This document discusses smart card applications in telemedicine. It proposes storing encrypted medical information like patient records, images, and test results on smart cards. This would allow portable storage and retrieval of data on any computer. The technology for this has been developed indigenously and could have applications beyond healthcare like secure e-commerce. It reviews an existing medical data compression and transmission protocol called ANAHITA. Smart cards provide secure authentication, user identification, and transaction records. Medical data from various sources can be compressed and stored on smart cards for easy sharing while maintaining security.
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...IRJET Journal
This document proposes a blockchain-based system to securely store and access medical reports. It describes a 3-part system: 1) Registration and authentication where patients register with unique IDs and doctors are authenticated. 2) Health data input where patient data like vitals are entered. 3) Encryption and storage where data is encrypted using blockchain crypto algorithms and stored on the blockchain with access only by authenticated doctors. The goal is to securely manage medical reports while ensuring privacy, security, and trust in the healthcare system.
IRJET - A Survey on Blockchain Technology for Electronic Health RecordIRJET Journal
This document discusses using blockchain technology to improve electronic health records (EHRs). It begins with an abstract that outlines the goals of using blockchain for EHRs, including improving healthcare efficiency and access while reducing costs. The document then provides background on EHRs and issues like data security, ownership and integrity. It proposes using blockchain to securely store and share medical records in a decentralized network. The document outlines several proposed blockchain applications for EHRs, including distributed storage of health data collected from IoT devices, and allowing patients more control over access to their records. It discusses challenges like scalability and interoperability, and concludes that blockchain technology has potential to help address current problems with EHR systems.
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
This document summarizes a research paper about securely hiding sensitive medical data using encryption. The paper proposes a system that distributes a patient's data across multiple encrypted data servers. It uses Paillier cryptosystems to allow statistical analysis of the encrypted patient data without compromising privacy. The system includes wireless medical sensors that monitor patients and transmit encrypted data to a database. It uses an access control system and statistical analysis protocols that employ Paillier encryption to allow authorized users like doctors to access and analyze the encrypted patient data without revealing its contents. The goal is to protect sensitive medical information from privacy breaches while still enabling useful analysis of aggregated patient data.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
This document discusses providing security for wireless medical sensor data. It first reviews related work on securing wireless medical sensor networks using cryptosystems like Paillier and ElGamal. It then proposes a system that uses these cryptosystems to encrypt and distribute patient data across multiple data servers. This would preserve patient privacy as long as no single server is compromised. The system aims to allow medical analysis of distributed encrypted data without revealing individual patient information.
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...IJECEIAES
Due to their use in daily life situation, demand for remote health applications and e-health monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy, information can be transferred from the patient to the distant clinic. Nowadays, the most chronic disease is cardiovascular diseases (CVDs). However, the storage and transmission of the ECG signal, consumes more energy, bandwidth and data security which is faced many challenges. Hence, in this work, we present a combined approach for ECG data compression and cryptography. The compression is performed using adaptive Huffman encoding and encrypting is done using AES (CBC) scheme with a 256-bit key. To increase the security, we include DiffieHellman Key exchange to authenticate the receiver, RSA key generation for encrypting and decrypting the data. Experimental results show that the proposed approach achieves better performance in terms of compression and encryption on MIT-BIH ECG dataset.
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...IRJET Journal
This document proposes a blockchain-based system to securely store and access medical reports. It describes a 3-part system: 1) Registration and authentication where patients register with unique IDs and doctors are authenticated. 2) Health data input where patient data like vitals are entered. 3) Encryption and storage where data is encrypted using blockchain crypto algorithms and stored on the blockchain with access only by authenticated doctors. The goal is to securely manage medical reports while ensuring privacy, security, and trust in the healthcare system.
IRJET - A Survey on Blockchain Technology for Electronic Health RecordIRJET Journal
This document discusses using blockchain technology to improve electronic health records (EHRs). It begins with an abstract that outlines the goals of using blockchain for EHRs, including improving healthcare efficiency and access while reducing costs. The document then provides background on EHRs and issues like data security, ownership and integrity. It proposes using blockchain to securely store and share medical records in a decentralized network. The document outlines several proposed blockchain applications for EHRs, including distributed storage of health data collected from IoT devices, and allowing patients more control over access to their records. It discusses challenges like scalability and interoperability, and concludes that blockchain technology has potential to help address current problems with EHR systems.
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
This document summarizes a research paper about securely hiding sensitive medical data using encryption. The paper proposes a system that distributes a patient's data across multiple encrypted data servers. It uses Paillier cryptosystems to allow statistical analysis of the encrypted patient data without compromising privacy. The system includes wireless medical sensors that monitor patients and transmit encrypted data to a database. It uses an access control system and statistical analysis protocols that employ Paillier encryption to allow authorized users like doctors to access and analyze the encrypted patient data without revealing its contents. The goal is to protect sensitive medical information from privacy breaches while still enabling useful analysis of aggregated patient data.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
This document discusses providing security for wireless medical sensor data. It first reviews related work on securing wireless medical sensor networks using cryptosystems like Paillier and ElGamal. It then proposes a system that uses these cryptosystems to encrypt and distribute patient data across multiple data servers. This would preserve patient privacy as long as no single server is compromised. The system aims to allow medical analysis of distributed encrypted data without revealing individual patient information.
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...IJECEIAES
Due to their use in daily life situation, demand for remote health applications and e-health monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy, information can be transferred from the patient to the distant clinic. Nowadays, the most chronic disease is cardiovascular diseases (CVDs). However, the storage and transmission of the ECG signal, consumes more energy, bandwidth and data security which is faced many challenges. Hence, in this work, we present a combined approach for ECG data compression and cryptography. The compression is performed using adaptive Huffman encoding and encrypting is done using AES (CBC) scheme with a 256-bit key. To increase the security, we include DiffieHellman Key exchange to authenticate the receiver, RSA key generation for encrypting and decrypting the data. Experimental results show that the proposed approach achieves better performance in terms of compression and encryption on MIT-BIH ECG dataset.
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
This document summarizes a research paper that proposes a system for remote healthcare monitoring of cardiovascular disease (CVD) using data mining techniques on compressed electrocardiogram (ECG) data. The system applies genetic algorithms for attribute selection and expectation-maximization clustering on compressed ECG data received from patient monitoring devices by a hospital server. This allows the server to generate classification constraints for different cardiac abnormalities. The patient's mobile phone then uses these constraints in a rule-based system to classify cardiac abnormalities in real-time directly from the compressed ECG data. When abnormalities are detected, emergency notifications can be automatically sent to the patient.
IRJET- Survey Paper on NFC based Data Retrieval IRJET Journal
This document summarizes a survey paper on NFC-based data retrieval. It provides an abstract that reviews recent advances in battery-less NFC sensors and compares other RFID technologies. It then discusses power transfer using NFC and recommendations for designing NFC tags and readers. The paper presents a list of commercial NFC ICs with energy harvesting capabilities and surveys the state of the art in NFC-based sensors. It demonstrates that a wide range of chemical and physical sensors can be used with NFC technology. The paper is particularly interested in wearable sensors and cold-chain traceability applications. It notes that low-cost NFC devices and inclusion of NFC readers in mobile phones make NFC key to developing green Io
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET Journal
This document proposes a Secure and Efficient Health Record Transaction algorithm (SEHRTB) using blockchain technology. The SEHRTB aims to securely store and transact health records between patients, doctors, hospitals, and insurance agents in a decentralized manner. It describes a system where patient health records are encrypted and stored on a distributed ledger. Only authorized parties like doctors and insurance agents can access the encrypted records after getting the necessary keys. The proposed SEHRTB algorithm is evaluated and shown to reduce latency, execution time, and improve throughput compared to existing methods. The system aims to provide privacy and security for health records transactions using blockchain.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
An efficient monitoring system for sports person using wi fi communicationeSAT Publishing House
This document summarizes an efficient monitoring system for athletes using Wi-Fi communication. It describes using sensors to monitor athletes' vital signs like blood pressure and movements wirelessly over Wi-Fi. The monitored values are displayed on an LCD screen. It aims to give coaches and medical staff access to athletes' sensor data to analyze performance and health while ensuring athlete privacy and consent for how their data is used.
An efficient monitoring system for sports person using wi fi communicationeSAT Journals
Abstract The data from athletes body-sensor devices that monitor personal metrics like heart-rate, weight, and movements are changing how athletes train and perform. Existing sport- analytic tools are, however, mostly monolithic proprietary systems where athletes have little control over how their data is used and managed over time. To monitor the sportsperson metrics and Blood pressure value in playground. Optimal solution by using Wi-Fi to monitor the human BP and movements changing human body with the help of the sensor The monitored values will be shown in a LCD display. Keywords –WiFi, girji, human bp, pic controller
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET Journal
This document proposes a remote heart rate variability (HRV) monitoring system for hypertensive patients using Internet of Things technology. The system uses a wireless zigbee-based pulse sensor to derive HRV parameters, which are indicators of cardiovascular risk. If emergency conditions are detected based on HRV parameters and heart rate, the system sends SMS alerts to caregivers and doctors for medical assistance. The system aims to track patients' conditions remotely without hospital visits and help doctors monitor treatment effectiveness. It combines zigbee and WiFi technologies to remotely and securely transmit sensor data to doctors in a low-cost and easy-to-use manner.
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
This document summarizes a research paper that proposes a cloud-based healthcare system for securely sharing medical data. It does the following:
1. It encrypts patient medical data using the NTRU encryption algorithm when transmitting it to nearby clouds for privacy.
2. It develops a trust model to help users select trustworthy partners to share stored medical data with in the cloud based on their similarity and compatibility.
3. It divides and encrypts users' medical data stored in the remote cloud into different categories to provide appropriate security protections.
4. It implements a deliberative intrusion detection system based on the cloud mesh structure to safeguard the large medical database in the remote cloud from malicious attacks.
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET Journal
This document proposes a new IoT-based advanced healthcare architecture with remote monitoring capabilities. The architecture includes new sensors for data collection, a fog computing layer for efficient storage and real-time analysis, and disease prediction and location tracking features. Sensors continuously generate large amounts of heterogeneous data that is analyzed using machine learning algorithms to predict health conditions. Doctors and authorized users can monitor patients' health data through a website or mobile application. The system aims to improve healthcare quality by enabling real-time remote health monitoring, analysis, and automatic control of home appliances based on patients' needs.
This document summarizes a research paper that proposes a new e-healthcare information system based on an Android application. The paper discusses limitations of existing systems including errors, lack of access to patient information, and delays. It proposes a new system using Android mobile devices, wearable sensors to monitor biometrics, machine-to-machine communication, and a service-oriented architecture. This would allow real-time sharing of patient data between doctors and patients regardless of location. It also discusses using evolutionary computing algorithms and multi-agent frameworks to optimize medical data quality and analysis in distributed environments. The proposed system aims to improve diagnosis, treatment decisions and access to healthcare.
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...ijait
Patient monitoring helps increasing the mortality by timely notification of exceeding vital signs. By using the vital sign data the critical care staff can make necessary life saving interventions. This requires the underlying network to be very robust so that timely and error free information flow can be guaranteed. Moreover there is a need for a cost effective and robust network technology for continuous and real- time vital signs monitoring in resource constraint settings in developing countries. In this paper we proposed a system of hospitals with interconnected intensive care units. Each intensive care unit employs Controller Area Network (CAN) as underlying technology for networking of bedside units. The data of these bedside units can be communicated with other hospital using higher level protocols such as Ethernet. This allow the hospital staff to share the health information of the patients with the specialized staff in another hospital to provide better cure to the patient and consequently can increase the mortality.
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
This document proposes a patient health monitoring system using medical sensors and encryption to protect sensitive patient data. Key points:
- Medical sensors would collect physiological data like heartbeat from patients and send it over wireless networks to be stored.
- The system would encrypt each patient's data with RSA before sending it to separate files on a server. Only authorized doctors and administrators could access the encrypted data.
- The proposal compares the encryption algorithms RSA and Pailier to analyze their time complexities for securing medical sensor data transmitted over wireless networks.
1) The document proposes a three-stage cryptographic model to securely transmit secret keys generated from a patient's ECG signal for authentication of implanted medical devices (IMDs).
2) In the first stage, a 128-bit secret key is generated from the patient's ECG signal and encrypted with it.
3) In the second stage, the encrypted ECG signal is hidden inside an image using steganography.
4) In the third stage, the image is watermarked for identification before transmission between the IMD and medical practitioner's system. This provides security against eavesdropping, spoofing, and avoids pre-sharing secret keys.
IRJET- Applications of Wireless Sensor Networks in Healthcare: An Overview of...IRJET Journal
This document discusses applications of wireless sensor networks in healthcare and related challenges. It describes how wireless sensor networks are being used for vital sign monitoring in hospitals, at-home and mobile health monitoring, and assistance with motor and sensory decline. Examples discussed include monitoring systems called CODEBLUE, HEALTHGEAR, and AMON. It also discusses an epilepsy monitoring smart clothing system called WEMU and a wearable health care system called WEALTHY. The document outlines challenges at the physical, MAC, network, transport and application layers and security threats involving confidentiality, integrity and availability. Physical layer challenges include bandwidth limitations while security threats include eavesdropping, traffic analysis and denial of service attacks.
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
This document discusses security issues in using mobile cloud computing for pervasive healthcare monitoring systems. It first introduces how mobile devices and cloud computing are being used to remotely monitor patient health metrics. However, transmitting sensitive patient data over networks poses security and privacy risks. The document then examines different approaches for securing such systems, including using encryption keys for authentication and communication protection between wireless sensor nodes, hospitals, and mobile apps. It also discusses challenges in securing data and devices across the various tiers of healthcare cloud and mobile computing architectures. Overall, the document analyzes how security can be improved for remote mobile healthcare monitoring systems that leverage cloud-based approaches.
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
This document summarizes a research paper that proposes a system for remote healthcare monitoring of cardiovascular disease (CVD) using data mining techniques on compressed electrocardiogram (ECG) data. The system applies genetic algorithms for attribute selection and expectation-maximization clustering on compressed ECG data received from patient monitoring devices by a hospital server. This allows the server to generate classification constraints for different cardiac abnormalities. The patient's mobile phone then uses these constraints in a rule-based system to classify cardiac abnormalities in real-time directly from the compressed ECG data. When abnormalities are detected, emergency notifications can be automatically sent to the patient.
IRJET- Survey Paper on NFC based Data Retrieval IRJET Journal
This document summarizes a survey paper on NFC-based data retrieval. It provides an abstract that reviews recent advances in battery-less NFC sensors and compares other RFID technologies. It then discusses power transfer using NFC and recommendations for designing NFC tags and readers. The paper presents a list of commercial NFC ICs with energy harvesting capabilities and surveys the state of the art in NFC-based sensors. It demonstrates that a wide range of chemical and physical sensors can be used with NFC technology. The paper is particularly interested in wearable sensors and cold-chain traceability applications. It notes that low-cost NFC devices and inclusion of NFC readers in mobile phones make NFC key to developing green Io
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET Journal
This document proposes a Secure and Efficient Health Record Transaction algorithm (SEHRTB) using blockchain technology. The SEHRTB aims to securely store and transact health records between patients, doctors, hospitals, and insurance agents in a decentralized manner. It describes a system where patient health records are encrypted and stored on a distributed ledger. Only authorized parties like doctors and insurance agents can access the encrypted records after getting the necessary keys. The proposed SEHRTB algorithm is evaluated and shown to reduce latency, execution time, and improve throughput compared to existing methods. The system aims to provide privacy and security for health records transactions using blockchain.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
An efficient monitoring system for sports person using wi fi communicationeSAT Publishing House
This document summarizes an efficient monitoring system for athletes using Wi-Fi communication. It describes using sensors to monitor athletes' vital signs like blood pressure and movements wirelessly over Wi-Fi. The monitored values are displayed on an LCD screen. It aims to give coaches and medical staff access to athletes' sensor data to analyze performance and health while ensuring athlete privacy and consent for how their data is used.
An efficient monitoring system for sports person using wi fi communicationeSAT Journals
Abstract The data from athletes body-sensor devices that monitor personal metrics like heart-rate, weight, and movements are changing how athletes train and perform. Existing sport- analytic tools are, however, mostly monolithic proprietary systems where athletes have little control over how their data is used and managed over time. To monitor the sportsperson metrics and Blood pressure value in playground. Optimal solution by using Wi-Fi to monitor the human BP and movements changing human body with the help of the sensor The monitored values will be shown in a LCD display. Keywords –WiFi, girji, human bp, pic controller
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET Journal
This document proposes a remote heart rate variability (HRV) monitoring system for hypertensive patients using Internet of Things technology. The system uses a wireless zigbee-based pulse sensor to derive HRV parameters, which are indicators of cardiovascular risk. If emergency conditions are detected based on HRV parameters and heart rate, the system sends SMS alerts to caregivers and doctors for medical assistance. The system aims to track patients' conditions remotely without hospital visits and help doctors monitor treatment effectiveness. It combines zigbee and WiFi technologies to remotely and securely transmit sensor data to doctors in a low-cost and easy-to-use manner.
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
This document summarizes a research paper that proposes a cloud-based healthcare system for securely sharing medical data. It does the following:
1. It encrypts patient medical data using the NTRU encryption algorithm when transmitting it to nearby clouds for privacy.
2. It develops a trust model to help users select trustworthy partners to share stored medical data with in the cloud based on their similarity and compatibility.
3. It divides and encrypts users' medical data stored in the remote cloud into different categories to provide appropriate security protections.
4. It implements a deliberative intrusion detection system based on the cloud mesh structure to safeguard the large medical database in the remote cloud from malicious attacks.
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET Journal
This document proposes a new IoT-based advanced healthcare architecture with remote monitoring capabilities. The architecture includes new sensors for data collection, a fog computing layer for efficient storage and real-time analysis, and disease prediction and location tracking features. Sensors continuously generate large amounts of heterogeneous data that is analyzed using machine learning algorithms to predict health conditions. Doctors and authorized users can monitor patients' health data through a website or mobile application. The system aims to improve healthcare quality by enabling real-time remote health monitoring, analysis, and automatic control of home appliances based on patients' needs.
This document summarizes a research paper that proposes a new e-healthcare information system based on an Android application. The paper discusses limitations of existing systems including errors, lack of access to patient information, and delays. It proposes a new system using Android mobile devices, wearable sensors to monitor biometrics, machine-to-machine communication, and a service-oriented architecture. This would allow real-time sharing of patient data between doctors and patients regardless of location. It also discusses using evolutionary computing algorithms and multi-agent frameworks to optimize medical data quality and analysis in distributed environments. The proposed system aims to improve diagnosis, treatment decisions and access to healthcare.
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...ijait
Patient monitoring helps increasing the mortality by timely notification of exceeding vital signs. By using the vital sign data the critical care staff can make necessary life saving interventions. This requires the underlying network to be very robust so that timely and error free information flow can be guaranteed. Moreover there is a need for a cost effective and robust network technology for continuous and real- time vital signs monitoring in resource constraint settings in developing countries. In this paper we proposed a system of hospitals with interconnected intensive care units. Each intensive care unit employs Controller Area Network (CAN) as underlying technology for networking of bedside units. The data of these bedside units can be communicated with other hospital using higher level protocols such as Ethernet. This allow the hospital staff to share the health information of the patients with the specialized staff in another hospital to provide better cure to the patient and consequently can increase the mortality.
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
This document proposes a patient health monitoring system using medical sensors and encryption to protect sensitive patient data. Key points:
- Medical sensors would collect physiological data like heartbeat from patients and send it over wireless networks to be stored.
- The system would encrypt each patient's data with RSA before sending it to separate files on a server. Only authorized doctors and administrators could access the encrypted data.
- The proposal compares the encryption algorithms RSA and Pailier to analyze their time complexities for securing medical sensor data transmitted over wireless networks.
1) The document proposes a three-stage cryptographic model to securely transmit secret keys generated from a patient's ECG signal for authentication of implanted medical devices (IMDs).
2) In the first stage, a 128-bit secret key is generated from the patient's ECG signal and encrypted with it.
3) In the second stage, the encrypted ECG signal is hidden inside an image using steganography.
4) In the third stage, the image is watermarked for identification before transmission between the IMD and medical practitioner's system. This provides security against eavesdropping, spoofing, and avoids pre-sharing secret keys.
IRJET- Applications of Wireless Sensor Networks in Healthcare: An Overview of...IRJET Journal
This document discusses applications of wireless sensor networks in healthcare and related challenges. It describes how wireless sensor networks are being used for vital sign monitoring in hospitals, at-home and mobile health monitoring, and assistance with motor and sensory decline. Examples discussed include monitoring systems called CODEBLUE, HEALTHGEAR, and AMON. It also discusses an epilepsy monitoring smart clothing system called WEMU and a wearable health care system called WEALTHY. The document outlines challenges at the physical, MAC, network, transport and application layers and security threats involving confidentiality, integrity and availability. Physical layer challenges include bandwidth limitations while security threats include eavesdropping, traffic analysis and denial of service attacks.
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
This document discusses security issues in using mobile cloud computing for pervasive healthcare monitoring systems. It first introduces how mobile devices and cloud computing are being used to remotely monitor patient health metrics. However, transmitting sensitive patient data over networks poses security and privacy risks. The document then examines different approaches for securing such systems, including using encryption keys for authentication and communication protection between wireless sensor nodes, hospitals, and mobile apps. It also discusses challenges in securing data and devices across the various tiers of healthcare cloud and mobile computing architectures. Overall, the document analyzes how security can be improved for remote mobile healthcare monitoring systems that leverage cloud-based approaches.
What is cloud computing? Cloud computing is the on-demand access of computing...jayasrid4
cloud computer -scientific applications of ecg analysis in cloud , example, solution, challanges, advantage, disadvantage ,Cloud computing systems meet the needs of different types of applications in the scientific domain: high- performance computing (HPC) applications, high-throughput computing (HTC) applications, and data-intensive applications
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
This document proposes a novel technique that combines encryption and digital watermarking to securely transmit medical images over public networks like the cloud. The algorithm divides images into regions of interest and non-interest, and embeds cryptographic watermarks and patient data in the non-interest regions before transmission. At the receiver end, the watermarks and data can be extracted to authenticate the image and verify that it has not been tampered with. The algorithm was tested on medical images and provided security, integrity and authenticity of transmitted medical information.
This document proposes an e-health cloud solution to securely store patient health records and reports in the cloud. Previously, patient documents were stored physically taking up space and making it difficult to access old records. The cloud solution aims to address these issues by digitizing records and storing them securely in the cloud. This allows easy access to records from anywhere and saves space. The document discusses challenges with healthcare cloud computing like data security and privacy. It proposes using encryption and multi-factor authentication for cloud data and user access security.
Private & Secure Data Tx Presentation I (1).pptxKomal526846
This document proposes a system for securely transmitting private medical data using QR codes and cloud computing. It involves developing an Android and web application that allows users to register and login to store their personal medical records and generate a QR code. When scanned, the QR code would provide access to the encrypted medical records stored in the cloud. The goals are to use QR codes to store medical records privately, reduce time in hospitals by accessing records quickly, and encrypt records for security using cryptographic techniques like AES and MD5. The system architecture and hardware/software requirements are also outlined.
A Healthcare Monitoring System Using Wifi ModuleIRJET Journal
This document presents a healthcare monitoring system using WiFi modules. The system uses sensors like a temperature sensor and heart rate sensor connected to an Arduino microcontroller to monitor patients' vital signs. The sensor data is sent wirelessly to a monitoring center using a WiFi module. Doctors can access the continuously recorded medical data to diagnose patients remotely. The system aims to provide constant monitoring without confining patients to beds and reduce human errors in manual data logging. It allows for broader use among patients, medical professionals and in rural areas with limited access to healthcare.
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...IRJET Journal
This document summarizes a research paper that proposes a system for remotely monitoring patients at home using sensors, a smartphone, and cloud storage. The system uses sensors connected to an Arduino board to measure patients' temperature, blood pressure, and heart rate. The sensor readings are sent to a smartphone via Bluetooth and then stored securely in the cloud. If emergency readings are detected, an alert message is automatically sent to the patient's doctor with their location to enable immediate medical response. The system aims to facilitate remote patient monitoring without human interaction using an approach called SPOC that securely shares resources between devices to process medical data in emergencies.
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
Picture Archiving and Communication Systems (PACS) – A New Paradigm in Health...Apollo Hospitals
Digitization and transfer of images in Radiodiagnosis and Imaging dates back to to early 70s with the advent of Computerized Tomography Scanning, and, subsequently sending these images to cameras and printers hooked on to the machines through a local “network”. Rapid advancements in Information Technology (IT) as well as in the imaging technology have facilitated the healthcare organizations across the world to manage patient's images, records and other data more efficiently. Today, capturing images, archiving and retrieval have already reached great heights, and, further refinements are in progress. The infrastructural requirements for such a venture have to be very finely and judiciously planned well in advance with a view to go filmless as the ultimate objective. Involvement of all concerned and connected agencies is a must e.g. IT, Radiologists, Clinicians and the Vendors.
IRJET- Secured Mind Uploading Method in Wireless Body Area NetworkIRJET Journal
This document summarizes a research paper that proposes a secured method for uploading a user's mind or critical data to the cloud after they lose consciousness or pass away. The key points are:
1. It uses wireless body area network (WBAN) sensors to monitor the user's heartbeat and activity to determine if they are dead or in a coma state.
2. An elliptical curve cryptography (ECC) method is used to encrypt the critical user data before uploading it to the cloud, providing security and allowing only authorized access.
3. The ECC method uses smaller encryption keys compared to other techniques, making it faster and more efficient for uploading biological data from the WBAN sensors.
ELECTRONIC HEALTH RECORD SYSTEM BY ADOPTING BLOCKCHAINIRJET Journal
This document summarizes a research paper that proposes the development of an electronic health record (EHR) system using blockchain technology. The system would allow patients to securely share their health data with multiple healthcare providers. Key points:
1. Current paper-based health records have limitations and risks, especially during the COVID-19 pandemic.
2. The proposed EHR system using blockchain would address these issues by providing secure, digital storage and sharing of patient health information.
3. The system would use Hyperledger Fabric framework and include registration of patients, doctors, and an admin interface to upload health documents.
Design of Interface Board for Medical Kiosk Based on Off-The-Shelf PlatformIRJET Journal
This document describes the design of an interface board for a medical kiosk that integrates different commercial off-the-shelf medical modules. The interface board combines measurement results from modules that measure vital signs like blood oxygen saturation, blood pressure, blood glucose, temperature, etc. and transfers the data via a kiosk application to cloud software. The interface board hardware design integrates modules using an ARM microcontroller. The firmware collects data from each module via drivers and sends it to a PC application through a graphical user interface. The design was tested by measuring various health parameters of a subject to validate the integrated system.
Leveraging Cloud Computing for ECG Analysis.pptxvarshaJujare1
The document discusses leveraging cloud computing for electrocardiogram (ECG) analysis by collecting and storing ECG data in the cloud, processing and analyzing it using cloud resources, and enabling real-time monitoring of patients' heart activity and alerts to doctors. Some advantages of the cloud-based approach include scalability, cost efficiency, accessibility, advanced computing power, and real-time monitoring capabilities, though security, privacy, and vendor dependency are potential disadvantages. The conclusion is that cloud computing has potential to revolutionize cardiac care through ECG analysis but privacy, compliance, and data issues still need to be addressed.
Implementation Of Real Time IoT Based Health monitoring systemkchakrireddy
The main aim of this project is to interconnect the available medical resources and offer smart, reliable, and effective healthcare service to elderly people. Health monitoring for active and assisted living is one of the paradigms that can use the IOT advantages to improve the elderly lifestyle in this project we present an IOT architecture customized for healthcare applications. The proposed architecture collects the data and relays it to the cloud where it is processed and analyzed. Feedback actions based on the analyzed data can be sent back to the user.
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Qadri et Al., en su trabajo “The Future of Healthcare Internet of Things (H-IoT): A Survey of Emerging Technologies” propone como uno de los desafíos del H-IoT:
Monitoreo de Desórdenes neurológicos
Ambient Assisted Living (AAL)
Fitness Tracking
Uso de técnicas de Big Data
Uso de Edge Computing
Internet of Nano-Things
Intelligent data analysis for medicinal diagnosisIRJET Journal
The document describes a proposed privacy-preserving patient-centric clinical decision support system called PPCD that uses naive Bayesian classification to help doctors predict disease risks for patients in a privacy-preserving manner. PPCD allows medical diagnosis and prediction of disease risks for new patients without leaking any individual patient medical information. It utilizes historical medical information from past patients, stored privately in the cloud, to train a naive Bayesian classifier. This trained classifier can then be used to diagnose diseases for new patients based on their symptoms while preserving privacy. The system also introduces a new aggregation technique called additive homomorphic proxy aggregation to allow training of the naive Bayesian classifier without revealing individual patient medical records.
Similar to Computers in medicine (revised) 2 (1) (20)
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondHealth Catalyst
Join us as we delve into the crucial realm of quality reporting for MSSP (Medicare Shared Savings Program) Accountable Care Organizations (ACOs).
In this session, we will explore how a robust quality management solution can empower your organization to meet regulatory requirements and improve processes for MIPS reporting and internal quality programs. Learn how our MeasureAble application enables compliance and fosters continuous improvement.
MBC Support Group for Black Women – Insights in Genetic Testing.pdfbkling
Christina Spears, breast cancer genetic counselor at the Ohio State University Comprehensive Cancer Center, joined us for the MBC Support Group for Black Women to discuss the importance of genetic testing in communities of color and answer pressing questions.
This particular slides consist of- what is hypotension,what are it's causes and it's effect on body, risk factors, symptoms,complications, diagnosis and role of physiotherapy in it.
This slide is very helpful for physiotherapy students and also for other medical and healthcare students.
Here is the summary of hypotension:
Hypotension, or low blood pressure, is when the pressure of blood circulating in the body is lower than normal or expected. It's only a problem if it negatively impacts the body and causes symptoms. Normal blood pressure is usually between 90/60 mmHg and 120/80 mmHg, but pressures below 90/60 are generally considered hypotensive.
Michigan HealthTech Market Map 2024. Includes 7 categories: Policy Makers, Academic Innovation Centers, Digital Health Providers, Healthcare Providers, Payers / Insurance, Device Companies, Life Science Companies, Innovation Accelerators. Developed by the Michigan-Israel Business Accelerator
PET CT beginners Guide covers some of the underrepresented topics in PET CTMiadAlsulami
This lecture briefly covers some of the underrepresented topics in Molecular imaging with cases , such as:
- Primary pleural tumors and pleural metastases.
- Distinguishing between MPM and Talc Pleurodesis.
- Urological tumors.
- The role of FDG PET in NET.
Healthy Eating Habits:
Understanding Nutrition Labels: Teaches how to read and interpret food labels, focusing on serving sizes, calorie intake, and nutrients to limit or include.
Tips for Healthy Eating: Offers practical advice such as incorporating a variety of foods, practicing moderation, staying hydrated, and eating mindfully.
Benefits of Regular Exercise:
Physical Benefits: Discusses how exercise aids in weight management, muscle and bone health, cardiovascular health, and flexibility.
Mental Benefits: Explains the psychological advantages, including stress reduction, improved mood, and better sleep.
Tips for Staying Active:
Encourages consistency, variety in exercises, setting realistic goals, and finding enjoyable activities to maintain motivation.
Maintaining a Balanced Lifestyle:
Integrating Nutrition and Exercise: Suggests meal planning and incorporating physical activity into daily routines.
Monitoring Progress: Recommends tracking food intake and exercise, regular health check-ups, and provides tips for achieving balance, such as getting sufficient sleep, managing stress, and staying socially active.
Cold Sores: Causes, Treatments, and Prevention Strategies | The Lifesciences ...The Lifesciences Magazine
Cold Sores, medically known as herpes labialis, are caused by the herpes simplex virus (HSV). HSV-1 is primarily responsible for cold sores, although HSV-2 can also contribute in some cases.
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)blessyjannu21
Neurological system includes brain and spinal cord. It plays an important role in functioning of our body. Encephalitis is the inflammation of the brain. Causes include viral infections, infections from insect bites or an autoimmune reaction that affects the brain. It can be life-threatening or cause long-term complications. Treatment varies, but most people require hospitalization so they can receive intensive treatment, including life support.
Gemma Wean- Nutritional solution for Artemiasmuskaan0008
GEMMA Wean is a high end larval co-feeding and weaning diet aimed at Artemia optimisation and is fortified with a high level of proteins and phospholipids. GEMMA Wean provides the early weaned juveniles with dedicated fish nutrition and is an ideal follow on from GEMMA Micro or Artemia.
GEMMA Wean has an optimised nutritional balance and physical quality so that it flows more freely and spreads readily on the water surface. The balance of phospholipid classes to- gether with the production technology based on a low temperature extrusion process improve the physical aspect of the pellets while still retaining the high phospholipid content.
GEMMA Wean is available in 0.1mm, 0.2mm and 0.3mm. There is also a 0.5mm micro-pellet, GEMMA Wean Diamond, which covers the early nursery stage from post-weaning to pre-growing.
Under Pressure : Kenneth Kruk's StrategyKenneth Kruk
Kenneth Kruk's story of transforming challenges into opportunities by leading successful medical record transitions and bridging scientific knowledge gaps during COVID-19.
About this webinar: This talk will introduce what cancer rehabilitation is, where it fits into the cancer trajectory, and who can benefit from it. In addition, the current landscape of cancer rehabilitation in Canada will be discussed and the need for advocacy to increase access to this essential component of cancer care.
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...nirahealhty
The South Beach Coffee Java Diet is a variation of the popular South Beach Diet, which was developed by cardiologist Dr. Arthur Agatston. The original South Beach Diet focuses on consuming lean proteins, healthy fats, and low-glycemic index carbohydrates. The South Beach Coffee Java Diet adds the element of coffee, specifically caffeine, to enhance weight loss and improve energy levels.
1. COMPUTERS IN HEALTH-CARE INFORMATICS – Smart Card Applications in
Telemedicine
by
Dr. A. Mukherji
Emeritus Professor, Dept. of Electrical Engineering, Academy of Technology
Synopsis
Much has been written and discussed in this country about the effect of Telemedicine in Health-Care Delivery, especially
over the last two years, and many protocols and projects identified in the process. In the meanwhile, there has been a
paradigm shift, with Medical Diagnoses being more and more outsourced from Western countries to India rather than the
other way around. The wheel of Medical Informatics, it seems, has turned a full circle-and the remorseless process of
BPO apparently is affecting this area also. It is in this context, we are proposing the introduction of a new technology,
which could be the next step in Telemedicine: smart-card based storage of medical information – and data – in a
condensed and encrypted form, but retrievable any personal computer. Thus, the need for specialized systems could
disappear leading to an open system, ideally suited for easy encoding, analysis, storage, transmission and retrieval. The
significance of this project is that both the hardware and the software have been developed indigenously, and thus could
have wider ramifications than Medical Informatics alone(e.g. personal data encryption, secure e-commerce, universal
identification/medical card, etc.). In another sense, it is a firmware carry-over of the A.N.A.H.I.T.A. protocol presented in
an earlier conference, and could form the foundation for a new Indian standard in this field.
1. Introduction
Some years have passed since the first Conference on Telemedicine was held in Sikkim, as part of the ICMR-
WHO Workshop on Accessing information in Medicine, in which the author had presented a glimpse of a
standardization system we were working on at that time, under the generic name of the “A.N.A.H.I.T.A.”
protocol (Acquisition & Networking Algorithms for Health Information Transmission & Archiving). This had
to do with acquisition and pre-processing of medical text, data, images and waveforms, followed by near loss-
less compression for transmission and reception on the Internet. Since then, many developments technologically
have taken place the world over, with increasing emphasis being placed on (i) storage and correlating multi-
modal data in hospital computers in a secure manner for physicians and administrators,(ii) interfacing medical
equipment directly with the Internet, for data-transmission and fault-finding, and (iii) compressing and
encrypting medical data, with the principle aim of storing on universally readable smart-cards. Shorn of
technical jargon, the present paper addresses the third problem, taking into account the importance being
attached by the Government and the Medical profession alike, in making available unique smart-cards available
to all citizens in the future for multivariate information to be stored and retrieved in a secure and efficient
manner. The technology for this has already arrived on the scene in commercial fields : it is now to be seen how
it could be harnessed in the field of medical informatics for health-care delivery.
2. Review of the ANAHITA Protocol
ACQUISITION & NETWORKING ALGORITHMS for HEALTH-CARE INFORMATION
TRANSFERRENCE & ARCHIVING
The project is a culmination of multi-modal Health Care Information and Analysis Modules.
The Object is to have an integrated, secured and web-based transmission of patient data system which could be
communicated for expert opinion, life-saving decision making, and collaborative health research, in near real-
time, and with minimum storage/software overheads.
The integrated modules will allow hospitals/ health care units to have patient’s clinical information on
electronic records, which will be efficiently compressed, securely managed, and easily accessible to authorized
users, who can store it securely in their own VPNs (Virtual Private Networks).
2. -2-
The software so designed is to be Hardware and Operating System “independent”, which makes Java the
obvious choice of an universal platform.
A. This integrated module currently developed consists of the following:
• Patient’s Personal Information
• Patient’s Medical History
• Patient’s Pathological Record
• Patient’s Medical Images ( X - Ray, CT-Scan, Ultra Sound, MRI) etc.
• Patient’s ECG up to 12 Leads
B. The Software system will also provide the following analysis capabilities:
• Medical Image Analysis for better detection of the abnormalities.
• ECG Arrhythmia Analysis to detect abnormalities of the heart’s functioning
• Data-acquisition system modalities, from medical equipment
C. Filtering and enhancement of the raw Medical Data:
• Images to be enhanced for better visualization from the Radiologists’ console (incl. colouring)
• ECG signal filtering to reduce errors in the wave form; to add in future ECG analyses algorithms
D. Single module and Loss- Less Compression of the Entire Data Files:
• A proprietary, secured and compressed file will include the entire data
Overall Status of the Research:
The project is currently at a very advanced stage. All of the above except for the ECG analysis is successfully
implemented, and can be demonstrated as required.
The compression algorithm is already completed for all except for Medical
Images. So far we have been able to compress the data to a remarkable 86%.
The software development work for the same on Medical images is in progress.
A web-centric front end of some of the results are provided for reference;
compressed data files demonstrating loss-less compression may be provided when required.
While the basic research work has been successfully completed till date, implementation of data-
acquisition, presentation & packaging is in progress, including incorporation into indigenously developed
smart-card read/write facilities , described in Section 3 & 4 below.
This is being set to parallel testing on different hardware, and operating systems. Testing was performed on
Linux, and Windows Operating systems with diverse Web browsers on Unix Workstations, PCs and a portable
notebook computer.
Leads I, II, and III of ECG data has been compressed to :
Test1.crf [3.2 KB] , which is the multi-modal Patient Data File with a proprietary extension “.crf” which means
Clinical Record File”
3. The Web- centric front end was designed keeping in mind a Net -communicable stand-alone version, as well as
extensible full-fledged enterprise version. This is currently being integrated and packaged with the back-end. A
sample “snapshot” of 12-lead ECG from a Holter recording is shown below in Figure-1; the actual memory
occupied is 81KB. Similarly, the CT-scan of the bony tissue shown in Figure -2 occupies 148 KB of memory,
and would normally require image compression.
-3-
FIGURE-1 A DIGITIZED 12-LEAD ECG RECORDING
CRF -ECG Application :
This is a universal gateway Medical ECG application which is aimed at serving as an unified container for ECG
waveforms, including Holter or similar long term examination based records.This application serves as a proof
of a concept to demonstrate digital data archiving, visualization, analysis and compression.
In order to achieve the most neutral data structure, the application assumes as retrieved data to be in ASCII (X-
Y i.e. frequency/amplitude) format. Several ECG equipment suppliers provide the computer interface of their
data in their own proprietary equipment. However, the study reveals that the data culture adopted in this
application serves the most neutral format and the application can be integrated with any vendors hardware with
an added ADC interface that converts analogue signals into the accepatable (frequency/amplitude) mode,
mimicking a standard ECG strip-chart recording.
This application is Java based, as mentioned, and thus truly implementable in any Operating System.
On Screen Fundamentals:
4. The application supports ECG analysis whereby one can analyze a single lead waveform at a time. One needs
to double click and the entire ECG strip would pop-up in a separate window, and then again double-clicking on
the mouse to analyze the ECG record. Data of all 12 leads is archived into a single proprietary format ( .ecg),
for security.
-4-
FIGURE-2
A DIGITAL (CT)
SCAN OF BONY
TISSUE
The Pathological
slide of the Lung
Biopsy shown
digitized in Figure-3 occupies 160 KB and the Pulmonary function test-report for the same patient, requiring
181 KB memory, is shown in Figure-4.
5. FIGURE – 3 PATHOLOGICAL SLIDE OF A LUNG BIOPSY
-5-
FIGURE -4 PULMONARY FUNCTION ANALYSIS
3. All about Smart Cards
Microprocessor-based embedded Smart cards provide an acceptable method for authenticating devices,
identifying users, their preferences, and keeping records. Any e-commerce transaction requires privacy,
integrity, authenticity verification and non-repudiation, which are of vital importance in various types of
secure transactions over the Internet. With encryption and/or Biometrics (highlighted in Section 6 below), e-
commerce users can use smart cards with more confidence.
Although credit and debit cards look more or less like smart cards in size and shape, these are not smart cards,
which, according to the definition by International Standard Organization, is a plastic strip with a printed and
6. integrated circuit – a chip with a tiny computer embedded in it that includes a memory as well as a processor.
Technically, a smart card is called a “chip card” and also an IC card. The operating system used on this tiny
embedded computer is called a Card Operating System. This COS is very reliable in providing network
security, data and transaction security.
The input/output of data from and to the smart card is made through card readers which are also called Card
Acceptance Devices or Interface Device (see Section 4 below). The card-readers are divided into different
categories according to the type of the card needed to be read, the various functions it can offer, the applications
carried out and the various PC ports. Smart cards may be contact-based or contact-less. When contact-based
cards are inserted into a smart card reader, the data transmission takes place through physical contact points on
the gold-plated surface of the card. Contact-less cards can work without direct physical contact although these
demand a close proximity to the card reader. The contact is made through antenna using Radio Frequency.
There are also combination reader-writers that can read both contact-based and contact-less cards.
Most contact-less cards obtain their power source from the electromagnetic field that sets up the contact.
Alternatively, the card is normally kept in a container, which has both battery and antenna (a clumsy solution).
Another alternative is that the card itself has an embedded battery. Smart card batteries are very tiny, no thicker
than the card or, to be precise, a fraction of a millimeter for a three-volt rechargeable battery. For some
applications, the batteries have to withstand sub-zero temperatures to more than 100° C.
The USA is planning to introduce smart cards in passports that will contain chips in the covers which will hold
facial and fingerprint recognition data for biometrics, and some other personal information. Similarly, e-visa
has also been planned in many countries. The market is growing. Gartner Dataquest predicts the global smart
card market will reach 1.16 billion units in 2004. At an average cost of seven dollars a unit at present, the
market is estimated at $ 8 billion, though the prices of both smart-cards as well as card-readers will fall
drastically once they become industry standards for PCs, and widely acceptable to users, Government agencies,
and commercial organizations.
-6-
A basic smart card standard follows ISO 7816 specification (described later in Section 5) but other standards are
emerging with modified features. Philips has brought out a Non Field Communication-based Bluetooth enabled
contact-less smart cards with a data transfer rate of 1 Mbit/sec over a distance of 20 cm while the usual rate is
about 200 Kbit/sec. An entirely different range of smart cards is being experimented with for moving vehicles
and products in an assembly line, which may work at a distance of several metres. Contact-less smart card
readers must additionally adhere to the ISO standard 14443 (10 cm distance between reader and smart card) or
ISO 15693 (150 cm distance between reader and smart card).
On the basis of computing capability, contact-based cards are of two types: memory card and processor card.
Memory cards can store a large volume of data related to critical information like Biometric identification of a
person, driving license number, personal index number used at ATMs, credit card number, digital signature key
and related algorithm. Processor cards contain both memory and processor, and other features. An indegenous
Smart Card/Reader system is shown below in Figure-5 below, as developed by the ASPECT technology group
(cf. Section 4).
7. FIGURE-5 The ASPECT Smart-Card Reader/Writer System
A modern technology is the Java card technology, which is platform independent. These Java cards are more
versatile compared to the other smart cards. The typical Java card contains 16 KB of Read Only Memory, 8 KB
of Electrically Erasable Programmable ROM and 256 KB of Random Access Memory. It can load programmes
so Java cards also offer compatibility to run different third-party applications that also satisfy ISO norms. Other
manufacturers have come out with 1 MB smart-cards, though in India cards up to 256 KB memory only are
available at present.
Thus, smart cards are gradually expected to replace typical credit cards that have limited use. A smart card may
contain a database which is upgradeable and as a result, a mammoth distributed database can be handled to
reduce network traffic and processing overhead on the main computer, especially using VPN (Virtual Private
Network). The price of a chip is also falling, making smart cards cost-effective and affordable. In fact, credit
and debit cards of the future will actually be smart cards. But although smart cards do provide a more secure
transaction, hacking in cyberspace cannot be fully ruled out, unless Biometrics is incorporated (as shown in
Section 6).
The importance of the advent of Smart Card technology in India can be gauged from the fact that the
Department of Information Technology of the ITC Ministry, Govt. of India sponsored the 6th
Smart Cards Expo
in Delhi early September 2004, in which some hundred national and international organizations participated.
Part of the current work depends on the latest technologies show-cased at the Expo preceding this Conference.
At the same time, embedded-chip technology has taken such a giant leap forward, that 128MB micro-cards,
with concomitant readable attachments on PCI-MC slots of Desktop PCs (and most Laptops) are becoming
commonplace at increasingly affordable prices (in the order of Rs 1000-2000). Considering the fact that
-7-
digitized medical images (radiography as well as pathology slides) require approximately 200-400 KB of data
memory per frame –without compression – and 12-lead electrocardiography of 4 sec duration requires a mere
12-48 KB nominally, it is technically feasible to store abundant biomedical data on both smart-cards as well as
micro-cards even without compression; the text part of the patient-data, in the form of clinical observation,
identity, even graphical inputs like Pulmonary function tests or Stress-tests, occupy comparable memory space.
With encryption and compression, it should be possible to store Biomedical, Biometric, and
personal/commercial information in the same card, in a short time.
In theory, it should be possible to encrypt even banking/financial information in a 512 KB Smart card, (and
possibly even obviate the need for voting cards and driving licenses in the future), also making medical
diagnostic and billing possible via the same media as the medical data card, using e-commerce protocols. All
that is left then, in theory, is to have access to low-cost read/write card-readers, on the one hand, and universally
acceptable standards, on the other, for Medial Smart Cards to become a universal reality, in the same sense as
floppy-discs, CD-ROMs, ZIP-drives, or DVDs.
8. 4. The ASPECT technology
A few years back, a small group of computer professionals from Kolkata precisely achieved this. The acronym,
standing for ‘A Smart Product Ensemble for Commencing Trends’, was meant originally as a pre-cursor to
an universal system- not originally meant for medical applications in particular – but aimed at employee-ID,
club-membership, tourist-related, salary or wage card, cash-card, banking and customer-service. Health/Medical
insurance was an additional benefit, but in the long run, it is likely to prove the most important of all the
applications, given adequate memory capacity: after all, health and medical data are a necessary and universal
requirement, while all other applications are optional, secondary, or could be subsumed into a Smart Card
which has enough memory to hold the rest of information. The schematic diagram of the
Telemedicine/Internet/Smart-Card interface is shown in Figure-5 below, and the general characteristics of the
ASPECT system is given in Figure-6. From the point of view of Medical Technology, what is of importance to
note is that (a) the card reader-writer systems can be miniaturized; (b) they can transfer data through a standard
bus; and hence, (c) in principle, it could be embedded into the main-frame of a standard desk-top Personal
Computer, at low cost and complexity, by removing the exteriors, power-supplies, wiring etc.
This is especially applicable for ASM-19 type Smart-Card reader-writer, shown in Figure- 7. Thus, one can
foresee such a simple indigenous technology to become a standard part of any Hospital Computer – and in the
future, hopefully for any PC, given the availability of Smart Cards of sufficiently high memory and low cost.
Enhancement into Lap-top & Palm-top PCs will have to wait for necessary miniaturization of the mechatronics.
FIGURE 6 : TELEMEDICINE – SMART CARD INTERFACE
MEDICAL
INSTRUMENTATION
DATA
ACQUISITION
SYSTEM
HOSPITAL
COMPUTER
NETWORK
P
A
T
I
E
N
T
REMOTE
PHYSICIAN’S
P C
D
I
A
G
N
O
S
I
S
FEEDBACK
TO
PATIENT
I
N
T
E
R
N
E
T
ENCRYPTION
AND
COMPRESSION
DECRYPTION AND
DECOMPRESSION
SMART CARD WRITER /READER
ANY
P C
9. FIGURE – 7 COMMON USAGES OF SMART CARD TECHNOLOGIES
Some Smart-Card reader-writer applications, comprising of hand-held, wall-mounted, desk-top and miniature
systems is given in Figure-7 below.
11. -10-
5. A brief note ISO-7816 Smart-Card Standards
ISO 7816-1 (Part1): this deals with Physical Charcteristics of Integrated Circuit Cards
This part describes the physical charcteristics of integrated circuit cards. It includes accomodation of exposure
limits for a number of electromagnetic phenomena such as X-rays, UV light, elacromagnetic fields, static
electrical fields, and ambient temperature of the card.
Furthermore ISO 7816-1 defines the characteristics of a card when it is bent or flexed. This is to make sure that
plastic cards with embedded chips are manufactured in a way that guarantees flawless operation over the
expected life time of a card. Connections between the surface connectors and the I/O pins of the embedded
silicon die must be maintained and withstand mechanical stress. Bending and flexing procedures are
standardized in ISO 7816.
This part of ISO 7816 is important for card manufacturers. They are the ones that choose the materials and
establish a process that embeds the integrated circuit into the card.
ISO 7816-2 (Part 2): This deals with Dimensions and Location of the Contacts
ISO 7816 part 2 defines the dimensions and location of the contacts. This part includes standards about number,
function and position of the electrical contacts.
The integrated circuit card (ICC) has 8 electrical contacts. They are referred to as C1 through C8. However, not
all 8 contacts are electrically connected to the embedded microprocessor chip and therefore unused at the
present time.
Some smart cards issued before 1990 were adherent to a different standard for the contact location and therefore
can't be used with today's ISO7816-2 compliant smart card readers. These cards were deployed primarily in
Europe.
ISO 7816-3 (Part 3): This deals with Electronic Signals and Transmission Protocols
This part describes electronic signals and transmission protocols of integrated circuit cards, and is a version that
is available on the Internet. If you need the official version of this part, please contact ISO in Switzerland.
Most of ISO 7816- 3 is important for reader manufacturers or developers who want to establish a
communication with a smart card on a very low level, the signal level. Going through ISO 7816-3 one can see
what's involved in writing one’s own I/O software. This can be either to communicate from a micro-controller
or a PC's serial/parallel/USB/PCMCIA port. Even if one does not intend to go that far, it is interesting to read
about what one can get out of an Answer to Reset (ATR).
There are many tools out there to read an ATR. Even on the Smart Card Web- site
http://www.cardwerk.com/smartcards/smartcard_standard_ISO7816-1.aspx, a remote version of a free ATR
probing tool is available, that reads and interprets an ATR over the Internet. All one need is a PCSC compliant
Smart Card reader attached to a PC with an Internet connection.
6. Biometric Applications of Smart Cards
Once a Smart-Card reader-writer system is in place, the next important application is an universal identity-card
incorporating Biometrics : a personal data format that incorporates one or more salient features of the user, if
required in a compressed and/or encrypted format. This could encompass one or more of such pictorial features
as a photograph /fingerprint, and auditory features like speech-recording & voice-print, though some
commercial applications prefer an image of the iris (blood-vessel connections of the retina) as the preferred
mode.
12. -11-
In all cases, these constitute unique features of the user, which cannot be duplicated. A typical photograph, as
shown in the Figure 8 (A) below in JPEG format, requires about 49KB of memory, while the finger-print next
to it (B) requires about 44KB, in an uncompressed mode. Both of these could be stored and analyzed using
optical pattern recognition algorithms.
(A) (B) (C)
(D)
Figure 9. Photograph, fingerprint speech-file and voice-print samples storable in a Smart-card (137 KB
total). Double-click the mouse on the speaker symbol over (C) to hear the name as recorded speech.
Similarly, a voice signal recording of the user, as shown by the media-player symbol alongside (in C ) in
hypertext-mode - and playable simply by clicking a mouse over it in the soft copy of this file - is about 2.8 sec
signal length in 8-bit PCM mode, sampled at 15K/sec to create a 44KB wave (.wav) file. This can be stored in
the card and later compared with the microphone output connected to the PC when the genuine user repeats the
phrase (in this case, his own name), using standard pattern-recognition techniques. Alternatively, a voice-print
could be created of the wave-file (as shown in D) using a standard software such as Sound Forge, and this
could be the Biometric template for the user. A combination file of all these formats can virtually ensure total
security for any person, with a reasonable amount of digital memory requirement and software overhead even
in an uncompressed mode, especially with the availability of 256KB and 512 KB embedded-chip memory
smart-cards in a short time.
13. -12-
The applications of the above paradigms are limitless : a one-card identification solution for all requirements of
a citizen – from banking to marketing, from e-commerce to e-governance, from taxation to voting. In
particular, it could circumvent problems, costs and logistics involved in the election processes ( local, state or
central), as the user can use it to any PC in the country– or for the matter in the world – through the Internet,
once the built-in card-reader becomes an universally accepted storage device. Personal information can be
added and accessed in text-form for availability on the Net, once the Biometric security barrier has been
successfully overcome.
7. Concluding remarks
So far, Telemedicine technology has been groping for paradigms and solutions for the future, in the expectation
that some form of universally acceptable encoding, encryption, storage/retrieval and transmission system could
be achieved acceptable to all – physicians, hospital administrators, and computer specialists alike. With the kind
of Smart-Card technology described above, the fourth – and equally important – aspect of the problem has been
attempted to be addressed, namely, patient (or user) acceptability and user confidence regarding security and
reliability. The next step, logically, would be to have an integrated protocol to seamlessly integrate Smart Card
and Internet technologies, both for Medical as well as identification usages.
The fact that the technologies presented here have been indigenously developed and affordable, make it an
excellent candidate for real-life applications in the field of Computer applications in Medicine, as well as a
secure all-purpose citizen’s ID card. What is required, during the course of the next few years, is the integration
of three variables : availability or manufacturing of standard card reader-writers using the ASPECT technology
– which can be retro-fitted into all PCs; large memory, low-cost Smart-Cards using embedded chip technology
(e.g. ATMEL); and secure encrypted software like the ANAHITA protocol - goals which are clearly visible
over the horizon.
REFERENCES
1) Critical-care Monitoring (by the author) : The Journal of Gen. Medicine, Vol.8, No.1, Oct-
Dec 1995).
2) You and the Computer : how it could change your life - and that of your
patients Part I (by the author): The Journal of General Medicine, Vol.8, No.2, Jan-Feb 1996.
3) Telemedicine and Hospital Computerization (presentation by the author) :W.H.O.-I.C.M.R.
Workshop on Accessing Medical Informatics (Sikkim-Manipal Institute of Medical Sciences, Sept.
2002).
4) Computers in Medicine – the road ahead in India (presentation by the author): National Conference
on Medical Informatics and C.M.E. on Hospital Management (held at Mahatma Gandhi Institute of
Medical Sciences, Sevagram, Wardha, Sept. 2004).
5) Computers in Medicine – application of Smart-card Technology (by the author): Annual
Conference of the Biomedical Engineering Society of India (held at GITAM Institute of
Technology, Vishakhapatnam, India, Dec.2004)
ACKNOWLEDGEMENTS
The author wishes to acknowledge with thanks the following persons whose research & development work and
assistance has gone into preparing this document :
1. Mr. Kishore Bhattacharyya and colleagues, ASPECT Group, Kolkata, for the smart-card reader-writers
2. Mr. Indrajit Saha of R.M. Sales, Kolkata, for donating the ATMEL smart-card samples & data-sheets
3. Mr. Ranjit Rangan & Mr. Sunil Aggarwal, EVENTS Technologies, Pune, for the Telemedicine protocols
4. Prof. Arun Samaddar, Director, Pailan College of Management & Technology, WB, for parts of the text.
(The author is an Electronics & Control Systems Engineer (I.I.T-Kgp/I.I.T.-B’ba)y, a first-generation Biomedical
Engineer (I.I.T.Madras 1972-75), former Commonwealth Scholar in the U.K .- where he obtained his Ph.D. in Medical
Electronics, a Life-member of the Biomedical Society of India and the Computer Society of India, and has served as R &
D, production and marketing executive in several Indian and multinational Medical Electronics and Automation &
Control Industries like Keltron, Philips, Siemens and Larsen & Toubro, as well as in prominent academia in India and
abroad).