This document summarizes a research paper that proposes a new algorithm for maintaining the shape and integrity of bio-signals over a body sensor network. The algorithm uses set theory operations instead of interpolation to synchronize signals. It also proposes a secure key management scheme to enhance security in wireless body area networks and analyzes energy consumption. The paper reviews related work in body sensor networks, describes the methodology used in the research, and presents results on evaluating the proposed algorithm's energy efficiency and effectiveness compared to previous methods.
An ECG Compressed Sensing Method of Low Power Body Area NetworkNooria Sukmaningtyas
Aimed at low power problem in body area network, an ECG compressed sensing method of low
power body area network based on the compressed sensing theory was proposed. Random binary
matrices were used as the sensing matrix to measure ECG signals on the sensor nodes. After measured
value is transmitted to remote monitoring center, ECG signal sparse representation under the discrete
cosine transform and block sparse Bayesian learning reconstruction algorithm is used to reconstruct the
ECG signals. The simulation results show that the 30% of overall signal can get reconstruction signal
which’s SNR is more than 60dB, each numbers in each rank of sensing matrix can be controlled below 5,
which reduces the power of sensor node sampling, calculation and transmission. The method has the
advantages of low power, high accuracy of signal reconstruction and easy to hardware implementation.
IJIFR VOLUME 4 ISSUE 2 SECTION 2 OCTOBER 2016vikas sharma
I take this privilege to welcome all of you to the continuous 38th edition of International Journal Of Informative & Futuristic Research (IJIFR) - Volume 4, Issue 2, October 2016. IJIFR is a peer reviewed monthly journal that accepts research works from scholars, academicians, professors, doctorates, researchers, engineers and corporate fraternity in their respective expertise of studies. Work after publication will be available on the website (www.ijifr.com) based on issues of the month and its publication date. The Journal aims to publish quality material that contributes to accumulate dynamic knowledge which is able to revitalize and foster the research carried out in different disciplines. Its multidisciplinary approach is deliberate to bring the worldwide eminent intellectuals on one platform to illumine the world of knowledge. The journal follows a Peer Review System in order to bring in well-informed exploration for researchers across the world thereby bringing in total transparency in its journal review system. It delivers eventual platform in order to have genuine, speculative, knowledgeable research which has the visualization to understand fact-finding experiences that describes significant developments of changing global scenarios. Respected for its International reputation, the editorial and reviewer boards of IJIFR Journal comprised of experts with not only having the academic background but also the researchers serving the industry.
This document summarizes a proposed architecture for remote patient monitoring using wireless sensor networks. The architecture allows virtual groups to be formed between patients, nurses, and doctors to enable remote analysis of patient data collected by wireless body area networks (WBANs). The patient data is transmitted through an underlying environmental sensor network to members of the virtual group. The proposed architecture addresses challenges of power supply for body sensor networks and quality of service guarantees.
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...IJECEIAES
Due to their use in daily life situation, demand for remote health applications and e-health monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy, information can be transferred from the patient to the distant clinic. Nowadays, the most chronic disease is cardiovascular diseases (CVDs). However, the storage and transmission of the ECG signal, consumes more energy, bandwidth and data security which is faced many challenges. Hence, in this work, we present a combined approach for ECG data compression and cryptography. The compression is performed using adaptive Huffman encoding and encrypting is done using AES (CBC) scheme with a 256-bit key. To increase the security, we include DiffieHellman Key exchange to authenticate the receiver, RSA key generation for encrypting and decrypting the data. Experimental results show that the proposed approach achieves better performance in terms of compression and encryption on MIT-BIH ECG dataset.
A personalized Wireless Sensor Network Communication Model for computerizatio...IOSR Journals
This document proposes a personalized wireless sensor network communication model for automating electric power distribution. It involves using sensor networks to monitor parameters like voltage, current, temperature across the distribution system. Sensors would be grouped into clusters and use a virtual MIMO scheme within clusters to reduce errors from transients. Between clusters, a location-aware GEAR routing protocol would be used to route data to monitoring stations efficiently. This decentralized approach could automate operations faster than current centralized SCADA systems while reducing power consumption. It could also help detect electricity theft by strategically placing sensor nodes along transmission lines.
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
This document summarizes a research paper that proposes a system for remote healthcare monitoring of cardiovascular disease (CVD) using data mining techniques on compressed electrocardiogram (ECG) data. The system applies genetic algorithms for attribute selection and expectation-maximization clustering on compressed ECG data received from patient monitoring devices by a hospital server. This allows the server to generate classification constraints for different cardiac abnormalities. The patient's mobile phone then uses these constraints in a rule-based system to classify cardiac abnormalities in real-time directly from the compressed ECG data. When abnormalities are detected, emergency notifications can be automatically sent to the patient.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Dr. Amarjeet Singh
Structural health monitoring is the fact of
estimating the state of structural healthor detecting the
changes in structure that affect its performance. The
traditional approach to monitor the structural health is by
using centralized data acquisition hub wired to tens or even
hundreds of sensors, and the installation and maintenance of
these cabled systems represent significant concerns,
prompting the move toward wireless sensor network. As cost
effectiveness and energy efficiency is a major concern, our
main interest is to reduce the amount of overhead while
keeping the structural health monitoring accurate. Since most
of the compression algorithm is heavy weight for wireless
sensor network with respect to payload compression, here we
have analyzed an algorithmic comparison of arithmetic
coding algorithm and Huffman coding algorithm. Evaluation
shows that arithmetic coding is more efficient than Huffman
coding for payload compression.
An ECG Compressed Sensing Method of Low Power Body Area NetworkNooria Sukmaningtyas
Aimed at low power problem in body area network, an ECG compressed sensing method of low
power body area network based on the compressed sensing theory was proposed. Random binary
matrices were used as the sensing matrix to measure ECG signals on the sensor nodes. After measured
value is transmitted to remote monitoring center, ECG signal sparse representation under the discrete
cosine transform and block sparse Bayesian learning reconstruction algorithm is used to reconstruct the
ECG signals. The simulation results show that the 30% of overall signal can get reconstruction signal
which’s SNR is more than 60dB, each numbers in each rank of sensing matrix can be controlled below 5,
which reduces the power of sensor node sampling, calculation and transmission. The method has the
advantages of low power, high accuracy of signal reconstruction and easy to hardware implementation.
IJIFR VOLUME 4 ISSUE 2 SECTION 2 OCTOBER 2016vikas sharma
I take this privilege to welcome all of you to the continuous 38th edition of International Journal Of Informative & Futuristic Research (IJIFR) - Volume 4, Issue 2, October 2016. IJIFR is a peer reviewed monthly journal that accepts research works from scholars, academicians, professors, doctorates, researchers, engineers and corporate fraternity in their respective expertise of studies. Work after publication will be available on the website (www.ijifr.com) based on issues of the month and its publication date. The Journal aims to publish quality material that contributes to accumulate dynamic knowledge which is able to revitalize and foster the research carried out in different disciplines. Its multidisciplinary approach is deliberate to bring the worldwide eminent intellectuals on one platform to illumine the world of knowledge. The journal follows a Peer Review System in order to bring in well-informed exploration for researchers across the world thereby bringing in total transparency in its journal review system. It delivers eventual platform in order to have genuine, speculative, knowledgeable research which has the visualization to understand fact-finding experiences that describes significant developments of changing global scenarios. Respected for its International reputation, the editorial and reviewer boards of IJIFR Journal comprised of experts with not only having the academic background but also the researchers serving the industry.
This document summarizes a proposed architecture for remote patient monitoring using wireless sensor networks. The architecture allows virtual groups to be formed between patients, nurses, and doctors to enable remote analysis of patient data collected by wireless body area networks (WBANs). The patient data is transmitted through an underlying environmental sensor network to members of the virtual group. The proposed architecture addresses challenges of power supply for body sensor networks and quality of service guarantees.
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...IJECEIAES
Due to their use in daily life situation, demand for remote health applications and e-health monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy, information can be transferred from the patient to the distant clinic. Nowadays, the most chronic disease is cardiovascular diseases (CVDs). However, the storage and transmission of the ECG signal, consumes more energy, bandwidth and data security which is faced many challenges. Hence, in this work, we present a combined approach for ECG data compression and cryptography. The compression is performed using adaptive Huffman encoding and encrypting is done using AES (CBC) scheme with a 256-bit key. To increase the security, we include DiffieHellman Key exchange to authenticate the receiver, RSA key generation for encrypting and decrypting the data. Experimental results show that the proposed approach achieves better performance in terms of compression and encryption on MIT-BIH ECG dataset.
A personalized Wireless Sensor Network Communication Model for computerizatio...IOSR Journals
This document proposes a personalized wireless sensor network communication model for automating electric power distribution. It involves using sensor networks to monitor parameters like voltage, current, temperature across the distribution system. Sensors would be grouped into clusters and use a virtual MIMO scheme within clusters to reduce errors from transients. Between clusters, a location-aware GEAR routing protocol would be used to route data to monitoring stations efficiently. This decentralized approach could automate operations faster than current centralized SCADA systems while reducing power consumption. It could also help detect electricity theft by strategically placing sensor nodes along transmission lines.
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
This document summarizes a research paper that proposes a system for remote healthcare monitoring of cardiovascular disease (CVD) using data mining techniques on compressed electrocardiogram (ECG) data. The system applies genetic algorithms for attribute selection and expectation-maximization clustering on compressed ECG data received from patient monitoring devices by a hospital server. This allows the server to generate classification constraints for different cardiac abnormalities. The patient's mobile phone then uses these constraints in a rule-based system to classify cardiac abnormalities in real-time directly from the compressed ECG data. When abnormalities are detected, emergency notifications can be automatically sent to the patient.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Dr. Amarjeet Singh
Structural health monitoring is the fact of
estimating the state of structural healthor detecting the
changes in structure that affect its performance. The
traditional approach to monitor the structural health is by
using centralized data acquisition hub wired to tens or even
hundreds of sensors, and the installation and maintenance of
these cabled systems represent significant concerns,
prompting the move toward wireless sensor network. As cost
effectiveness and energy efficiency is a major concern, our
main interest is to reduce the amount of overhead while
keeping the structural health monitoring accurate. Since most
of the compression algorithm is heavy weight for wireless
sensor network with respect to payload compression, here we
have analyzed an algorithmic comparison of arithmetic
coding algorithm and Huffman coding algorithm. Evaluation
shows that arithmetic coding is more efficient than Huffman
coding for payload compression.
ICU remains for Intensive Care Unit, a place in the recuperating office where wiped out patients are checked eagerly. Commonly, the patient-staff extent is low and the LIFE-SAVING EQUIPMENT used is outstandingly bleeding edge Generally ICU is a healing facility for course of action of genuine nursing and remedial consideration of essentially wiped out patients, depicted by high bore and measure of unending nursing and restorative supervision and by use of cutting edge checking and resuscitative equipment The patients in the ICU require a predictable seeing of their Temperature and pulse circulatory strain. This undertaking is a working model, which wires sensors to evaluate imperative parameters specifically the Temperature, Respiratory temperature and Heart Beat. The sensors are interfaced to PC, with the objective that the condition of a patient can be explored by masters in any bit of the center wherever they are. At whatever point there is a variety from the standard felt by the patient, the particular patient will give an alert movement, by which the pro can race to the patient. Despite when the patient is in a careless condition, each one of the parameters will be identified and pro will be admonished, thusly it diminishes master's remaining task at hand and besides gives more correct results .Our endeavor is a working model which wires sensors to measure each one of these parameters like body temperature, Respiratory Temp and Heart Beat rate and trade it to the PC, with the objective that the patient condition can be examined to by authorities in any bit of the recuperating focus wherever they are. In this way it decreases experts work stack and besides gives more exact results, wherever there is a variety from the standard felt by the patient, we have in like manner combined saline watching system which gives an alert when the saline container going to cleanse.
A machine learning algorithm for classification of mental tasks.pdfPravinKshirsagar11
In this article, a contemporary tack of mental tasks on cognitive parts of humans is appraised using two different approaches such as wavelet transforms at a discrete time (DWT) and support vector machine (SVM). The put forth tack is instilled with the electroencephalogram (EEG) database acquired in real-time from CARE Hospital, Nagpur. Additional data is also acquired from a brain-computer interface (BCI). In the working model, signals from the database are wed out into different frequency sub-bands using DWT. Initially, updated statistical features are obtained from different frequency sub-bands. This type of representation defines the wavelet co-efficient which is introduced for reducing the measurement of data. Then, the projected method is realized using SVM for segregating both port and veracious hand movement. After segregation of EEG signals, results are achieved with an accuracy of 92% for BCI competition paradigm III and 97.89% for B-alert machine.
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
The document summarizes an intelligent GIS-based road accident analysis and real-time monitoring system that uses WiMAX/GPRS. It discusses the motivation and need for such a system to better analyze accidents and identify accident-prone locations. It then describes the system architecture, which utilizes telegeoinformatics to enable interoperability across different components. It also discusses strategies for adapting the system to different client devices. Finally, it outlines the use of terminal-centric and network-centric positioning methods like A-GPS and CGI-TA for location services and monitoring within an open, IP-based telecommunications network.
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
The heart is a vital organ that serves to pump blood to the whole body. A heart rate can be used as a healthy body parameter conditions. Growing evidence suggests that IT-based health records play essential role to drive medical revolution especially on data storage and processing. The heart rate measurement (HRM) process usually involves wearable sensor devices to record patient’s data. This data is recorded to help the doctors to analyze and provide a better diagnose in order to determine the best treatment for the patients. Connecting the sensor system through a wireless network to a cloud server will enable the doctor to monitor remotely. This paper presents fit-NES wearable bracelet, an alternative method for integrating a HR measurement device using optical based pulse sensor and Bluetooth-based communication module. This paper is also present the benchmarking of proposed system with several various commercial HR measurement devices.
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
A Joint QRS Detection and Data Compression Scheme for Wearable Sensorsecgpapers
This paper presents a novel technique for joint QRS detection and lossless data compression of electrocardiogram (ECG) signals for wearable sensors. The technique uses a single adaptive linear predictor to perform both tasks, lowering computational complexity. For QRS detection, the predictor estimates each ECG sample from past samples, and the prediction error is higher for steep QRS segments. This error is used to locate QRS complexes after filtering. For compression, the prediction error is encoded and packaged into a compressed representation of the ECG signal. Simulation results show the technique achieves 99.64% sensitivity and 99.81% positive prediction for QRS detection, with a lossless compression ratio of 2.28x. This joint
1) The document presents a relay-based routing protocol for wireless in-body sensor networks that aims to maximize network lifetime.
2) The protocol decreases communication distances of in-body sensors by deploying relays on a patient's clothes, allowing sensors to directly communicate with nearby relays.
3) Simulation results show the proposed protocol performs better than other protocols in terms of energy efficiency.
This article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the farmers to grow their crops and to accomplish marginal income from what they have invested. Also existing methods have been analyzed in the same field where some devices have been installed and checked for increasing the productivity of horticulture crops. But existing methods fail to install an intelligent monitoring device that can provide periodic results within short span of time. Therefore, a sensor based technology with Internet of Things (IoT) has been implemented in the projected work for monitoring major parameters that support the growth and income of farmers. Also, an optimization algorithm for identifying the loss in different crops has been incorporated for maximizing the system boundary and to transmit data to farmers located in different areas. To prove the cogency of proposed method some existing methods have been compared and the results prove the projected technique produces improved results for
about 58%.
Robust System for Patient Specific Classification of ECG Signal using PCA and...IRJET Journal
This document proposes a robust system for classifying electrocardiogram (ECG) signals specific to individual patients. It uses principal component analysis (PCA) and neural networks. Features are extracted from ECG data using time-invariant discrete wavelet transforms. PCA is then used to reduce the dimensionality of the feature space. An artificial neural network classifies the ECG patterns for each patient based on the features. The system was tested on the MIT-BIH arrhythmia database and achieved accurate classification of normal and abnormal heart rhythms for individual patients.
In this paper prepared a systems to that amount the units of the fitness about structural elements within Reinforced Concrete (RC), at total times, partially atop the perfect coverage concerning sensors is provided. As a result, the records about the distances within the sensor’s near nodes and its sensing areas are the only want because concerning every sensor into the recent algorithms. Furthermore, based totally completely regarding the simulations, great improvement performs stay seen along the lifespan regarding a variety concerning existing lifespan maximization algorithms, anybody is a cease end result related to the newly proposed algorithm. The promoted sensor mark hard-ware trigger the PZT sensor and collect the responses acquires beyond the structural element. It moreover send collected information to an information middle because of similarly science yet analysis within an energy efficient manner using low power wireless verbal exchange technology. The brought ingress in conformity with and the evaluation atop the accrued information operate lie remotely executed by means of using a net interface. Performance effects showcase therefore a good deal the fractures great enough within consequence including purpose structural problems be able continue to be efficiently detected together with the promoter rule
Training feedforward neural network using genetic algorithm to diagnose left ...TELKOMNIKA JOURNAL
In this research work, a new technique was proposed for the diagnosis of left ventricular hypertrophy (LVH) from the ECG signal. The advanced imaging techniques can be used to diagnose left ventricular hypertrophy, but it leads to time-consuming and more expensive. This proposed technique overcomes thesef issues and may serve as an efficient tool to diagnose the LVH disease. The LVH causes changes in the patterns of ECG signal which includes R wave, QRS and T wave. This proposed approach identifies the changes in the pattern and extracts the temporal, spatial and statistical features of the ECG signal using windowed filtering technique. These features were applied to the conventional classifier and also to the neural network classifier with the modified weights using a genetic algorithm. The weights were modified by combining the crossover operators such as crossover arithmetic and crossover two-point operator. The results were compared with the various classifiers and the performance of the neural network with the modified weights using a genetic algorithm is outperformed. The accuracy of the weights modified feedforward neural network is 97.5%.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
This document discusses a proposed cost-based energy efficient routing algorithm for wireless body area networks (WBANs). WBANs use wireless sensor nodes placed on or inside the body to monitor vital health signals. The proposed algorithm aims to maximize network lifetime by selecting optimal forwarding nodes based on a cost function that considers residual energy and distance to the sink node. Simulation results show the proposed algorithm performs better than traditional routing methods by achieving a longer stability period with more uniform energy consumption across nodes.
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...ijwmn
Wireless Sensor Networks (WSNs) have been emerged in many important aspects in the real world, such as
industry, agriculture, and military applications. As the main challenge that WSNs facing is the energy
consumption, it is necessary to investigate the suitability of using mobile sinks for data collection in these
networks. In this paper, therefore, a new data gathering technique with mobile elements referred to as
Intersection Point of Communication Ranges (IPCR) is proposed. The IPCR algorithm endeavours to
compute the optimal trajectory of the mobile sink for which the data collection latency is reduced.
Simulation results presented in this study showed that the IPCR algorithm has achieved the optimal Travel
Sales-Man Problem algorithm. In addition, the IPCR algorithm outperformed the Connectivity Based Data
Collection (CBDC) algorithm in terms of data gathering latency and network throughput.
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
Qadri et Al., en su trabajo “The Future of Healthcare Internet of Things (H-IoT): A Survey of Emerging Technologies” propone como uno de los desafíos del H-IoT:
Monitoreo de Desórdenes neurológicos
Ambient Assisted Living (AAL)
Fitness Tracking
Uso de técnicas de Big Data
Uso de Edge Computing
Internet of Nano-Things
This document describes the design and development of a low-cost, portable microcontroller-based hygrometer. The hygrometer uses an HSM-20G sensor module to measure relative humidity and temperature. The sensor outputs analog voltages that are converted to digital values by a PIC16F876A microcontroller and displayed on a 16x2 LCD screen. The system is powered by a 9V battery and uses voltage regulators to provide stable 5V power. Programming was done in C language using MikroC Pro to continuously display the humidity and temperature readings from the sensor.
This document provides details on calculating various losses that occur in high voltage underground power cables, including dielectric losses, conductor losses, and sheath losses. It presents formulas to calculate voltage-dependent and current-dependent dielectric losses, as well as ohmic conductor losses and sheath eddy current and circulating current losses. The document also provides methods to calculate cable parameters like inductance, impedance, and mutual impedances between conductors and screen. It describes using these calculations and ETAP modeling to analyze losses in an existing 33kV cable network and determine that installing VAR compensators could reduce total daily power losses by approximately 2471 kW.
Determination of Propagation Path Loss and Contour Map for FUTA FM Radio Fede...IOSR Journals
FM signal propagation through the troposphere interacts with the terrain as obstacles and reflection
planes. To understand the degree of interaction, signal strength measurements of the 93.1MHz frequency
modulated Radio located at Federal University of Technology; Akure, Nigeria was carried out in the area
surrounding the station. The paper reviews the various models for predicting transmission loss and employed
the long rice irregular terrain model for its versatility for the study. The losses along the paths were determined
and this was compared with the path loss predicted by the irregular terrain model and this was highly
correlated. The result offers useful data for developing the contour map of the propagation loss which was
developed for the station. It was concluded that with the irregular terrain model predictions can be used for
accurate spectrum management in Nigeria
ICU remains for Intensive Care Unit, a place in the recuperating office where wiped out patients are checked eagerly. Commonly, the patient-staff extent is low and the LIFE-SAVING EQUIPMENT used is outstandingly bleeding edge Generally ICU is a healing facility for course of action of genuine nursing and remedial consideration of essentially wiped out patients, depicted by high bore and measure of unending nursing and restorative supervision and by use of cutting edge checking and resuscitative equipment The patients in the ICU require a predictable seeing of their Temperature and pulse circulatory strain. This undertaking is a working model, which wires sensors to evaluate imperative parameters specifically the Temperature, Respiratory temperature and Heart Beat. The sensors are interfaced to PC, with the objective that the condition of a patient can be explored by masters in any bit of the center wherever they are. At whatever point there is a variety from the standard felt by the patient, the particular patient will give an alert movement, by which the pro can race to the patient. Despite when the patient is in a careless condition, each one of the parameters will be identified and pro will be admonished, thusly it diminishes master's remaining task at hand and besides gives more correct results .Our endeavor is a working model which wires sensors to measure each one of these parameters like body temperature, Respiratory Temp and Heart Beat rate and trade it to the PC, with the objective that the patient condition can be examined to by authorities in any bit of the recuperating focus wherever they are. In this way it decreases experts work stack and besides gives more exact results, wherever there is a variety from the standard felt by the patient, we have in like manner combined saline watching system which gives an alert when the saline container going to cleanse.
A machine learning algorithm for classification of mental tasks.pdfPravinKshirsagar11
In this article, a contemporary tack of mental tasks on cognitive parts of humans is appraised using two different approaches such as wavelet transforms at a discrete time (DWT) and support vector machine (SVM). The put forth tack is instilled with the electroencephalogram (EEG) database acquired in real-time from CARE Hospital, Nagpur. Additional data is also acquired from a brain-computer interface (BCI). In the working model, signals from the database are wed out into different frequency sub-bands using DWT. Initially, updated statistical features are obtained from different frequency sub-bands. This type of representation defines the wavelet co-efficient which is introduced for reducing the measurement of data. Then, the projected method is realized using SVM for segregating both port and veracious hand movement. After segregation of EEG signals, results are achieved with an accuracy of 92% for BCI competition paradigm III and 97.89% for B-alert machine.
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
The document summarizes an intelligent GIS-based road accident analysis and real-time monitoring system that uses WiMAX/GPRS. It discusses the motivation and need for such a system to better analyze accidents and identify accident-prone locations. It then describes the system architecture, which utilizes telegeoinformatics to enable interoperability across different components. It also discusses strategies for adapting the system to different client devices. Finally, it outlines the use of terminal-centric and network-centric positioning methods like A-GPS and CGI-TA for location services and monitoring within an open, IP-based telecommunications network.
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
The heart is a vital organ that serves to pump blood to the whole body. A heart rate can be used as a healthy body parameter conditions. Growing evidence suggests that IT-based health records play essential role to drive medical revolution especially on data storage and processing. The heart rate measurement (HRM) process usually involves wearable sensor devices to record patient’s data. This data is recorded to help the doctors to analyze and provide a better diagnose in order to determine the best treatment for the patients. Connecting the sensor system through a wireless network to a cloud server will enable the doctor to monitor remotely. This paper presents fit-NES wearable bracelet, an alternative method for integrating a HR measurement device using optical based pulse sensor and Bluetooth-based communication module. This paper is also present the benchmarking of proposed system with several various commercial HR measurement devices.
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
A Joint QRS Detection and Data Compression Scheme for Wearable Sensorsecgpapers
This paper presents a novel technique for joint QRS detection and lossless data compression of electrocardiogram (ECG) signals for wearable sensors. The technique uses a single adaptive linear predictor to perform both tasks, lowering computational complexity. For QRS detection, the predictor estimates each ECG sample from past samples, and the prediction error is higher for steep QRS segments. This error is used to locate QRS complexes after filtering. For compression, the prediction error is encoded and packaged into a compressed representation of the ECG signal. Simulation results show the technique achieves 99.64% sensitivity and 99.81% positive prediction for QRS detection, with a lossless compression ratio of 2.28x. This joint
1) The document presents a relay-based routing protocol for wireless in-body sensor networks that aims to maximize network lifetime.
2) The protocol decreases communication distances of in-body sensors by deploying relays on a patient's clothes, allowing sensors to directly communicate with nearby relays.
3) Simulation results show the proposed protocol performs better than other protocols in terms of energy efficiency.
This article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the farmers to grow their crops and to accomplish marginal income from what they have invested. Also existing methods have been analyzed in the same field where some devices have been installed and checked for increasing the productivity of horticulture crops. But existing methods fail to install an intelligent monitoring device that can provide periodic results within short span of time. Therefore, a sensor based technology with Internet of Things (IoT) has been implemented in the projected work for monitoring major parameters that support the growth and income of farmers. Also, an optimization algorithm for identifying the loss in different crops has been incorporated for maximizing the system boundary and to transmit data to farmers located in different areas. To prove the cogency of proposed method some existing methods have been compared and the results prove the projected technique produces improved results for
about 58%.
Robust System for Patient Specific Classification of ECG Signal using PCA and...IRJET Journal
This document proposes a robust system for classifying electrocardiogram (ECG) signals specific to individual patients. It uses principal component analysis (PCA) and neural networks. Features are extracted from ECG data using time-invariant discrete wavelet transforms. PCA is then used to reduce the dimensionality of the feature space. An artificial neural network classifies the ECG patterns for each patient based on the features. The system was tested on the MIT-BIH arrhythmia database and achieved accurate classification of normal and abnormal heart rhythms for individual patients.
In this paper prepared a systems to that amount the units of the fitness about structural elements within Reinforced Concrete (RC), at total times, partially atop the perfect coverage concerning sensors is provided. As a result, the records about the distances within the sensor’s near nodes and its sensing areas are the only want because concerning every sensor into the recent algorithms. Furthermore, based totally completely regarding the simulations, great improvement performs stay seen along the lifespan regarding a variety concerning existing lifespan maximization algorithms, anybody is a cease end result related to the newly proposed algorithm. The promoted sensor mark hard-ware trigger the PZT sensor and collect the responses acquires beyond the structural element. It moreover send collected information to an information middle because of similarly science yet analysis within an energy efficient manner using low power wireless verbal exchange technology. The brought ingress in conformity with and the evaluation atop the accrued information operate lie remotely executed by means of using a net interface. Performance effects showcase therefore a good deal the fractures great enough within consequence including purpose structural problems be able continue to be efficiently detected together with the promoter rule
Training feedforward neural network using genetic algorithm to diagnose left ...TELKOMNIKA JOURNAL
In this research work, a new technique was proposed for the diagnosis of left ventricular hypertrophy (LVH) from the ECG signal. The advanced imaging techniques can be used to diagnose left ventricular hypertrophy, but it leads to time-consuming and more expensive. This proposed technique overcomes thesef issues and may serve as an efficient tool to diagnose the LVH disease. The LVH causes changes in the patterns of ECG signal which includes R wave, QRS and T wave. This proposed approach identifies the changes in the pattern and extracts the temporal, spatial and statistical features of the ECG signal using windowed filtering technique. These features were applied to the conventional classifier and also to the neural network classifier with the modified weights using a genetic algorithm. The weights were modified by combining the crossover operators such as crossover arithmetic and crossover two-point operator. The results were compared with the various classifiers and the performance of the neural network with the modified weights using a genetic algorithm is outperformed. The accuracy of the weights modified feedforward neural network is 97.5%.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
This document discusses a proposed cost-based energy efficient routing algorithm for wireless body area networks (WBANs). WBANs use wireless sensor nodes placed on or inside the body to monitor vital health signals. The proposed algorithm aims to maximize network lifetime by selecting optimal forwarding nodes based on a cost function that considers residual energy and distance to the sink node. Simulation results show the proposed algorithm performs better than traditional routing methods by achieving a longer stability period with more uniform energy consumption across nodes.
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...ijwmn
Wireless Sensor Networks (WSNs) have been emerged in many important aspects in the real world, such as
industry, agriculture, and military applications. As the main challenge that WSNs facing is the energy
consumption, it is necessary to investigate the suitability of using mobile sinks for data collection in these
networks. In this paper, therefore, a new data gathering technique with mobile elements referred to as
Intersection Point of Communication Ranges (IPCR) is proposed. The IPCR algorithm endeavours to
compute the optimal trajectory of the mobile sink for which the data collection latency is reduced.
Simulation results presented in this study showed that the IPCR algorithm has achieved the optimal Travel
Sales-Man Problem algorithm. In addition, the IPCR algorithm outperformed the Connectivity Based Data
Collection (CBDC) algorithm in terms of data gathering latency and network throughput.
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
Qadri et Al., en su trabajo “The Future of Healthcare Internet of Things (H-IoT): A Survey of Emerging Technologies” propone como uno de los desafíos del H-IoT:
Monitoreo de Desórdenes neurológicos
Ambient Assisted Living (AAL)
Fitness Tracking
Uso de técnicas de Big Data
Uso de Edge Computing
Internet of Nano-Things
This document describes the design and development of a low-cost, portable microcontroller-based hygrometer. The hygrometer uses an HSM-20G sensor module to measure relative humidity and temperature. The sensor outputs analog voltages that are converted to digital values by a PIC16F876A microcontroller and displayed on a 16x2 LCD screen. The system is powered by a 9V battery and uses voltage regulators to provide stable 5V power. Programming was done in C language using MikroC Pro to continuously display the humidity and temperature readings from the sensor.
This document provides details on calculating various losses that occur in high voltage underground power cables, including dielectric losses, conductor losses, and sheath losses. It presents formulas to calculate voltage-dependent and current-dependent dielectric losses, as well as ohmic conductor losses and sheath eddy current and circulating current losses. The document also provides methods to calculate cable parameters like inductance, impedance, and mutual impedances between conductors and screen. It describes using these calculations and ETAP modeling to analyze losses in an existing 33kV cable network and determine that installing VAR compensators could reduce total daily power losses by approximately 2471 kW.
Determination of Propagation Path Loss and Contour Map for FUTA FM Radio Fede...IOSR Journals
FM signal propagation through the troposphere interacts with the terrain as obstacles and reflection
planes. To understand the degree of interaction, signal strength measurements of the 93.1MHz frequency
modulated Radio located at Federal University of Technology; Akure, Nigeria was carried out in the area
surrounding the station. The paper reviews the various models for predicting transmission loss and employed
the long rice irregular terrain model for its versatility for the study. The losses along the paths were determined
and this was compared with the path loss predicted by the irregular terrain model and this was highly
correlated. The result offers useful data for developing the contour map of the propagation loss which was
developed for the station. It was concluded that with the irregular terrain model predictions can be used for
accurate spectrum management in Nigeria
All optical single module phase encoded half-adder and halfsubtractor exploit...IOSR Journals
The development of all optical super fast arithmetic logic unit (ALU) is one of the most important
requirement for construction of super fast all optical processor. All optical half-adder and half-subtractor have
performed most of the essential functions of the arithmetic logic unit. Here in this paper the author has
proposed a scheme of single module for phase encoded simultaneous operation of half-addition and halfsubtraction
for the same input bits using four wave mixing (FWM) in semiconductor optical amplifier (SOA).
This type of single module for simultaneous operations using phase encoding based on the difference of phase
with the reference signal one through FWM in SOA will gives fast response to accomplish the demand of super
fast all optical processing
Computation of Theoretical Heat of Formation in a Kiln Using Fortran LanguageIOSR Journals
Abstract: The evolution of the early rotary kiln for cement industries and innovation made by man is to ease
cement processing. The rotary Kiln in which cement is burnt at 13000C to 15500C is a long cylinder rotating on
its axis and inclined so that the materials fed in at the upper end travel slowly to the lower end.
The approach adopted is by evolving a mathematical model of the system. Simulation of the process was carried
out using FORTRAN language to compute theoretical heat of formation. The exact value of theoretical heat of
formation was found to be 435.583000.
The aim is to produce a good quality clinker at the optimum fuel consumption and thermal efficiency.
The computer model is in a FORTRAN language. The simulation provides very encouraging result, which
showed trends that enabled the deduction of optimum system parameters.
Significance: This paper investigated the behavior of the kiln through computer simulations, for comparing
the performance of different constitutions under similar operations and conditions. The paper highlighted how a
good quality clinker can be produced at optimum fuel consumption and thermal efficiency.
This document describes an online signature verification system that uses vector quantization and hidden Markov models. Signatures are collected using a graphics tablet and preprocessed to reduce noise and normalize size and phase. Features like velocity, acceleration, and pressure are extracted from segments of each signature. K-means clustering is used to generate a codebook, and vector quantization maps signatures to code words. Hidden Markov models are trained on the code words using the Baum-Welch algorithm. In verification, the forward algorithm calculates the probability that a signature was generated by a claimed user's model. The system achieved an equal error rate of 14% for verification.
This document studies the factors affecting the movement of contaminating particles in insulating sulfur hexafluoride (SF6) gas in gas insulated switchgear (GIS). It investigates how particles' shapes, dimensions, configuration of the gap between electrodes, magnitude of peak impulse voltage, and drag based on SF6 gas viscosity influence particles' motion. The results show particles' motion varies significantly depending on their shapes, sizes, peak voltage, and gap configuration. Drag forces are important to consider and affect particles' acceleration. Equations are developed to model particles' velocity and displacement over time under an impulse voltage considering various drag scenarios.
This document discusses quality technical and vocational education and training (TVET) as a tool for self-reliance. It begins by defining TVET and identifying skills and knowledge as important for economic growth. The study aims to investigate factors that contribute to quality TVET for self-reliance, including student factors, school factors, instructional materials, and government strategies. A questionnaire was administered to 36 TVET teachers. The results found that students often lack background in TVET and confidence in it as a career. Schools have inadequate facilities, materials, and practical periods. Instructional materials like tools, textbooks, and ICT resources are also insufficient. The document recommends that governments prioritize TVET curriculum planning and ensure qualified teaching staff
This document discusses performance issues related to the interoperability between IEEE 802.3 (Ethernet or wired LAN) and IEEE 802.11 (wireless LAN) standards in a heterogeneous network environment. It provides an overview of the two standards, including their development and key features. The document then examines interoperability issues that can occur when combining these different network types. It describes how data is exchanged between wired and wireless networks at the data link layer. The document also presents results from a simulation that showed LAN data transfer to be faster than WLAN information exchange.
This document summarizes a research paper analyzing the sustainability opportunities and challenges of the biofuels industry in India. The paper aims to answer three questions: 1) What are some significant sustainability opportunities and challenges of the biofuels industry? 2) What is the current state of biofuel operations in India? 3) What initial steps can be taken toward sustainable biofuel development? The response analyzes strategic sustainable development approaches and tools like the Natural Step Framework. Key points discussed include economic, environmental and social sustainability assessments of biomass and biofuels, including issues of profitability, efficiency, equity, energy balance, greenhouse gas emissions and life cycle assessments. Challenges in implementing ethanol blending programs in India like taxation and availability of
The document describes an improved PIN entry method to prevent shoulder surfing attacks. The basic BW method divides numbers between two colored halves in each round. An observer can group entries over rounds to determine a PIN digit. The improved method displays four random colors across ten digit keys in each round. Users enter based on their PIN digit's color. This prevents grouping as colors randomly change, securing PINs even from skilled observers. The method uses sets and permutations to partition colors after each entry.
This document summarizes a study on the effects of occupational stress on the work performance of police officers in Nakuru police division, Kenya. The study found that police officers experience high levels of occupational stress due to factors like role overload and ambiguity. It also found that their work performance was rated as only fair. The study established that high occupational stress negatively impacts the work performance of police officers. Additionally, it was found that police officers lack adequate welfare support despite the stressful nature of their work. The study recommends that the National Police Service Commission implement policies and mechanisms to reduce work-related stress and improve police officers' work performance.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
Effective Waste Management and Environmental ControlIOSR Journals
There is wide spread interest in the world today in the methods that enable the re-use of waste.
According to Webster’s Mew Practical Dictionary, ‘Waste’ means “Thrown away as worthless after being used.
i.e. of no further use to a person, animal or plant; contrary to this opinion, it has been discovered that what is
regarded as waste or worthless, when worked upon can be manipulated to generated or produce materials that
are beneficial for the use of man.
This paper throw light into how waste resources can be control by analysis the theories of waste
management, recycling, re-use disposal and compositing from organic wastes and ways by which farm and
municipal waste can be worked upon to produce materials that are beneficial for the use of man
This document discusses performance of matching algorithms for signal approximation. It begins by introducing matching pursuit algorithms like Orthogonal Matching Pursuit (OMP) and Stagewise Orthogonal Matching Pursuit (StOMP) which are greedy algorithms that approximate sparse signals. It then describes the Non-Negative Least Squares algorithm which solves non-negative least squares problems. Finally, it discusses Extranious Equivalent Detection (EED), a modification of OED that incorporates non-negativity of representations by using a non-negative optimization technique instead of orthogonal projection.
Capacity Spectrum Method for RC Building with Cracked and Uncracked SectionIOSR Journals
one of the most widespread procedures for the assessment of building behavior, due to earthquake, is the Capacity Spectrum Method (CSM). In the scope of this procedure, capacity of the structure compares with the demands of earthquake ground motion on the structure. The capacity of the structure is represented by a nonlinear force-displacement curve, referred to as a pushover curve. The base shear forces and roof displacements are converted to equivalent spectral accelerations and spectral displacements, respectively, by means of coefficients that represent effective modal masses and modal participation factors. These spectral values define the capacity spectrum. The demands of the earthquake ground motion are represented by response spectra. A graphical construction that includes both capacity and demand spectra, results in an intersection of the two curves that estimates the performance of the structure to the earthquake. In this study, for determination of the performance levels, G+10 R.C.C. Building with cracked and uncracked section were taken. The structural Capacity of cracked and uncracked section compared with performance point value, which shows the structural capacity of building having cracked section is lesser than the uncracked section. Different modeling issues were analyzed to study the effect on Capacity of the structure with cracked and uncracked section for different position of Shear wall.
This document describes a genetic algorithm approach for automatically generating fuzzy rules for classification problems. The genetic algorithm uses rule importance as the fitness criteria, calculated as the rule's support for each class. The algorithm encodes rules using fuzzy membership set numbers for antecedents and consequents. It iterates for a set number of generations or until a minimum number of rules are fired, selecting high-fitness rules to generate offspring via crossover. The offspring replace lower-fitness rules, and the new rule population is evaluated in the next generation. The approach aims to consistently generate optimal fuzzy rules for classification using genetic search.
This document describes the design and simulation of a dual band triangular slotted planar monopole circular antenna for WiMAX applications. The antenna consists of a circular radiating patch with an isosceles triangular slot, printed on an FR-4 substrate. A defected ground plane is used to improve bandwidth. Simulation results show the antenna resonates at 3.5GHz and 5.3GHz with return losses below -30dB, meeting WiMAX bandwidth requirements. Measured results agree well with simulations. The antenna has omnidirectional radiation patterns and gains of 2.19dBi at 3.5GHz and 3.63dBi at 5.3GHz, making it suitable for short range wireless communications.
This document summarizes an article that optimizes the Okumura-Hata propagation model for 800MHz radio frequency in Yaounde, Cameroon using a Newton second order iterative algorithm. Radio measurements were collected through drive tests on an existing CDMA2000 network in Yaounde. The root mean squared error between predicted and measured values was calculated to validate the optimized model. A new model developed through this process was found to better represent the local environment compared to the standard Okumura-Hata model. The optimized model can be used for future radio network planning in Yaounde, such as for upcoming LTE deployment in the 800MHz band.
A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithm...IOSR Journals
Abstract: In this paper, a highly area-efficient multiplier-less FIR filter is presented. Distributed Arithmetic (DA) has been used to implement a bit-serial scheme of a general asymmetric version of an FIR filter, taking optimal advantage of the 3-input LUT-based structure of FPGAs. The implementation of FIR filters on FPGA based on traditional arithmetic method costs considerable hardware resources, which goes against the decrease of circuit scale and the increase of system speed. This paper presents the realization of area efficient architectures using Distributed Arithmetic (DA) for implementation of Finite Impulse Response (FIR) filter. The performance of the bit-serial and bit parallel DA along with pipelining architecture with different quantized versions are analyzed for FIR filter Design. Distributed Arithmetic structure is used to increase the resource usage while pipeline structure is also used to increase the system speed. In addition, the divided LUT method is also used to decrease the required memory units. However, according to Distributed Arithmetic, we can make a Look-Up-Table (LUT) to conserve the MAC values and callout the values according to the input data if necessary. Therefore, LUT can be created to take the place of MAC units so as to save the hardware resources. The simulation results indicate that FIR filters using Distributed Arithmetic can work stable with high speed and can save almost 50 percent hardware resources to decrease the circuit scale, and can be applied to a variety of areas for its great flexibility and high reliability. This method not only reduces the LUT size, but also modifies the structure of the filter to achieve high speed performance. Keywords: DSP, Digital Filters, FIR , FPGA, MAC, Distributed Arithmetic(DA),Divided LUT, pipeline
This document describes a proposed Arduino-based human health care monitoring and control system. The system consists of three main units:
1. A sensor unit that acquires medical data like ECG, temperature, heart rate, and blood pressure from various sensors.
2. A controller unit (using an Arduino microcontroller) that compares the sensor data to normal values and can send control signals to the patient if abnormalities are detected.
3. A monitoring unit with an LCD display to show the sensor readings and system status.
The system is intended to continuously monitor vital health parameters and provide treatment or alerts if issues arise. This could help elderly or vulnerable people receive medical help and oversight without needing to be in a clinical setting
RB-IEMRP: RELAY BASED IMPROVED THROUGHPUT ENERGY-EFFICIENT MULTI-HOP ROUTING ...IJCNCJournal
In this paper, we have proposed a Relay based Improved Throughput and Energy-efficient Multi-hop
Routing Protocol (Rb-IEMRP) for the Intra Wireless Body Sensor Network (Intra-WBSN). Moreover,
mathematical analysis has been presented, to calculate the minimum number of relay nodes require to be
deployed corresponding to the bio-sensor nodes in Intra-WBSN. Normal sensing data from bio-sensor
nodes forwarded to BNC through relay nodes while emergency data is directly transmitted to BNC. Relays
nodes are placed in the patients' cloth. It can be easily replaced or recharged that facilitates effective
health monitoring. The proposed routing protocol has achieved better network stability, network lifetime,
energy efficiency and throughput as compared to Stable Increased Throughput Multi-Hop Protocol for Link
Efficiency in Wireless Body Area Networks (SIMPLE) and Reliable Energy Efficient Critical Data Routing
in Wireless Body Area Networks (REEC) routing protocols. It has been validated through simulation
results.
This document describes an intelligent health care monitoring system using a wireless sensor network. It discusses using sensors to monitor patient vital signs like temperature, humidity, and heart rate. Sensor data is transmitted via CC2500 low power wireless radios to a centralized control room. The system aims to improve patient monitoring by making equipment more portable and allowing remote access to patient data by doctors through mobile devices. It concludes the proposed system can check various health parameters in real-time to monitor patient health more efficiently through energy efficient wireless communication between sensor nodes.
Wireless Sensor Network: an emerging entrant in HealthcareIOSR Journals
This document discusses the potential for wireless sensor networks in healthcare applications. It describes how wireless sensor networks can be used to monitor patients remotely by collecting physiological data from sensor devices. Some challenges to the adoption of this technology in healthcare include ensuring privacy and security of medical data transmitted over wireless networks. The document also provides examples of how wireless body area networks and wearable sensor devices can help monitor aspects of health and enable at-home health monitoring.
This summary provides the key details from the document in 3 sentences:
The document reviews various MAC protocols developed for wireless body area networks. It discusses the applications and requirements of WBANs, including health monitoring and military uses. The document also analyzes sources of energy wastage in WBANs and classifies common MAC protocols as contention-based, schedule-based, and low power listening protocols.
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Hea...CrimsonpublishersTTEH
A Survey of Energy Efficiency in Wireless Human Body Sensors Lifetime for Healthcare Applications by Sara Kassan*, Jaafar Gaber and Pascal Lorenz in Crimson Publishers: Digital health journal impact factor
Wireless Human Body Sensor Networks (WHBSNs) are extensively used in vital sign monitoring applications and predicting crop health in in order to identify emergency situations and allow caregivers to respond efficiently. When a sensor is drained of energy, it can no longer achieve its role without a substituted source of energy. However, limited energy in a sensor’s battery prevents the long-term process in such applications. In addition, replacing the sensors’ batteries and redeploying the sensors can be very expensive in terms of time and budget and need the presence of the patient at the hospital. To overcome the energy limitation, researchers have proposed the use of energy harvesting to reload the rechargeable battery by power. Therefore, efficient power management is required to increase the benefits of having additional environmental energy. This paper presents a review of energy efficient harvesting mechanisms to extend the Wireless Human Body Sensors lifetime.
https://crimsonpublishers.com/tteh/fulltext/TTEH.000525.php
For more Open access journals in Crimson Publishers
Please click on: https://crimsonpublishers.com/
For more Articles on Digital health journal impact factor
please click on link: https://crimsonpublishers.com/tteh/index.php
Please follow the below link for our LinkedIn page
https://www.linkedin.com/company/crimsonpublishers
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...IJSRD
Rapid expansion of wireless technologies permits continuous healthcare monitoring of mobile patients using compact biomedical wireless sensor motes. These tiny wearable devices –have limited amount of memory, energy, computation, & communication capabilities – are positioned on a patient; after that , they self-configure to create a networked cluster that is capable to continuously monitor important signs like blood pressure and flow, ECG, core temperature, the oxygen saturation, and CO2 concentration (i.e. for the respiration monitoring). The WBAN is an energizing innovation that guarantees to convey the human services to a novel level of the personalization. The scaled down sensors can be worn on body and they can non-rudely screen individual's physiological state. The numerous sensors speak with mobile utilizing the remote interfaces shaping WBAN. The WBANs empower checking a singular's wellbeing consistently in the free living conditions, where individual is allowed to direct his or her day by day action. In propose, design a enhance cluster based protocol.
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document summarizes a review paper on Wireless Body Area Networks (WBANs) by Fentahun Yersie. It discusses that WBANs consist of small intelligent devices attached to or implanted in the body that wirelessly communicate health and physiological data. It describes the two main types of devices as sensors that measure parameters like heartbeat and temperature, and actuators that take actions based on sensor data. The document outlines the typical three-level architecture of WBANs and common applications like remote health monitoring. It also discusses the key requirements for WBAN MAC protocols including reducing energy consumption through efficient handling of collision, overhearing, idle listening while supporting communication across multiple frequency bands.
This document summarizes a survey on wireless body area networks (WBANs). It begins by defining WBANs and their applications in health monitoring. It describes the typical architecture of a WBAN system, which consists of on-body and in-body sensor nodes that communicate wirelessly with a coordinator that transfers data to medical servers. The document then discusses some key differences between WBANs and traditional wireless sensor networks, such as lower node density and support for human mobility in WBANs. It also outlines several challenges for WBANs, such as limited power, security, interference, and regulatory requirements due to devices being implanted or worn on the human body. Finally, it provides examples of medical and
This research task develops a mobile healthcare analysis system (PHAS) which combines both easy ECG signal measurement and reliable analysis of heart rate variability for home care purpose. The PHAS is composed by a health care platform (HCP) and a data system analysis (DSA) module. The HCP consists of a self-developed two pole electrocardiography (ECG) measuring device and the DSA a data processing unit for detection and analysis of heart rate variability. For the DSA module, the adaptive R Peak detection algorithm is proposed to reliably detect the R peak of ECG for HRV analysis. A number of features are extracted from ECG signals. A data mining method is employed for HRV analysis to exploit the correlation between HRV and these features. Experiments are conducted by establishing a database of ECG signals measured from 29 subjects under rest and exercise condition. The results show the PHAS’s significant potential in mobile applications of personal daily health care.
Proposed Transport Protocols Suite for Wireless Medical Body Area Networksjosephjonse
Wireless Body Area Networks (WBAN) is the recent trend for localized and personalized medical services. For that purpose, several tele-medicine architectures and WBAN frameworks for patient monitoring have been proposed.This paper presents a new medical protocol MESETP (Medical Services Transport Protocol), that underlies data delivery for both real-time and non real-time medical services. Furthermore, performance tests of MESETP with existing real time protocols and non real-time protocols used by existing medical services are examined and comparison results are presented.
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSijngnjournal
Wireless Body Area Networks (WBAN) is the recent trend for localized and personalized medical services. For that purpose, several tele-medicine architectures and WBAN frameworks for patient monitoring have been proposed.This paper presents a new medical protocol MESETP (Medical Services Transport Protocol), that underlies data delivery for both real-time and non real-time medical services. Furthermore, performance tests of MESETP with existing real time protocols and non real-time protocols used by existing medical services are examined and comparison results are presented.
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...ijdpsjournal
Our planet is abundant with raw data and to monitor the available data properly, processing of the enormous raw data is very vital. One of the key things in development of mankind and the nature is to acquire as much data as possible and to react appropriately in accordance with the studied data. It’s nothing but diagnosis of the physical world by studying the data acquired from them in order to take proper measures that can help in treating them better. Large volume of data incurs high energy consumption for its transmission and thus results in decrease of overall network lifetime.
Wireless Sensor Network (WSN) is a collection of multiple sensor nodes that all together forms a network for transmitting data acquired by each sensor node to sink known as Base Station (BS). In hierarchical routing acquired data are sent via relay agents like Cluster Heads (CH). The Cluster Heads must be customised with computations and formulations, which will help in aggregating the gathered data, in order to reduce energy consumption while transmitting the data further in the network while maintaining the data integrity to withhold the significance of every single value in a data set.
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...ijdpsjournal
The document discusses consensus based data aggregation for energy conservation in wireless sensor networks. It proposes a technique to reduce the size of data frames during transmission to reduce energy consumption and increase network lifetime. The technique performs data aggregation at the bit level at cluster heads to include the significance of all data bits while reducing the packet size. This consensus based aggregation algorithm is then used to modify the LEACH (Low-Energy Adaptive Clustering Hierarchy) routing protocol to improve network performance and energy conservation. The methodology uses machine learning to determine a threshold to identify the most common bits and represent the cluster data with a single value. This helps reduce transmissions and energy use while maintaining data integrity across the wireless sensor network.
This document discusses data mining algorithms for clustering healthcare data streams. It provides an overview of the K-means and D-stream algorithms, and proposes a framework for comparing them on healthcare datasets. The framework involves feature extraction from physiological signals, calculating risk components, and applying the K-means and D-stream algorithms to cluster the data. The results would show the effectiveness and limitations of each algorithm for clustering streaming healthcare data.
Wearable sensor network for lower limb angle estimation in robotics applicationsTELKOMNIKA JOURNAL
In human-robot interaction, sensors are relevant in guaranteeing stability and high performance in real-time applications. Nonetheless, accuracy and portable sensors for robots usually have high costs and little flexibility to process signals with free software. Therefore, we propose a wearable sensor network to measure lower limb angular position in human-robot interaction systems. The methodology employed to achieve the aim consisted in implementing a wireless network using low-cost devices, verifying design requirements, and making a validation via a proof of concept. The requirements to design the network include low loss of information, real-time communication, and sensor fusion to estimate the angular position using a gyroscope and accelerometer. Hence, the sensor network developed has a client-server architecture based on ESP8266 microcontrollers. In addition, this network uses the standard 802.11 b/g/n to transmit angular velocity and acceleration measures. Furthermore, we implement the user datagram protocol (UDP) protocol to operate in real-time with a sample time of 10 ms. Finally, we implement a proof of concept to show the system’s effectiveness. Thus, we use the Kalman filter to estimate the angular position of the foot, shin, thigh, and hip. Results indicate that the implemented sensor network is suitable for real-time robotic applications.
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Bas...acijjournal
This document discusses adaptive real-time data mining techniques for wireless body area networks used in healthcare applications. It presents an innovative framework called Wireless Mobile Real-time Health care Monitoring (WMRHM) that applies data mining to physiological signals acquired through wireless sensors to predict a patient's health risk. Key challenges addressed include the continuous and changing nature of real-time data streams, which require efficient concept-adapting algorithms to handle concept drift. The paper reviews state-of-the-art approaches and introduces five algorithms for tasks like ensemble classification, concept drift detection and adaptation that are suitable for mining real-time physiological signals to support healthcare predictions and decisions.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
This document provides a review of synthetic aperture radar (SAR) engineering. It begins with an introduction to SAR and its uses in remote sensing and defense. It then discusses designs for SAR systems and antennas. The document reviews recent literature on SAR, including works discussing antenna mask design to optimize SAR performance, polarimetric SAR for mapping terrain changes, and using SAR to monitor cryospheric regions. It concludes that SAR is a useful technique for achieving good image quality through optimized antenna design.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. IV (May – Jun. 2015), PP 22-31
www.iosrjournals.org
DOI: 10.9790/0661-17342231 www.iosrjournals.org 22 | Page
Energy Efficiency in Key Management of Body Sensor Network
Shilpa Bansal1
, Prof. Dinesh Kumar2
1
(Mtech-CSE Student, GZS-PTU Campus, Bathinda, Punjab, India)
2
(Assistant Professor Department of CSE, GZS-PTU Campus, Bathinda, Punjab, India)
Abstract: In this research, we have developed an algorithm that maintains the shape and integrity of the Bio-
Signal over Body- Sensor Network. A new approach has been experimented successfully using set theory
operators (union, intersection, complement, Cartesian product) instead of using traditional interpolation
method for maintenance of original properties of Bio-signal and synchronization. A secure key management
scheme is used to enhance the security of wireless body area network (WBAN) and energy analysis is also done.
The operational resources of biosensor nodes in BSNs are very restricted, and traditional security technologies
are not directly applicable to BSNs. Due to characteristics of biosensors, time synchronization and low-energy
communication are two challenging problems for BSNs. Various cryptography techniques are employed in
order to provide security as the information exchanged during health monitoring are highly sensitive and
require strict protection from unauthorized access.
Keywords: Body Sensor Network, Energy Consumption.
I. Introduction
The data generated from the continuous monitoring [3] from the body sensors consist of sequence of
data items thereafter referred to as a data stream. Data stream generally enter the program of monitoring stream
from multiple body sensors, each data item is processed for limited time period before it is discarded or
analyzed. Many medical devices have added [10] communication capabilities into existing products. In typical
scenario, access point would act as a patient-side hub, which relays stored readings form medical devices to
remote center for store and forward monitoring, analysis and disease management. The main function is to
measure or determine the [15] presence of some physical quantity that may be useful for diagnostic purposes.
The choice of proper parameters which have high information content is an important issue in the patient
monitoring system. One of the wireless standards known as advanced and adaptive network technology (ANT)
[16] has received significant attention especially for sports and health application. The system consist of ECG,
signal collection node, blood oxygen signal [7] collection node, inertial sensor node, receiving node and upper
computer software. The 3 nodes collect ECG signals, blood O2 signal, motion signals. The collected signals are
transmitted wirelessly to receiving node and analyzed by software in computer in real time. The structure of
data stream need to be in steady state, in regular and predictable order [19]. The data from body sensors must
allow dynamic modification occasionally [17] (key management/exchange) etc. Sometimes, re-initialization,
rebooting, time lag occurs due to multiple reasons. High performance is expected, in real time [3] constrain that
must be satisfied by specific health application in terms of latency/throughput. In Wireless body area network
(WBAN) [8], small electronic devices are attached with human body to monitor specific health related problem
such as blood sugar level, organ movement etc. It has high cost of synchronization. The data stream generated
by body sensors is basically a Time Series Data Set. A wireless sensor node generally has limited storage and
computation capabilities, [4] also severely constrained power supplies. Limited work is reported on identifying
anomalies in such kind of time series database, which result in low commitment in synchronization. There a
reference based time series analysis is required so that, the shape of bio signals remain intact. There are three
possible ways of synchronization: Union, Intersection and Uniform. These methods offer a better alternative to
interpolation method as reference or perfect time series is used for shape and synchronization of the bio signals.
However, energy consumption need to be observed and taken into consideration for selecting one of the best out
of these three methods. Another thing that becomes extremely important is security [18], when wireless sensor
network are deployed in a hostile environment. In order to provide security, wireless communication should be
authenticated and encrypted. Key management is the main problem in wireless sensor network (WSN) when
concentrated on security. The key management scheme proposed should be scalable to increase in sensor nodes
substantially and also its dynamic nature.
II. Related Work
In this section, we have solicited some journals. From basics to advanced knowledge is analyzed in it.
1) In this paper, a data logger was designed to have 4 layers i.e. application, disc operating system, driver,
hardware. Each layer completes its functionality by using the resources of its lower layers. By only
2. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 23 | Page
changing application layer firmware, data logger can be used in several applications, without modifying
lower level driver and hardware layer. The mathematical relationship between number of retry and
frequency has been shown. From graph it was depicted that value of retries was above 0.3 resulted in
highest possible value.
2) This paper investigated a mobile multimedia system through combining various technologies such as
wireless sensor network, embedded multimedia system and node mobility. It also investigated the
employment of some powerful sensor mode which was equipped with both mobility and multimedia
functionalities. Here, multimedia sensor node was exploited to enhance the sensor network capability for
event description. The trade offs of end to end delay and energy consumption for supporting multimedia
service with delay QoS requirement was discussed. The results showed efficiency of mobile multimedia
geographic routing (MGR) in satisfying QoS requirement while saving energy. The delay requirement TQoS
was set to 0.035s. GPRS paths had various delays ranging from 0.014s to 0.035s. By comparison, most
delays in MGR change from 0.025s to 0.035s.
3) A WBAN can monitor vital signs, providing real time feedback for enabling many patients’ diagnostics
procedures via continuous monitoring of chronic conditions or recovery progress from an illness or surgical
procedure. This paper developed a delay modeling framework for store-and-forward packet routing in
WBANs. Using a prototype WBAN for experimentally characterizing and capturing on body topology
traces, an analytical delay modeling technique was developed for evaluating single-copy DTN routing
protocol.
4) A wireless sensor mode generally has limited storage and computation capabilities, also restricted power
supplies. In this paper, comparing was done between both wired data collection and other application of
WSN’s. WSN has been applied to many applications since emerging and data collection was one of the
most important applications among them. Each sensing data was collected continuously at each node and
forwarded to central base station for further processing. Also, approaches were discussed for message
disseminations, which were critical component for network control and management and thus affected
performance of data collection of WSN’s.
5) In this paper obstructive sleep apnea (OSA) was discussed which is a common sleep disorder. Continuous
positive airway pressure (CPAP) has emerged as a standard therapy for OSA, a majority of patients were
not tolerant to this treatment, largely because of uncomfortable nasal air delivery during their sleep. An
approach had been developed to provide 1-3 min ahead early warning of an impending sleep apnea episode
based on using wearable wireless multisensory suite and a novel non-linear non-stationary process
prediction method. Also longest vertical length (LVL) of recurrence plot and normalized power spectral
density (NPSD) were most sensitive feature for OSA.
6) This research paper deals with the area of emotional detection using a BSN in car. It used empirical
evidence. It had proposed an architecture describing how the BSN could be integrated into vehicular ad-hoc
network (VANETs) in order to analyze driver’s emotion.
7) The purpose of this paper was to develop a health monitoring system that could measure human vital signs
and recognize human activity based on BSN. The system consisted of ECG signal collection node, blood
oxygen signal collection node, inertial sensor node, receiving node and upper computer software. The 3
collection nodes collect ECG signals, blood O2 signal, motion signal. Collected signals are transmitted
wirelessly to receiving node and analyzed by software in computer in real time. Result shows that system
can simultaneously monitor human ECG, heart rate, pulse rate, SPO2 and recognize human activity.
8) In WBAN, small electronic devices were attached with human to monitor specific health related problem
such as blood pressure, blood sugar level and organ movement. This concept was presented to facilitate
healthcare issues distantly or to monitor athletes. WBAN consisted of sensors which collected health related
data and communicate that data to medical servers so that it could be analyzed and monitor the patient
health parameters or to track their fatigue and muscle stress. Mathematical representation of data was
depicted in graph.
9) The paper presented design and development of body sensor network for posturometric studies comprising
a wireless precision balance and number of other wireless sensing such as accelometers and EMG. The data
measured by this BSN was synchronically sent to laptop by Bluetooth 4.0 transreceivers in order to measure
and study the postural alternations of human body.
10) Worlds rapidly ageing population and its burden on healthcare system, were one of intense areas of
development in mHaelth were continuous patient monitoring. It required careful integration of wearable
sensors and wireless body sensor network. A lot many medical devices had added communication
capabilities into existing products. In typical scenario, access point would have acted as a patient-side hub,
which relayed stored reading from medical devices to a remote center for store and forward monitoring,
analysis and disease management.
3. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 24 | Page
11) The aim of this research was to implement and test the propagation of health monitoring system. The
system consisted of body central unit with Bluetooth module and wearable sensors. The system included
custom designed transmission protocol and remote web-based GUI for remote real time data analysis. For a
group of humans who performed various activities showed maximum 5% absolute error compared to
certified medical devices. The results were promising and indicated that developed wireless wearable
monitoring system faced challenges of multi-sensor human health monitoring during performing daily
activities and opened new opportunity in developing novel healthcare services.
12) According to survey, cardiovascular diseases were major causes of death world-wide. Due to increase in
cardiac diseases, miniaturized and energy efficient remote cardiac monitoring system was required. To
develop an activity aware energy efficient priority based multi-patient monitoring protocol for BSN, to
monitor physiological signals continuously. The protocol must be adopted to allow new connections and to
renegotiate the node services. The protocol was implemented on shimmer nodes and ECG signals of N
patients were monitored. The reconfiguration of the nodes priority and sampling rate based on health
condition of patient were demonstrated. A comparison of energy consumption, packet delivery ratio and
battery lifetime was made. Energy consumption and nodes lifetime were the parameters that needs to be
optimized.
13) According to this paper, worldwide population is increasing and area is becoming lesser, it had become a
challenge for medical associates to take care of patients by calling in the hospital and personally checking
them. With advancements in micro-electro-mechanical sensors (MEMs) technology and wireless
communication, this problem has got a solution by implementation of remote health monitoring system.
14) The main function was to measure or determine the presence of some physical quantity that may be useful
for diagnostics purposes. The choice of proper parameters which has high information content is an
important issue in the patient monitoring system. By use of respective sensors the body temperature, heart
rate, ECG and blood pressure of a person by taking the average of reading by fixing maximum and
minimum values and the data was transferred to microcontroller. The transmitted digital data after
conversation from analog data by ADC, the data stored in EPROM and then data was displaced.
15) WSN for monitoring of track cycling performance will be presented. One of the wireless standards known
as advanced and adaptive network technology (ANT) has received significant attention especially for sport
and health application. Low power micro-controller will be incorporated into the design, which would be
used to acquire the bike parameters for on-site analysis. Energy- efficiency was achieved by decreasing the
message rate and broadcast data transmission mode was selected.
16) Security becomes extremely important when wireless sensor network were deployed in a hostile
environment. In order to provide security, wireless communication should be authenticated and encrypted.
Key management was main problem in WSN when concentrated on security. The key management scheme
proposed should be scalable to increase in sensor nodes substantially and also its dynamic nature.
Asymmetric key management strategies were not suitable for WSN as it operates on limited battery life. In
proposed system, key management was provided for privacy and simultaneously validated for security
measures. System performance improved key management scheme by positioning the new mode and
forming head for multi-cluster to replace the failed relay nodes. The private key, multi-cluster key, primary
key and structure key are used to encrypt every message passed within improved key management scheme.
The improved key management scheme acquires 4-5% improved security with lesser execution time and
communication energy consumption.
17) World population growth was facing 3 major challenges: demographic peak of baby boomers, increase of
life expectancy leading to ageing population and rise in healthcare costs. Millions of people die due to some
fatal diseases; this was because many people experience the symptoms and have disease diagnosed to late.
So future healthcare system should provide proactive wellness management and concentrate on early
detection and prevention of disease. WBANs will allow for continuous monitoring of patients in medical
applications capable of early detection of abnormal condition resulting in major improvements in quality of
life.
18) An increase in world population along with a significant ageing portion was facing rapid rises in healthcare
costs. The healthcare system was going through a transformation in which continuous monitoring of
inhabitants was possible even without hospitalization. Wearable sensors detect abnormal or foreseen
situations by monitoring physiological parameters along with other symptoms.
19) This research paper was concerned with the design and implementation of WBAN based prototype system
for based prototype system for monitoring mobile user’s physical activities and health status via internet.
WBAN was becoming a major technological trend for ambulatory and prolonged body monitoring. A
durable, low cost, light weight and compact WBAN system for remote monitoring was fully possible.
4. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 25 | Page
III. Methodology
Initialize Network Parameters
(Network Topology)
Initialize Energy Parameters
(EC, ET,ER)
kk
Initialize Signal Stimuli
(Heart Variability Data)
Initialize Key Parameters
(Private, Public)
Process Bio Signals
Run Synchronization Algorithm
Run Key Exchange Scheme
Recollect & Collect Data of Bio Signal
Analyze Signal Properties and
Energy Cost
Evaluate Performance
Body Sensor Network
5. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 26 | Page
In this research we explain the process of conducting this research,
The first step in this is to build a body sensor network (BSN). BSN is also referred to as body area
network (BAN). BAN devices, may be embedded inside the body, implants may be surface mounted on a body
in a fixed position wearable technology or may be accompanied devices which humans can carry in different
positions, in clothes pocket, by hand or in the bag.
The second step is to initialize various network parameters like no. of sensors, minimum battery life
required, topologies used, routing protocol etc.
The third step leads to initializing various energy parameters like ER, EC, ET etc i.e. receiving energy,
consumption energy, and transmission energy respectively. It can be shown as a formula as E= ER+EC+ET .
In the fourth step physio.net based dataset of bio-signal are loaded and initialize signal stimuli.
The fifth step includes key parameters like minimum size of keys, hash keys etc are initialized.
The sixth step involves processing of bio-signals to check time- lag and magnitude of sensors.
The seventh step runs some synchronization algorithms. This is basically done to reduce time-lag.
The eighth step exchanges the various keys in order to communicate over the network.
In the ninth and tenth step respectively data is collected and graphs are plotted to analyze signal
properties and energy cost. In the last step, performance is evaluated.
IV. Results
In this section we shall explain the evaluation process done on the implementation steps conducted as
experiments. This section also covers graphical presentation of the data analyzed related to energy and
effectiveness of the proposed algorithm as compared to previous algorithm.
4.1) Energy Consumption Parameters:
4.1.1) Energy Consumption in Key Generation: Key generation is the process of generating keys for
cryptography. More the keys generated more will be the energy consumed.
Table: 1 Energy Consumption in Key Generation (Data in Sending) in n-J
Table: 2 Energy Consumption in Key Generation (Data in Receiving) in n-J
4.1.2) Energy Consumption in Key Distribution: Key distribution is the process of distributing the keys. In
this process both parties must possess secret keys which they must exchange prior to using any encryption.
6. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 27 | Page
Table: 3 Energy Consumption in Key Distribution (Data in Sending) in n-J
Table: 4 Energy Consumption in Key Distribution (Data in Receiving) in n-J
4.1.3) Energy Consumption in Key Encryption: Encryption is the process which uses two keys i.e. private
and public. Private Key is owned by just one person and public key is known to everyone. This is done to
provide security to the information.
4.1.4) Energy Consumption in Key Decryption: Decryption is the process to decrypt the encrypted data.
This can be done respectively with private and public keys.
4.1.5) Energy Consumption in Key Exchange: It is a process of cryptography by which cryptographic keys
are exchanged between two parties.
Table: 5 Energy Consumption in Key Exchange (Data in Sending) in n-J
7. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 28 | Page
Table: 6 Energy Consumption in Key Exchange (Data in Receiving) in n-J
4.1.6) Energy Consumption in Key Storage: It is the process of storing the values if the keys. More the no.
of keys more is the storage is required, hence more is the energy consumed.
V. Graphical Interpretation
Analysis:
a) From the above table it can be inferred that fuzzy commitment key generation and proposed key
generation consumes almost similar energy as the size of network increases so the no. of keys generation
increases. Hence, no. of keys generated is directly proportional to network size.
Fig: 1 Energy Consumption in Key Generation (Data in Sending)
Fig: 2 Energy Consumption in Key Generation (Data in Receiving)
8. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 29 | Page
b) In this comparison, it is observed that fuzzy commitment key distribution scheme consumes less energy as
compared to proposed scheme. This may be because as bandwidth and size of network involved.
Fig: 3 Energy Consumption in Key Distribution (Data in Sending)
Fig: 4 Energy Consumption in Key Distribution (Data in Receiving)
c) Form the comparison table and graphs it can be said that fuzzy commitment key encryption consumes less
energy as compared to proposed system as from graphs it can be depicted that more energy is consumed as
more key refreshes are required.
d) Form the comparison table and graphs it can be said that fuzzy commitment key decryption consumes less
energy as compared to proposed system as from graphs it can be depicted that more energy is consumed as
more key refreshes are required.
e) It is clear from the above table and graph that fuzzy commitment key exchange is consuming less energy as
compared to proposed energy. This may be attributed to multiple factors.
9. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 30 | Page
Fig: 5 Energy Consumption in Key Exchange (Data in Sending)
Fig: 6 Energy Consumption in Key Exchange (Data in Receiving)
f) If there is the less time lag and signals reach with their integrity intact, the keys are exchanged less, this
leads to wastage of energy.
VI. Discussions
According to the observations we can say that energy consumption can be reduced by reducing no. of
key exchanges and better synchronization process. Similarly we can also say for the storage as we know that
storage is directly proportional to no. of keys generated. The main issue in BSN is to maintain security as data
incurred in BSN is highly sensitive and could be tampered easily. High the security required, high is the key
generation and more is key exchange and more is energy consumption. Hence it becomes necessary to have
energy efficient algorithms so that system becomes cost effective.
VII. Conclusions
It can be concluded that energy consumption can be reduced by reducing no. of key exchange, as it is
observed that no. of key generated is directly proportional to network size hence energy consumption increases
as no. of key increases. The main challenge arises to design such networks that have low cost and low energy
10. Energy Efficiency in Key Management of Body Sensor Network
DOI: 10.9790/0661-17342231 www.iosrjournals.org 31 | Page
consumption. The key goal is to reduce the data transmission cost which is achieved by proposed scheme which
can be easily depicted from the graphs and in the results shown.
Future Scope
The Body Sensor Networks runs without human intervention, they need machine-to-machine
authentication protocol to maintain security. Therefore, future work may be preceded in the direction of building
protocols that incorporate ‘zero proof’ algorithms. Also, the above proposed scheme is limited to a bounding
environment within a particular environment. Therefore, the future direction of this research is to devise an
algorithm for the unbounded environment in which patient moves freely and may get in range of other BSN in
the outside environment and then couple it with the synchronization and energy efficient algorithm to form a
complete energy efficient key management scheme.
References
[1]. Khan, Tareq Hasan, and Khan A. Wahid. "An advanced physiological data logger for medical imaging applications." EURASIP
Journal on Embedded Systems 2012, no. 1 (2012): 1-14.
[2]. Chen, Min, Chin-Feng Lai, and Honggang Wang. "Mobile multimedia sensor networks: architecture and routing." EURASIP
Journal on Wireless Communications and Networking 2011, no. 1 (2011): 1-9.
[3]. Quwaider, Muhannad, Mahmoud Taghizadeh, and Subir Biswas. "Modeling on-body dtn packet routing delay in the presence of
postural disconnections." EURASIP journal on wireless communications and networking 2011 (2011): 3.
[4]. Begonya, Otal, Alonso Luis, and Verikoukis Christos. "Design and analysis of an energy-saving distributed mac mechanism for
wireless body sensor networks." EURASIP Journal on Wireless Communications and Networking 2010 (2010).
[5]. Le, T.Q.; Changqing Cheng; Sangasoongsong, A.; Wongdhamma, W.; Bukkapatnam, S.T.S., "Wireless Wearable Multisensory
Suite and Real-Time Prediction of Obstructive Sleep Apnea Episodes," Translational Engineering in Health and Medicine, IEEE
Journal of , vol.1, no., pp.2700109,2700109, 2013
[6]. Rebolledo-Mendez, Genaro, Angelica Reyes, Sebastian Paszkowicz, Mari Carmen Domingo, and Lee Skrypchuk. "Developing a
body sensor network to detect emotions during driving." Intelligent Transportation Systems, IEEE Transactions on 15, no. 4 (2014):
1850-1854.
[7]. Zhao, Cong, and Sen Qiu. "A system of human vital signs monitoring and activity recognition based on body sensor network."
(2014).
[8]. Alrajeh, Nabil Ali, Jaime Lloret, and Alejandro Canovas. "A Framework for Obesity Control Using a Wireless Body Sensor
Network." International Journal of Distributed Sensor Networks 2014 (2014).
[9]. Sala, Marco, Paolo Cunzolo, and Diego Barrettino. "Body sensor network for posturometric studies." In Instrumentation and
Measurement Technology Conference (I2MTC) Proceedings, 2014 IEEE International, pp. 536-541. IEEE, 2014.
[10]. Hung, Kevin, C. C. Lee, and Sheung-On Choy. "Ubiquitous Health Monitoring: Integration of Wearable Sensors, Novel Sensing
Techniques, and Body Sensor Networks." In Mobile Health, pp. 319-342. Springer International Publishing, 2015.
[11]. Kantoch, E., P. Augustyniak, M. Markiewicz, and D. Prusak. "Monitoring activities of daily living based on wearable wireless body
sensor network." In Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the
IEEE, pp. 586-589. IEEE, 2014.
[12]. Sudha, G. Florence, S. Karthik, and N. Selva Kumar. "Activity aware energy efficient priority based multi patient monitoring
adaptive system for body sensor networks." Technology and Health Care 22, no. 2 (2014): 167-177.
[13]. Dangi, Kusum Grewal, and Supriya P. Panda. "Challenges in Wireless Body Area Network-A survey." In Optimization, Reliabilty,
and Information Technology (ICROIT), 2014 International Conference on, pp. 204-207. IEEE, 2014.
[14]. Subudhi, Ch Sandeep Kumar, and S. Sivanandam. "Intelligent Wireless Patient Monitoring and Tracking System (Using Sensor
Network and Wireless Communication)." International Journal 1, no. 3 (2014): 97-104.
[15]. Gharghan, Sadik Kamel, Rosdiadee Nordin, and Mahamod Ismail. "Design Consideration of an Energy Efficient Wireless Sensor
Network for High Performance Track Cycling." In Information Science and Applications (ICISA), 2014 International Conference
on, pp. 1-5. IEEE, 2014.
[16]. Nagarajan, N., and Ahmad Taher Azar. "An Improved Key Management Scheme with High Security in Wireless Sensor Networks."
In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 249-264. Springer Berlin Heidelberg, 2014.
[17]. Movassaghi, Samaneh, Mehran Abolhasan, Justin Lipman, David Smith, and Abbas Jamalipour. "Wireless body area networks: a
survey." (2014): 1-29.
[18]. Mukhopadhyay, S. "Wearable Sensors for Human Activity Monitoring: A Review." (2015).
[19]. Meena, R., S. Ravishankar, and J. Gayathri. "Monitoring Physical Activities Using WBAN." International Journal of Computer
Science & Information Technologies 5, no. 4 (2014).