological Resources & Personnel Costs Required to Implement an Automated ...
Technological Resources & Personnel Costs Required to Implement an Automated ...Technological Resources & Personnel Costs Required to Implement an Automated ...
Technological Resources & Personnel Costs Required to Implement an Automated ...HMO Research Network
 
Nursing emr power point
Nursing   emr power pointNursing   emr power point
Nursing emr power pointMRFRIZZ
 
Pros and cons of ehr
Pros and cons of ehrPros and cons of ehr
Pros and cons of ehrNortec Ehr
 
Week 9 emr implementation final project
Week 9 emr implementation final projectWeek 9 emr implementation final project
Week 9 emr implementation final projectprdolfin
 
Patient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device DataPatient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device DataDavid Lee Scher, MD
 
Nuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online LibraryNuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online Libraryabortivecatcall84
 
E health Demystified
E health DemystifiedE health Demystified
E health DemystifiedSyed Ali Raza
 
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...Oresti Banos
 
EMR Presentation - The Time is Now
EMR Presentation - The Time is NowEMR Presentation - The Time is Now
EMR Presentation - The Time is Nowsbenson1
 
E-prescribing (electronic medical prescribing)
E-prescribing (electronic medical prescribing)E-prescribing (electronic medical prescribing)
E-prescribing (electronic medical prescribing)emalyn magtoto
 

What's hot (20)

BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
 
CPOE
CPOE CPOE
CPOE
 
Nuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online LibraryNuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online Library
 
How to Successfully Select, Implement and Use an EMR in your Medical Practice
How to Successfully Select, Implement and Use an EMR in your Medical PracticeHow to Successfully Select, Implement and Use an EMR in your Medical Practice
How to Successfully Select, Implement and Use an EMR in your Medical Practice
 
CPOE overviews
CPOE overviews CPOE overviews
CPOE overviews
 
LABORATORY INFORMATION SYSTEM
LABORATORY INFORMATION SYSTEMLABORATORY INFORMATION SYSTEM
LABORATORY INFORMATION SYSTEM
 
The Electronic Medical Record - David Beausang
The Electronic Medical Record - David BeausangThe Electronic Medical Record - David Beausang
The Electronic Medical Record - David Beausang
 
Ehr system implementation and ongoing maintenance
Ehr system implementation and ongoing maintenanceEhr system implementation and ongoing maintenance
Ehr system implementation and ongoing maintenance
 
Technological Resources & Personnel Costs Required to Implement an Automated ...
Technological Resources & Personnel Costs Required to Implement an Automated ...Technological Resources & Personnel Costs Required to Implement an Automated ...
Technological Resources & Personnel Costs Required to Implement an Automated ...
 
Nursing emr power point
Nursing   emr power pointNursing   emr power point
Nursing emr power point
 
Paper rev
Paper revPaper rev
Paper rev
 
Medical database
Medical databaseMedical database
Medical database
 
Pros and cons of ehr
Pros and cons of ehrPros and cons of ehr
Pros and cons of ehr
 
Week 9 emr implementation final project
Week 9 emr implementation final projectWeek 9 emr implementation final project
Week 9 emr implementation final project
 
Patient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device DataPatient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device Data
 
Nuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online LibraryNuclear medicine technologist. - Free Online Library
Nuclear medicine technologist. - Free Online Library
 
E health Demystified
E health DemystifiedE health Demystified
E health Demystified
 
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
Mobile Health System for Evaluation of Breast Cancer Patients During Treatmen...
 
EMR Presentation - The Time is Now
EMR Presentation - The Time is NowEMR Presentation - The Time is Now
EMR Presentation - The Time is Now
 
E-prescribing (electronic medical prescribing)
E-prescribing (electronic medical prescribing)E-prescribing (electronic medical prescribing)
E-prescribing (electronic medical prescribing)
 

Similar to Analysis of smart mobile applications for healthcare under dynamic context changes

Paper id 212014105
Paper id 212014105Paper id 212014105
Paper id 212014105IJRAT
 
A SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKA SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKijsrd.com
 
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...acijjournal
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET Journal
 
Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Editor IJARCET
 
Energy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor NetworkEnergy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor Networkiosrjce
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networksjosephjonse
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSijngnjournal
 
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...IJSRD
 
Energy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor NetworksEnergy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor Networkspaperpublications3
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
Autonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesAutonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
 
IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...
IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...
IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...IRJET Journal
 
Health Monitoring System in Emergency Using IoT
Health Monitoring System in Emergency Using IoTHealth Monitoring System in Emergency Using IoT
Health Monitoring System in Emergency Using IoTIRJET Journal
 
Context aware data processing to enhance quality of measurements in wireless ...
Context aware data processing to enhance quality of measurements in wireless ...Context aware data processing to enhance quality of measurements in wireless ...
Context aware data processing to enhance quality of measurements in wireless ...ieeeprojectsbangalore
 

Similar to Analysis of smart mobile applications for healthcare under dynamic context changes (20)

B1103010918
B1103010918B1103010918
B1103010918
 
Paper id 212014105
Paper id 212014105Paper id 212014105
Paper id 212014105
 
A SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKA SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORK
 
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
 
Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397
 
E017342231
E017342231E017342231
E017342231
 
Energy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor NetworkEnergy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor Network
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
 
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
 
J05136669
J05136669J05136669
J05136669
 
Energy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor NetworksEnergy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor Networks
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
Autonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesAutonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridges
 
IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...
IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...
IRJET- A Survey on IoT based Real Time Healthcare Emergency System by using B...
 
research paper
research paper research paper
research paper
 
Health Monitoring System in Emergency Using IoT
Health Monitoring System in Emergency Using IoTHealth Monitoring System in Emergency Using IoT
Health Monitoring System in Emergency Using IoT
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 
Context aware data processing to enhance quality of measurements in wireless ...
Context aware data processing to enhance quality of measurements in wireless ...Context aware data processing to enhance quality of measurements in wireless ...
Context aware data processing to enhance quality of measurements in wireless ...
 

More from ieeeprojectschennai

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...ieeeprojectschennai
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...ieeeprojectschennai
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wildieeeprojectschennai
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...ieeeprojectschennai
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...ieeeprojectschennai
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...ieeeprojectschennai
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...ieeeprojectschennai
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesieeeprojectschennai
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksieeeprojectschennai
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksieeeprojectschennai
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersieeeprojectschennai
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsieeeprojectschennai
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingieeeprojectschennai
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffieeeprojectschennai
 

More from ieeeprojectschennai (20)

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
 

Analysis of smart mobile applications for healthcare under dynamic context changes

  • 1. Analysis of Smart Mobile Applications for Healthcare under Dynamic Context Changes Abstract: Smart mobile medical computing systems (SMDCSes), e.g., mobile medical applications use context information from the environment to provide useful and often critical healthcare services such as continuous monitoring and control of blood glucose levels by infusion of insulin. Given the unsupervised nature of operation of SMDCSes, context changes that are unaccounted for can cause unprecedented faults leading to violation of requirements such as safety, energy sustainability and reliability. Analysis of SMDCSes for testing requirements violations necessitates consideration of context dependent interactions between the SMDCS software, represented by discrete operating modes and its environment, represented by nonlinear partial differential equations over space and time. An intractable number of context change sequence and lack of closed form solutions to differential equations makes the requirements analysis of SMDCSes a challenging task. This paper proposes a novel technique to analyze SMDCSes taking into account the dynamic changes in the context and the constant interaction of the computing systems with the physical environment. To show the usage of the technique, Ayushman pervasive health monitoring system is considered as an example SMDCS. Analytical
  • 2. results show that practices considered healthy for a person such as mobility may not be beneficial when an SMDCS is controlling health. Existing System: In critical infrastructures such as healthcare systems, context changes may trigger hazardous consequences for the user. Indeed the Food and Drugs Administration (FDA) has considered SMDCSes in healthcare as medical electrical equipments and has recommended strict safety guidelines for them. FDA has recognized three types of health apps: a) Display apps b) Diagnostic apps c) Controller apps Encourage the use of safety verification tools such as static software testing for safety critical mobile apps. Further, a key feature of SMDCSes is their pervasive and unobtrusive operation. Hence, apart from safety a key requirement for SMDCSes is sustainability, i.e., their long term operation with limited energy from sources such as batteries or scavenging systems. Proposed System:
  • 3. The wireless channel is prone to errors due to interference, the packets containing accurate blood oxygen level can get corrupted or dropped at random. If the controller does not obtain an accurate estimation of the blood oxygen level it can cause unstable or oscillatory infusion rates, which can induce respiratory distress. Thus, receiving the correct control information despite wireless interference is important. Wireless interference patterns change drastically with location context of the user e.g., the packet delivery rate of a medium may vary from indoors to outdoors. Location context changes are governed by user mobility. In such a scenario the user mobility pattern may be unsafe for his health. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements:
  • 4. • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP. • Front End : - .Net • Back End : - SQL Server