Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
The document discusses the Internet of Things (IoT), which is a network of physical objects embedded with sensors, software and other technologies that enables them to connect and exchange data. IoT allows objects to be remotely monitored and controlled via existing network infrastructure, creating opportunities to directly integrate the physical world with computer systems to improve efficiency. IoT refers to a wide variety of connected devices including medical implants, farm animal tags, sensors in cars and environmental monitoring devices.
Revised edition of IoT with more knowledge ,advantages of iot,results of iot,methodology,block diagram,flowchart of iot,details of hardware and software,details of sensor and powerfull features with diagram ,digramatical representation of iot will found very useful to the beginners also .domain iot in healthcare
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
Mr. Sanjay Dhandare presented a seminar on developing an advanced health care system using the Internet of Things. The presentation discussed monitoring various body parameters using a body area network and transmitting the data via IoT. It proposed objectives like establishing communication between patients and relatives, integrating sensors to monitor temperature, pulse and acceleration. The methodology included a literature review, selecting a controller, interfacing sensors and transmitting data wirelessly. Benefits included speeding communication, immediate alerts in emergencies and reduced mortality. The system was concluded to help reduce deaths by enabling monitoring and alerts during health issues.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
The document discusses the Internet of Things (IoT), which is a network of physical objects embedded with sensors, software and other technologies that enables them to connect and exchange data. IoT allows objects to be remotely monitored and controlled via existing network infrastructure, creating opportunities to directly integrate the physical world with computer systems to improve efficiency. IoT refers to a wide variety of connected devices including medical implants, farm animal tags, sensors in cars and environmental monitoring devices.
Revised edition of IoT with more knowledge ,advantages of iot,results of iot,methodology,block diagram,flowchart of iot,details of hardware and software,details of sensor and powerfull features with diagram ,digramatical representation of iot will found very useful to the beginners also .domain iot in healthcare
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
Mr. Sanjay Dhandare presented a seminar on developing an advanced health care system using the Internet of Things. The presentation discussed monitoring various body parameters using a body area network and transmitting the data via IoT. It proposed objectives like establishing communication between patients and relatives, integrating sensors to monitor temperature, pulse and acceleration. The methodology included a literature review, selecting a controller, interfacing sensors and transmitting data wirelessly. Benefits included speeding communication, immediate alerts in emergencies and reduced mortality. The system was concluded to help reduce deaths by enabling monitoring and alerts during health issues.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
This document summarizes a research paper that proposes a new e-healthcare information system based on an Android application. The paper discusses limitations of existing systems including errors, lack of access to patient information, and delays. It proposes a new system using Android mobile devices, wearable sensors to monitor biometrics, machine-to-machine communication, and a service-oriented architecture. This would allow real-time sharing of patient data between doctors and patients regardless of location. It also discusses using evolutionary computing algorithms and multi-agent frameworks to optimize medical data quality and analysis in distributed environments. The proposed system aims to improve diagnosis, treatment decisions and access to healthcare.
The document discusses the potential for wireless body area networks (WBANs) and smart cards to impact health, social, and life sciences. It describes a 3-tier WBAN system for ubiquitous health monitoring and opportunities for computer-assisted rehabilitation and personalized healthcare. Key challenges include sensor size and power consumption, safety, security, and privacy. The document also outlines potential smart card applications for social networking and collaboration at conferences.
IRJET- Review on: A Wireless IoT System for Gait Detection in Stroke PatientIRJET Journal
This document summarizes a proposed wireless IoT system for gait detection in stroke patients. The system would use sensors embedded in a smart shoe to discreetly monitor a patient's insole pressure and acceleration during walking. The data collected from the shoe sensors and a smartphone's built-in sensors would be used to detect any abnormal or cautious gait patterns that could predict risk of falling. The system aims to warn patients about risky gaits and potentially prevent injuries. It discusses how IoT and wireless communication could help create a portable system to continuously monitor patients' gaits outside of a clinical setting.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
Real-time monitoring of the prototype design of electric system by the ubido...IJECEIAES
In this paper, a prototype DC electric system was practically designed. The idea of the proposed system was derived from the microgrid concept. The system contained two houses each have a DC generator and load that consists of four 12 V DC lamps. Each house is controlled fully by Arduino UNO microcontroller to work in Island mode or connected it with the second house or main electric network. House operating mode depends on the power generated by its source and the availability of the main network. Under all operating cases, the minimum price of electricity consumption should satisfy as possible. Information between the houses about the operating mode and the main network state was exchanging wirelessly with the help of the RFHC12. This information uploaded to the Ubidots platform by the Wi-FiESP8266 included in the node MCU microcontroller. This platform has several advantages such as capture, visualization, analysis, and management of data. The system was examined for different cases to verify its working by varying the load in each building. All tested states showed that the houses transfer from one mode to another automatically with high reliability and minimum energy cost. The information about the main grid states and the sources of the houses were monitored and stored at the Ubidots platform.
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET Journal
This document proposes a body sensor network system using a Raspberry Pi 3 that can monitor health parameters like temperature, heart rate, and detect emergencies by sending alerts to doctors and caregivers. The system uses various sensors connected to a Raspberry Pi 3 to measure vital signs, and if any parameters exceed thresholds, it sends notifications through WiFi to a server and alerts caregivers through SMS. The proposed system aims to remotely monitor patients in real-time using IoT technologies like sensors and cloud computing for improved healthcare.
This document summarizes a proposed architecture for remote patient monitoring using wireless sensor networks. The architecture allows virtual groups to be formed between patients, nurses, and doctors to enable remote analysis of patient data collected by wireless body area networks (WBANs). The patient data is transmitted through an underlying environmental sensor network to members of the virtual group. The proposed architecture addresses challenges of power supply for body sensor networks and quality of service guarantees.
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)AM Publications
This document discusses using wireless sensor networks (WSNs) for healthcare management. It proposes a smart gateway system that can bridge WSNs with public communication networks. The gateway is designed to perform some tasks like processing sensor data, determining patient health states, and sending emergency notifications to reduce the load on remote servers and networks. It integrates WSN, Wi-Fi, and GSM modules to communicate with sensor networks and send information to caregivers. The system aims to make healthcare management more proactive and cost-effective by enabling real-time patient monitoring using body-worn sensors and a gateway-based wireless network architecture.
Io t and cloud based computational framework, evolutionary approach in health...owatheowais
The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main advantages and novelties of the proposed system is the flexibility in computing the health application by using resources from available devices inside the body area network of the user. This proposed framework can be applied to other mobile environments, especially those where intensive data acquisition and high processing needs take place. Finally, we present a case study in order to validate our proposal that consists in monitoring footballers’ heart rates during a football match. The real-time data acquired by these devices presents a clear social objective of being able to predict not only situations of sudden death but also possible injuries.
The document describes a smart healthcare monitoring system for independent living. Some key points:
- The system collects data from sensors monitoring daily living activities, physiological signals, and the environment to determine a person's wellness and ability to live independently.
- Sensors are deployed throughout the home to monitor activities like using appliances, mobility, and vital signs. The data is analyzed to recognize patterns and forecast wellness.
- Wellness is determined based on indices measuring inactive time and excess usage of appliances. The indices are improved over time using dynamic thresholds.
- Patterns in sensor activity are analyzed to detect irregular behaviors that could indicate issues. Forecasting is used to predict daily activities and identify deviations.
Advance Diagnostic Tool for Android Devices: A Performance Analyzing Tool for...dbpublications
Abstract— this paper will provide the diagnostic tool solution for the measurement of values with proper units from various signals of Android Device. This application will be used for concluding the signal strength from various Transmitters; Trans receivers of mobile device. This includes GPS Receiver, Acceleration & Gravity Sensor, Rotation Sensor, Magnetic Sensors, Orientation Sensor, Relative Humidity Sensor, Proximity Sensor, Cell Network receivers & Wi-Fi Receiver. This paper provides the diagnostic tool for all the above said components of mobile device with appropriate units.
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
Implantable and medical devices (IMDs) have been advanced with the advancements in engineering and
medical science. IMDs are used for applying new therapies to patients, monitoring human body parameters
and making diagnosis as per the monitoring result. Increased use of IMDs has enhanced the chances of
attacks to them. Therefore, to make use of IMDs for various applications, they need to be secured. A system is
developed to achieve the security. The system monitors various human body parameters wirelessly and
detects anomaly if unauthorized node participates in communication. The system uses request response
protocol in wireless communication. Experiments show that body parameters can be successfully monitored
and signal characteristic can be used to detect anomaly.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
This document summarizes a research paper that conducted a comprehensive survey on using the Internet of Things (IoT) for smart healthcare monitoring of patients. The key aspects covered are:
1) IoT enables remote patient monitoring through wearable devices that allow healthcare professionals to monitor patients' conditions without being physically present.
2) The survey reviewed various existing works on IoT-based remote patient monitoring systems that transmit patients' health data like temperature and oxygen levels to doctors via wireless networks and mobile apps.
3) Ensuring patient privacy and security while monitoring and accessing health data remotely is an important challenge addressed in some of the existing research.
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
The use of the internet of things (IoT) in solar photovoltaic (PV) systems is a critical feature for remote monitoring, supervising, and performance evaluation. Furthermore, it improves the long-term viability, consistency, efficiency, and system maintenance of energy production. However, previous researchers' proposed PV monitoring systems are relatively complex and expensive. Furthermore, the existing systems do not have any backup data, which means that the acquired data could be lost if the network connection fails. This paper presents a simple and low-cost IoT-based PV parameter monitoring system, with additional backup data stored on a microSD card. A NodeMCU ESP8266 development board is chosen as the main controller because it is a system-on-chip (SOC) microcontroller with integrated Wi-Fi and low-power support, all in one chip to reduce the cost of the proposed system. The solar irradiance, ambient temperature, PV output voltage and PV output current, are measured with photo-diodes, DHT22, impedance dividers and ACS712. While, the PV output power is a product of the PV voltage and PV current. ThingSpeak, an opensource software, is used as a cloud database and data monitoring tool in the form of interactive graphics. The results showed that the system was designed to be highly accurate, reliable, simple to use, and low-cost.
The document analyzes the performance of IEEE 802.16d under the Stanford University Interim (SUI) channel model. It investigates the bit error rate of IEEE 802.16d using different SUI channel models and digital modulations like BPSK and QPSK. The results show the BER performance for different SUI channel models and modulations.
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
The most important stages in designing a
computer
network
in a
wider geographical area include:
definition of requirements, topological description
,
identification and calculation of relevant parameters
(
i
.
e
.
traffic matrix
)
, determining the shortest path between nodes, quantification of the effect of various
levels
of technical and technological development of urban areas involved, the cost of technology
,
and the
cost of services. The
se
parameters differ for WAN networks in different regions
–
their calculation depends
directly
on
the data “
i
n the field
”
: number of inhabitants, distance between populated areas,
network
traffic
density
,
as well as
available
bandwidth
. The
main
reason for identification and evaluation of these
parameters
is
to develop a model that could
meet the
constraints
im
posed by poten
tial beneficiaries.
In this
paper
,
we develop a methodology for planning and cost
-
modeling of a wide area network
and
validate it
in
a case study,
under the
supposition
that
behavioral interactions of individuals and groups play a significant
role and have
to be taken into consideration
by employing either simple or composite indicators of
socioeconomic status
.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
This document summarizes a research paper that proposes a new e-healthcare information system based on an Android application. The paper discusses limitations of existing systems including errors, lack of access to patient information, and delays. It proposes a new system using Android mobile devices, wearable sensors to monitor biometrics, machine-to-machine communication, and a service-oriented architecture. This would allow real-time sharing of patient data between doctors and patients regardless of location. It also discusses using evolutionary computing algorithms and multi-agent frameworks to optimize medical data quality and analysis in distributed environments. The proposed system aims to improve diagnosis, treatment decisions and access to healthcare.
The document discusses the potential for wireless body area networks (WBANs) and smart cards to impact health, social, and life sciences. It describes a 3-tier WBAN system for ubiquitous health monitoring and opportunities for computer-assisted rehabilitation and personalized healthcare. Key challenges include sensor size and power consumption, safety, security, and privacy. The document also outlines potential smart card applications for social networking and collaboration at conferences.
IRJET- Review on: A Wireless IoT System for Gait Detection in Stroke PatientIRJET Journal
This document summarizes a proposed wireless IoT system for gait detection in stroke patients. The system would use sensors embedded in a smart shoe to discreetly monitor a patient's insole pressure and acceleration during walking. The data collected from the shoe sensors and a smartphone's built-in sensors would be used to detect any abnormal or cautious gait patterns that could predict risk of falling. The system aims to warn patients about risky gaits and potentially prevent injuries. It discusses how IoT and wireless communication could help create a portable system to continuously monitor patients' gaits outside of a clinical setting.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
Real-time monitoring of the prototype design of electric system by the ubido...IJECEIAES
In this paper, a prototype DC electric system was practically designed. The idea of the proposed system was derived from the microgrid concept. The system contained two houses each have a DC generator and load that consists of four 12 V DC lamps. Each house is controlled fully by Arduino UNO microcontroller to work in Island mode or connected it with the second house or main electric network. House operating mode depends on the power generated by its source and the availability of the main network. Under all operating cases, the minimum price of electricity consumption should satisfy as possible. Information between the houses about the operating mode and the main network state was exchanging wirelessly with the help of the RFHC12. This information uploaded to the Ubidots platform by the Wi-FiESP8266 included in the node MCU microcontroller. This platform has several advantages such as capture, visualization, analysis, and management of data. The system was examined for different cases to verify its working by varying the load in each building. All tested states showed that the houses transfer from one mode to another automatically with high reliability and minimum energy cost. The information about the main grid states and the sources of the houses were monitored and stored at the Ubidots platform.
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET Journal
This document proposes a body sensor network system using a Raspberry Pi 3 that can monitor health parameters like temperature, heart rate, and detect emergencies by sending alerts to doctors and caregivers. The system uses various sensors connected to a Raspberry Pi 3 to measure vital signs, and if any parameters exceed thresholds, it sends notifications through WiFi to a server and alerts caregivers through SMS. The proposed system aims to remotely monitor patients in real-time using IoT technologies like sensors and cloud computing for improved healthcare.
This document summarizes a proposed architecture for remote patient monitoring using wireless sensor networks. The architecture allows virtual groups to be formed between patients, nurses, and doctors to enable remote analysis of patient data collected by wireless body area networks (WBANs). The patient data is transmitted through an underlying environmental sensor network to members of the virtual group. The proposed architecture addresses challenges of power supply for body sensor networks and quality of service guarantees.
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)AM Publications
This document discusses using wireless sensor networks (WSNs) for healthcare management. It proposes a smart gateway system that can bridge WSNs with public communication networks. The gateway is designed to perform some tasks like processing sensor data, determining patient health states, and sending emergency notifications to reduce the load on remote servers and networks. It integrates WSN, Wi-Fi, and GSM modules to communicate with sensor networks and send information to caregivers. The system aims to make healthcare management more proactive and cost-effective by enabling real-time patient monitoring using body-worn sensors and a gateway-based wireless network architecture.
Io t and cloud based computational framework, evolutionary approach in health...owatheowais
The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main advantages and novelties of the proposed system is the flexibility in computing the health application by using resources from available devices inside the body area network of the user. This proposed framework can be applied to other mobile environments, especially those where intensive data acquisition and high processing needs take place. Finally, we present a case study in order to validate our proposal that consists in monitoring footballers’ heart rates during a football match. The real-time data acquired by these devices presents a clear social objective of being able to predict not only situations of sudden death but also possible injuries.
The document describes a smart healthcare monitoring system for independent living. Some key points:
- The system collects data from sensors monitoring daily living activities, physiological signals, and the environment to determine a person's wellness and ability to live independently.
- Sensors are deployed throughout the home to monitor activities like using appliances, mobility, and vital signs. The data is analyzed to recognize patterns and forecast wellness.
- Wellness is determined based on indices measuring inactive time and excess usage of appliances. The indices are improved over time using dynamic thresholds.
- Patterns in sensor activity are analyzed to detect irregular behaviors that could indicate issues. Forecasting is used to predict daily activities and identify deviations.
Advance Diagnostic Tool for Android Devices: A Performance Analyzing Tool for...dbpublications
Abstract— this paper will provide the diagnostic tool solution for the measurement of values with proper units from various signals of Android Device. This application will be used for concluding the signal strength from various Transmitters; Trans receivers of mobile device. This includes GPS Receiver, Acceleration & Gravity Sensor, Rotation Sensor, Magnetic Sensors, Orientation Sensor, Relative Humidity Sensor, Proximity Sensor, Cell Network receivers & Wi-Fi Receiver. This paper provides the diagnostic tool for all the above said components of mobile device with appropriate units.
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
Implantable and medical devices (IMDs) have been advanced with the advancements in engineering and
medical science. IMDs are used for applying new therapies to patients, monitoring human body parameters
and making diagnosis as per the monitoring result. Increased use of IMDs has enhanced the chances of
attacks to them. Therefore, to make use of IMDs for various applications, they need to be secured. A system is
developed to achieve the security. The system monitors various human body parameters wirelessly and
detects anomaly if unauthorized node participates in communication. The system uses request response
protocol in wireless communication. Experiments show that body parameters can be successfully monitored
and signal characteristic can be used to detect anomaly.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
This document summarizes a research paper that conducted a comprehensive survey on using the Internet of Things (IoT) for smart healthcare monitoring of patients. The key aspects covered are:
1) IoT enables remote patient monitoring through wearable devices that allow healthcare professionals to monitor patients' conditions without being physically present.
2) The survey reviewed various existing works on IoT-based remote patient monitoring systems that transmit patients' health data like temperature and oxygen levels to doctors via wireless networks and mobile apps.
3) Ensuring patient privacy and security while monitoring and accessing health data remotely is an important challenge addressed in some of the existing research.
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
The use of the internet of things (IoT) in solar photovoltaic (PV) systems is a critical feature for remote monitoring, supervising, and performance evaluation. Furthermore, it improves the long-term viability, consistency, efficiency, and system maintenance of energy production. However, previous researchers' proposed PV monitoring systems are relatively complex and expensive. Furthermore, the existing systems do not have any backup data, which means that the acquired data could be lost if the network connection fails. This paper presents a simple and low-cost IoT-based PV parameter monitoring system, with additional backup data stored on a microSD card. A NodeMCU ESP8266 development board is chosen as the main controller because it is a system-on-chip (SOC) microcontroller with integrated Wi-Fi and low-power support, all in one chip to reduce the cost of the proposed system. The solar irradiance, ambient temperature, PV output voltage and PV output current, are measured with photo-diodes, DHT22, impedance dividers and ACS712. While, the PV output power is a product of the PV voltage and PV current. ThingSpeak, an opensource software, is used as a cloud database and data monitoring tool in the form of interactive graphics. The results showed that the system was designed to be highly accurate, reliable, simple to use, and low-cost.
The document analyzes the performance of IEEE 802.16d under the Stanford University Interim (SUI) channel model. It investigates the bit error rate of IEEE 802.16d using different SUI channel models and digital modulations like BPSK and QPSK. The results show the BER performance for different SUI channel models and modulations.
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
The most important stages in designing a
computer
network
in a
wider geographical area include:
definition of requirements, topological description
,
identification and calculation of relevant parameters
(
i
.
e
.
traffic matrix
)
, determining the shortest path between nodes, quantification of the effect of various
levels
of technical and technological development of urban areas involved, the cost of technology
,
and the
cost of services. The
se
parameters differ for WAN networks in different regions
–
their calculation depends
directly
on
the data “
i
n the field
”
: number of inhabitants, distance between populated areas,
network
traffic
density
,
as well as
available
bandwidth
. The
main
reason for identification and evaluation of these
parameters
is
to develop a model that could
meet the
constraints
im
posed by poten
tial beneficiaries.
In this
paper
,
we develop a methodology for planning and cost
-
modeling of a wide area network
and
validate it
in
a case study,
under the
supposition
that
behavioral interactions of individuals and groups play a significant
role and have
to be taken into consideration
by employing either simple or composite indicators of
socioeconomic status
.
The document summarizes a study on simulating a cognitive radio system using different wireless channel models. The study evaluated the performance of an energy detector for spectrum sensing in the cognitive radio system. Three channel models were considered: (1) Additive White Gaussian Noise channel, (2) Rayleigh fading channel, and (3) Rician fading channel. The simulation results showed that the detection capability of the energy detector improved with increasing signal-to-noise ratio, and the probabilities of false alarm and missed detection decreased. The Rician fading model, which includes a line-of-sight path, had a significant impact on energy detector performance compared to the other models.
The document summarizes a proposed scheme for rapid signal acquisition in direct sequence spread spectrum (DSSS) communication systems operating in high Doppler environments. The scheme uses time domain correlation of differential signals to estimate pseudo-noise (PN) code phase, followed by fast Fourier transform (FFT) to precisely estimate Doppler frequency. An area-efficient field programmable gate array (FPGA) architecture is presented that combines time and frequency domain approaches. The architecture achieves 52% area occupancy when synthesized for a Virtex-6 FPGA and operates at 134 MHz, allowing for fast signal acquisition needed in applications like missile guidance systems.
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...IJCNCJournal
This document analyzes and compares two algorithms for data gathering in mobile sensor networks:
1) Maximum Stability Spanning Tree-based Data Gathering (Max.Stability-DG) which determines data gathering trees that exist for the longest time by assuming knowledge of future topology changes.
2) Minimum Distance Spanning Tree-based Data Gathering (MST-DG) which determines data gathering trees based on the minimum distance spanning tree at each current time instant.
An exhaustive simulation study is conducted to analyze the impact of these algorithms on node lifetime, network lifetime, and coverage loss time due to node failures in mobile sensor networks.
Further results on the joint time delay and frequency estimation without eige...IJCNCJournal
Joint Time Delay and Frequency Estimation (JTDFE) problem of complex sinusoidal signals received at
two separated sensors is an attractive problem that has been considered for several engineering
applications. In this paper, a high resolution null (noise) subspace method without eigenvalue
decomposition is proposed. The direct data Matrix is replaced by an upper triangular matrix obtained from
Rank-Revealing LU (RRLU) factorization. The RRLU provides accurate information about the rank and the
numerical null space which make it a valuable tool in numerical linear algebra.The proposed novel method
decreases the computational complexity of JTDFE approximately to the half compared with RRQR
methods. The proposed method generates estimates of the unknown parameters which are based on the
observation and/or covariance matrices. This leads to a significant improvement in the computational load.
Computer simulations are included in this paper to demonstrate the proposed method.
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
Due to limited availability of spectrum for license
d users only, the need for secondary access by unli
censed
users is increasing. Cognitive radio turns out to b
e helping this situation because all that is needed
is a
technique that could efficiently detect the empty s
paces and provide them to the secondary devices wit
hout
causing any interference to the primary (licensed)
users. Spectrum sensing is the foremost function of
the
cognitive radio which senses the environment for wh
ite spaces. Energy detection is one of the various
spectrum sensing techniques that are under research
. Earlier it was shown that energy detection works
better under AWGN channel as compared to Rayleigh c
hannel, however the conventional spectrum sensing
techniques have a high probability of false alarm a
nd also show a better probability of detection for
higher
values of SNR. There is a need for a new technique
that shows a reduced probability of false alarm as
well
as an increase in the probability of detection for
lower values of SNR. In the present work the conven
tional
energy detection technique has been enhanced to get
better results.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
Though WLAN wireless network has been widely deployed as the main split-flow deployment of the
communication network, little study emphasizes its performance as WLAN protocols were only designed for
the public communicating conveniently with each other. Actually that too much wireless access points
assembling together will cause self-interference to the whole WLAN network. This paper investigates the
distributed coordination function (DCF) learn and the performance study of 802.11b networks. Firstly, our
study illustrates the performance of its MAC layer and its fairness issues related to DCF. Next we propose
the details which should be paid attention to in deploying network services. Then, performance analyses
are evaluated by simulation and real test for a dense wireless network. Our main goal is to give proposals
to network operators how to design a WLAN network more standardized and orderly.
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...IJCNCJournal
Orthogonal frequency division multiplexing (OFDM) is a technique which gives high quality of service (QOS) to the users by mitigating the fading signals as well as high data rates in multimedia services. However, the peak-to-average power ratio (PAPR) is a technical challenge that reduces the efficiency of RF power amplifiers. In this paper, we propose the combined Hadamard transform and modified meu-law companding transform method in order to lessen the effects of the peak-to-average power ratio of the
OFDM signal. Simulation results show that the proposed scheme reduces PAPR compared to other companding techniques as well as the Hadamard transform technique when used on its own.
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
This document summarizes a research paper that proposes a new programming model for wireless sensor networks. The programming model aims to find the best routing path between sensor nodes by coding the actual sensor nodes to perform tasks. The paper reviews existing programming models and requirements for sensor network programming such as energy efficiency, scalability, localization, and time synchronization. It then describes the proposed model and compares results from applying the model in different network topologies using multiple routing algorithms.
A fuzzy logic controllerfora two link functional manipulatorIJCNCJournal
This paper presents a new approach for designing a Fuzzy Logic Controller "FLC"for a dynamically multivariable nonlinear coupling system. The conventional controller with constant gains for different operating points may not be sufficient to guarantee satisfactory performance for Robot manipulator. The Fuzzy Logic Controller utilizes the error and the change of error as fuzzy linguistic inputs to regulate the system performance. The proposed controller have been developed to simulate the dynamic behavior of A
Two-Link Functional Manipulator. The new controller uses only the available information of the input-output for controlling the position and velocity of the robot axes of the motion of the end effectors
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal
This document discusses optimizing VoIP quality over wireless networks using a cross-layer call admission control scheme. It proposes monitoring real-time control protocol reports and data rates at the MAC layer to determine when quality is degraded. When quality degrades due to issues like network congestion or variable transmission rates, the solution is to adapt the packet size or codec type. The proposed scheme is simulated using a wireless campus network model to improve performance.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
ETOR-Efficient Token based Opportunistic RoutingIJCNCJournal
This paper proposes an Efficient Token based Opportunistic Routing called ETOR, which is an
improvement to the token based coordination approach for opportunistic routing proposed by Economy[1].
In Economy, method used for finding the connected candidate order chooses neighbor as the next
candidate by considering ETX of that neighbor towards the source but it does not consider the link
probability between the relay candidate and neighbor to be selected. ETOR proposes variant methods for
finding the connected candidate order in token based opportunistic routing by considering both the ETX
of the neighbor towards source as well as ETX of the relay towards sending candidate which avoids weaker
links between its intermediate nodes thereby improving the throughput and reducing the AA Ratio. We also
propose a solution for reducing the number of hops traversed by the token, which in turn increases the
token generation speed. Simulation results show that the proposed ETOR approaches perform better than
Economy approach in terms of AA Ratio, number of hops traversed by the token and number of token
traversals.
Security in Body Sensor Networks for Healthcare applicationsIOSR Journals
This document summarizes security issues related to body sensor networks used for healthcare applications. It discusses how body sensor networks can monitor patient health using small, wireless medical sensors. However, installing new healthcare technologies without proper security and privacy protections puts patient data at risk. The document reviews various security techniques that have been implemented for body sensor networks, including identity-based encryption and symmetric key schemes. It also summarizes several existing body sensor network projects for healthcare and areas for future research such as enhancing functionality, protocols, technologies, and network channel allocation to improve security and privacy in wireless healthcare applications.
Wireless Sensor Network: an emerging entrant in HealthcareIOSR Journals
This document discusses the potential for wireless sensor networks in healthcare applications. It describes how wireless sensor networks can be used to monitor patients remotely by collecting physiological data from sensor devices. Some challenges to the adoption of this technology in healthcare include ensuring privacy and security of medical data transmitted over wireless networks. The document also provides examples of how wireless body area networks and wearable sensor devices can help monitor aspects of health and enable at-home health monitoring.
This document summarizes literature on health care monitoring systems using wireless sensors and cloud storage. It discusses technologies like ZigBee, embedded microcontrollers, and Bluetooth that are used in wireless sensor networks to monitor patient vitals. The data collected is stored in the cloud and can be accessed by doctors. Challenges discussed include ensuring reliability, quality of service, security, and privacy of patient data. The literature proposes systems for continuous remote patient monitoring, early warning systems, and alerting doctors and caregivers of any issues.
This document summarizes a survey on wireless body area networks (WBANs). It begins by defining WBANs and their applications in health monitoring. It describes the typical architecture of a WBAN system, which consists of on-body and in-body sensor nodes that communicate wirelessly with a coordinator that transfers data to medical servers. The document then discusses some key differences between WBANs and traditional wireless sensor networks, such as lower node density and support for human mobility in WBANs. It also outlines several challenges for WBANs, such as limited power, security, interference, and regulatory requirements due to devices being implanted or worn on the human body. Finally, it provides examples of medical and
This document provides a survey of body sensor networks (BSNs). It discusses the key components of BSNs including sensors, data fusion, and network communication. Sensors are used to collect physiological and environmental information. Data fusion techniques integrate data from multiple sensors and extract useful information. Network communication involves transmitting sensor data to a base station. The document reviews research progress in these areas and applications of BSNs in fields like healthcare, sports, and social welfare. It identifies ongoing challenges for BSNs including improving sensor design, data fusion algorithms, network topology, and communication protocols.
Utilizing communication techniques in IoT-based healthcare monitoring systems...ssuser7256f7
This document reviews communication techniques used in IoT-based healthcare monitoring systems. It discusses technologies like Wi-Fi, Bluetooth, Zigbee and LoRaWAN that have been used in various healthcare monitoring applications. The key findings are:
1) Wi-Fi, Bluetooth and Zigbee have shorter ranges limited to indoor use, while LoRaWAN enables long-range communication for both indoor and outdoor monitoring.
2) Many systems integrate short-range technologies like Bluetooth with LoRaWAN to obtain longer communication ranges.
3) While Arduino Uno is commonly used, it has limitations like higher power consumption and need for external boards. ESP32 is presented as an alternative with integrated Wi
Predictive Data Mining for Converged Internet ofJames Kang
Kang, J. J., Adibi, S., Larkin, H., & Luan, T. (2016). Predictive data mining for Converged Internet of Things: A Mobile Health perspective. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 5-10). IEEE Xplore: IEEE. doi: http://dx.doi.org/10.1109/ATNAC.2015.7366781
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...IJSRD
Rapid expansion of wireless technologies permits continuous healthcare monitoring of mobile patients using compact biomedical wireless sensor motes. These tiny wearable devices –have limited amount of memory, energy, computation, & communication capabilities – are positioned on a patient; after that , they self-configure to create a networked cluster that is capable to continuously monitor important signs like blood pressure and flow, ECG, core temperature, the oxygen saturation, and CO2 concentration (i.e. for the respiration monitoring). The WBAN is an energizing innovation that guarantees to convey the human services to a novel level of the personalization. The scaled down sensors can be worn on body and they can non-rudely screen individual's physiological state. The numerous sensors speak with mobile utilizing the remote interfaces shaping WBAN. The WBANs empower checking a singular's wellbeing consistently in the free living conditions, where individual is allowed to direct his or her day by day action. In propose, design a enhance cluster based protocol.
This document describes a proposed Arduino-based human health care monitoring and control system. The system consists of three main units:
1. A sensor unit that acquires medical data like ECG, temperature, heart rate, and blood pressure from various sensors.
2. A controller unit (using an Arduino microcontroller) that compares the sensor data to normal values and can send control signals to the patient if abnormalities are detected.
3. A monitoring unit with an LCD display to show the sensor readings and system status.
The system is intended to continuously monitor vital health parameters and provide treatment or alerts if issues arise. This could help elderly or vulnerable people receive medical help and oversight without needing to be in a clinical setting
Survey of IOT based Patient Health Monitoring Systemdbpublications
The Internet of things has provided a promising opportunity and applications for medical services is one of the most important way or solution for taking care of population which is in rapid growth. Internet of things consists of communication and sensors; wireless body area network is highly suitable tool for the medical IOT device. In this survey we discuss mainly on practical issues for implementation of WBAN to health care service tool for the medical devices. The IoT applications are key enabling technologies in industries. A main aim of this survey paper is that it summarizes the present state-of-the-art IOT in industries and also in workflow hospitals systematically. In recent years wide range of opportunity and powerful of IOT applications are developed in industry. The health monitoring system is a big challenge for several researchers. In this paper introduced on the survey of different IOT applications are used for the health monitoring system. The IoT applications are used to decrease the problems which are related to health care system.
seminar report iot based health monitoring system 2023.pdfriddheshbore97
This document provides an overview of a seminar report on an IoT-based health monitoring system. The report was submitted by Prerna Ravi Shirsath for their Bachelor of Engineering degree. The report discusses the development of a system that measures a patient's body temperature, heartbeat, and oxygen saturation levels using sensors and sends the data to a mobile application via Bluetooth. It presents the architecture of an IoT health monitoring system which includes medical sensors, a smart gateway, and a back-end system. The report also covers the advantages of such systems in enabling remote monitoring and prevention, reducing healthcare costs, and improving treatment management. Some disadvantages around security, risk of failure, and cost are also discussed.
Implementation Of Real Time IoT Based Health monitoring systemkchakrireddy
The main aim of this project is to interconnect the available medical resources and offer smart, reliable, and effective healthcare service to elderly people. Health monitoring for active and assisted living is one of the paradigms that can use the IOT advantages to improve the elderly lifestyle in this project we present an IOT architecture customized for healthcare applications. The proposed architecture collects the data and relays it to the cloud where it is processed and analyzed. Feedback actions based on the analyzed data can be sent back to the user.
IRJET- Design and Implementation of Health Monitoring SystemIRJET Journal
This document summarizes the design and implementation of a health monitoring system. The system uses sensors like pulse, ECG and temperature sensors connected to an Arduino board to monitor a patient's health status. The sensor data is sent wirelessly to a cloud-based ThingSpeak server for storage and real-time monitoring via a mobile application. The system allows doctors to remotely monitor patients' health parameters like temperature, pulse and ECG from anywhere without needing to visit in-person.
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
Abstract: Wearable sensors that measure limb movements posture, and physiological conditions can yield high resolution quantitative data .It can be used to better understand the disease and develop more effective treatments. In existing, classification algorithm is used to extract the feature from sensor, so these feature selection may lead to rapid battery depletion due to the absence of computing complexity. The notion of power aware feature selection is proposed which aims at minimizing energy consumption also it considers the energy cost of individual features that are calculated in real time. A graph model is introduced to represent correlation and computing complexity of the features. The problem is formulated using integer programming and a greedy approximation is presented to select the features in a power efficient manner. Experimental results on thirty channels of activity data collected from real subjects demonstrate that an approach can significantly reduce energy consumption of the computing module, resulting in more than 30 percent energy savings while achieving 96.7 percent classification accuracy.
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET Journal
This document summarizes a research paper that proposes a mobile application using wearable devices to monitor heart rate and location. The application would send notifications to nearby individuals if abnormalities are detected in a user's heart rate or speed. It utilizes sensors in wearable devices to collect heart rate and speed data. If heart rate is high and speed is low, it would notify nearby emergency contacts that the user may need help. If heart rate and speed are both high during exercise, it would notify contacts the user is working out. It uses KNN and Bluetooth algorithms to identify and notify the nearest individuals. The proposed system aims to help users experiencing heart issues and promote safety.
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
Solar energy based blockchain enabled health care monitoring using IoTIRJET Journal
The document proposes a solar energy and blockchain-enabled health monitoring system using IoT. Medical sensors measure a patient's temperature and heart rate, and transmit the data to a cloud platform. Blockchain technology is proposed to securely store the data instead of the cloud to prevent malicious attacks. Solar energy is used to power the IoT devices to increase their battery life. This would allow for continuous remote patient monitoring and alerts to medical staff in emergencies. The system aims to improve healthcare access for remote populations in a reliable, secure and cost-effective manner.
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
Embedded systems in the range of from a tiny microcontroller-based sensor device to mobile smart phones
have vast variety of applications. However, in the literature there is no up to date system-level design of
embedded hardware and software, instead academic publications are mainly focused on the improvement
of specific features of embedded software/hardware and the embedded system designs for specific
applications. Moreover, commercially available embedded systems are not disclosed for the view of
researchers in the literature. Therefore, in this paper we first present how to design a state of art embedded
system including emerged hardware and software technologies. Bedside Patient monitor devices used in
intensive cares units of hospitals are also classified as embedded systems and run sophisticated software
and algorithms for better diagnosis of diseases. We reveal the architecture of our, commercially available,
bedside patient monitor to provide a design example of embedded systemsrelating to emerged technologies.
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
June 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Abstract: Accurate latency computation is essential for the Internet of Things (IoT) since the connected
devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not
an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while
still allowing communication with the cloud. Many applications rely on fog computing, including traffic
management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to
address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog
computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the
simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses
various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which
are essential for evaluating the performance of the ITCMS. Our system model is also compared with other
models to assess its performance. A comparison is made using two parameters, namely throughput and the
total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend
Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system
outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Leveraging Generative AI to Drive Nonprofit Innovation
Ijcnc050201
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
System Architecture of HatterHealthConnect: An
Integration of Body Sensor Networks and Social
Networks to Improve Health Awareness
Hala ElAarag, David Bauschlicher and Steven Bauschlicher
Department of Mathematics and Computer Science
Stetson University
421 N. Woodland Blvd.
DeLand, FL 32723
{helaarag, dbausch, sbausch} @stetson.edu
ABSTRACT:
Over the last decade, the demand for efficient healthcare monitoring has increased and forced the health
and wellness industry to embrace modern technological advances. Body Sensor Networks, or BSNs, can
remotely collect users data and upload vital statistics to servers over the Internet. Advances in wireless
technologies such as cellular devices and Bluetooth increase the mobility users experience while wearing a
body sensor network. When connected by the proper framework, BSNs can efficiently monitor and record
data while minimizing the energy expenditure of nodes in the BSN. Social networking sites play a large role
in the aggregation and sharing of data between many users. Connecting a BSN to a social network creates
the unique ability to share health related data with other users through social interaction. In this research,
we present an integration of BSNs and social networks to establish a community promoting well being and
great social awareness. We present the system architecture; both hardware and software, of a prototype
implementation using Zephyr HxM heart monitor, Intel-Shimmer EMG senor and a Samsung Captivate
smart phone. We provide implementation details for the design on the base station, the database server and
the Facebook application. We illustrate how the Android application was designed with both functionality
and user perspective in mind that resulted in an easy to use system. This prototype can be used in multiple
health related applications based on the type of sensors used.
KEYWORDS:
Network Architecture and Design, Wireless communication, Life and Medical Sciences, Health
Applications, Android, BSN, social network, EMG, heart monitor
1.INTRODUCTION
The health care industry has been rapidly expanding over the past few years. A particular area of
research experiencing rapid discovery is the use of body sensor networks, or BSNs, to monitor
patients. A BSN consists of sensors recording biological data which is then sent to the
corresponding data coordinator. From there the data can be interpreted in various ways. At first,
hospitals used BSNs to monitor patients on site, but soon technological advances allowed the
patients to move into more native environments, such as their own homes, to be monitored. A
wired connection between the sensors and data coordinator was originally used to facilitate BSN
communication. With the advent of wireless protocols however, technologies such as Bluetooth
DOI : 10.5121/ijcnc.2013.5201 1
2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
and ZigBee (802.15.4) have eliminated the wires from the network and increased the mobility of
the patient. Users can now wear body sensors and perform everyday tasks including exercising
without the need to adjust their body sensors.
Mobile devices such as mobile phones and PDAs have seen significant development in the recent
years as well. Modern day smart phones run complex operating systems such as Android and are
more comparable to laptops than previous cell phones. Because of their inherit portability, these
smart phones make an excellent candidate for the data controller portion of a BSN. These phones
also come equipped with multiple sensors such as GPS, accelerometer, and light sensors, which
further promote data aggregation and can reduce the need to buy additional sensors. Google’s
Android operating system is an excellent candidate for a BSN controller. The open source
Android OS runs Java source code, and because of its portability and Bluetooth API, a single
native controller can be made for the OS which could then be propagated to other devices in the
future.
The final processing layer of BSN data can be seen as the most crucial part of the entire process.
The raw data by itself is worthless unless it can be used to solve a problem or enhance the well
being of the patient. The data can be used to track health patterns in patients, display vital health
statistics, or even create recommendations for exercise.
This paper presents a system that submits sensor data into the realm of social networking. Social
networking web sites such as Twitter and Facebook have gained massive popularity among users
worldwide. User’s send updates about their events, location, status, etc, only to share it with other
users around the globe. If applied to the health industry, information such as health condition,
weight, exercise levels, and heart rate, could be shared between users to create a positive and
educational environment about wellness. The framework of this research has appeared in [3]. The
rest of the paper is organized as follows: section 2 provides background information about body
sensor networks, while section 3 presents related work in the literature. Section 4 gives a quick
overview of the HatterHealthConnect system. Section 5 and 6 describe the hardware and software
architecture of HHC, respectively, and section 7 discusses the actual implementation of the
system. Finally, section 8 provides a conclusion of the paper while section 9 suggests some future
work.
2. BACKGROUND
A body sensor network, or BSN, can almost be seen as a subset or derivative of a Wireless Sensor
Network (WSN). Many of the same components and issues of WSNs are present in BSNs, and
the similar techniques can be used to solve the problems. However, there are some distinctions
between the two. BSNs’ nodes consist of sensors able to read biological data, and these results
often are forwarded to a lab or hospital to perform some medical evaluation. Sensor nodes can
also consist of implantable devices. These implanted devices require a slightly different
configuration because they only have one battery charge. Fixing them while implanted is
currently not an option [1]. BSNs are often involved in critical systems as well; a patient’s life or
death may rely on the speed of the message delivery. Therefore, message delivery rate and
congestion are important issues a BSN must focus on [2].
2
3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
Most modern BSNs contain a variety of medical sensors along with a controller or base station.
Many medical sensors such as a pulsioximeter, ECG, and heart rate monitor can be used to report
data to the controller [7]. In order to work with an array of devices and reduce energy costs, most
communicate through common protocols such as Bluetooth or ZigBee. The controller node must
support the protocol as well, and often acts as an internet gateway too. Modern day cell phones
are a natural fit for the controller node because they meet the protocol requirements and are
portable [7]. Cell phones have additional connectivity tools such as SMS and 3G to increase
network resources. Some BSNs rely solely on these technologies to communicate, and have even
developed entire protocols around them [21]. The patient also has prior experience with his/her
mobile device, so it is often an easy transition. Previous experiments have used similar
technologies such as PDAs for the controller node [8].
Body sensor networks can greatly vary in size and purpose. A small BSN monitoring an athlete’s
vitals while exercising may only require a single patient. On the other hand, a large healthcare
facility may have hundreds of patients, each with his/her sensors reporting to a large central
database or program [10]. Depending on the case, a different network structure may be needed to
maximize the efficiency of the BSN. However, the same basic BSN issues need to be addressed
regardless of purpose or size. Energy efficiency is crucial for BSNs taking advantage of wireless
sensors and devices, and can be improved by enhancing the network layers. The second issue
BSNs face is security. Health data is extremely personal, and it is important for patients to know
their data is secure and only accessible to the appropriate parties.
3. RELATED WORK
In this emerging field of research, other similar projects have been created. Harvard's CodeBlue
[16] is a project created to adapt wireless sensor networks for use in emergency medical
situations. In this project, sensor networks are used to send real-time vital signs from a group of
patients to emergency medical technicians. These sensor networks would allow for a rapid
medical response to a mass casualty event and would allow health personal to locate those
patients in most need. CodeBlue makes use of the Berkeley MICA mote which contains a
microcontroller, local storage area, and a low-power radio. These motes run on the TinyOS
operating system and have a battery life of approximately 5-6 days while running. The
communication is handled over the IEEE 802.15.4 standard to also conserve power. A pulse
oximeter that attaches to the mote has been developed to deliver heart rate and blood-oxygen
level, and an ECG was in development during the publishing of the paper. CodeBlue is highly
scalable and works in an ad hoc setting, a critical need for use in emergency situations.
A WSN has been proposed by members of the Computer Science Department at the University of
Virginia [17] to provide support to the increasing elderly population. This WSN combines
wearable sensors along with environmental sensors to provide medical monitoring and memory
enhancement to the patient. The architecture is divided into five main components: a body
network, an emplaced sensor network, a backbone, back-end databases, and human interfaces.
The body network is composed only of unobtrusive wireless sensors, but the environmental
sensors have the option of being completely wireless and requiring batteries for power or of being
plugged into an outlet. Data gathered from the body and emplaced sensor network is sent across
the backbone of the WSN to be stored in the back-end databases or displayed in one of the human
3
4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
interfaces. The sensors used in this implementation include a motion sensor, temperature sensor,
breathing rate sensor, pulse-oximeter, and an EKG. These sensors communicate with the
backbone using the Zigbee (802.15.4) wireless protocol. Real-time data can be viewed by a PDA
that can connect to the backbone or by LCDs located on the motes.
Another wireless sensor network, discussed in [18], is designed to safely and continuously send
physiological data from a patient to a local WLAN to be further transmitted. The patient wears an
ECG sensor which wirelessly transmits data to one of the local relay nodes that are strategically
placed throughout the entire building the patient is living in. This overcomes the deadspot
problem that could occur if using a WLAN through walls. In order to avoid excess power
consumption, the ECG sensor periodically takes samples, stores them in a buffer, and then goes
back to sleep. Only once the specified buffer is full does it place the frame around the information
and send it to the local node. The nodes have two different modes, self organizing mode and data
transmission mode. When a node initially starts up, it stays in the self organizing mode until the
surrounding nodes successfully add the node into their routing table and vice versa. Once the
node is added to the system, it waits for data and then acknowledges the received packets and
forwards the data towards the uplink node. An SMS message would be sent in the case of an
emergency found in the ECG data.
DexterNet [4], a heterogeneous body sensor network, is an open-source project that makes use of
the open-source library called Signal Processing In Node Environment (SPINE). DexterNet has a
three layer architecture that includes a body sensor layer (BSL), a personal network layer (PNL),
and global network layer (GNL). The BSL contains two different types of custom sensors. The
first is a motion sensor that contains an accelerometer and a gyroscope. The second type is a
biological sensor that acts as an electrical impedance pneumography (EIP), and ECG, and an
accelerometer. The PNL consists of a Nokia N800 tablet that communicates and collects data
from the different sensors within the BSL. This communication is accomplished over IEEE
802.15.4 and makes use of the SPINE API on the node and base station side. Finally, the Nokia
N800 forms a GNL by sending data across the Internet through a Bluetooth, Wifi, or other
broadband connection. These Internet servers then use the data collected for higher level
applications. Some server-side applications already created provide features such as displaying a
graphical animation of a user’s current position, creating a database of movement information to
improve human movement recognition algorithms, and monitoring pollution on a patient's walk
through the city [4].
Researchers at the University of California, Berkeley have begun working on an API for the
Android OS that provides specific functionality for BSN development. The project, titled WAVE
[5], has several core components including sensor interaction, database interaction, and data
processing functions. The sensor interaction is handled by the SPINE framework, allowing
WAVE to focus less on the low level communication between sensor nodes and the mobile
platform. Because the Android OS has a java based development kit, SPINE should work well
with it as long as the sensors can also make use of it. Also, because the Android OS is becoming
increasingly popular on multiple models of phones, the SPINE framework can be ported over
once and used for multiple applications on multiple devices. After data is collected from the
nodes in WAVE, database interaction is handled using REST architecture so a user can easily
4
5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
insert and store information from the mobile platform into a remote database. This REST
architecture basically refers to a stateless, client-server model similar to how the World Wide
Web works. Finally, the data processing functions allow the user to access algorithms that are
frequently used within BSN applications. These functions include action recognition, energy
expenditure calculating, and GPS location tracking.
Using the WAVE API, a few applications have already been created to monitor certain health
aspects. One such application is CalFit [5]. CalFit uses the native sensors on specific Android
phone models to calculate energy expenditures based on the SPINE Kcal algorithm. It then logs
the user’s data into a database where all the users of this application can compare their caloric
expenditures. The database also ranks users and allows for the creation of teams to sponsor
encouragement and competition.
Work has also been done to use artificial neural networks, Bayesian networks, and Hidden
Markov Models to develop context aware sensing in BSNs. People are very sensitive to external
context changes such as a change in the person's activity or temperature of the environment and
these situations need to be analyzed appropriately to draw the correct conclusions about a person's
health status. Difficulties in accomplishing this include noise introduced by the sensors, the need
for context sensing to detect transitions in context as opposed to a single snapshot in time, and the
problem that as the number of inputs (sensors) increases, the learning rate slows down. Advanced
computing techniques such as neural networks and Bayesian networks would be advantageous
because each of the individual sensors could learn without supervision and do not require prior
knowledge of the context [19].
4. SYSTEM OVERVIEW
To further the functionality and diversity of body sensor networks, we propose
HatterHealthConnect (HHC). HatterHealthConnect is a health monitoring system that gathers
physiological information to be integrated with social networks to promote healthy living and
further peer connectivity. Live data such as heart rate, muscle activity, and workout duration are
all calculated and sharable through these networking portals. HatterHealthConnect is designed to
be easy to use, highly portable, and unobtrusive. Figure 1 depicts the overall design of
HatterHealthConnect.
5
6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
Figure 2: The Zephyr HxM Monitor (left), Intel Shimmer
Figure 1: HatterHealthConnect Design
(right), and Samsung Captivate (bottom)
The monitoring and gathering of physiological data is handled by a wireless body sensor network
comprised of multiple nodes. As shown in Figure 2, the sensor nodes include an Intel Shimmer
Wireless Sensor Unit and attached EMG sensor and a HxM Bluetooth Heart Monitor. The
coordinating or central node is a Samsung Captivate mobile device.
The BSN uses Bluetooth as its form of intra-node communication so the user can wear or carry
the appropriate nodes wherever he/she goes. Once the user starts the application, the Samsung
Captivate periodically collects data from the sensor nodes and store that information locally. Data
collected on the phone is analyzed and processed further if necessary and the results can then be
uploaded to the social networking sites Facebook and Twitter over Wifi or 3G.
This social interaction aims at promoting a healthier lifestyle by using encouragement and
competition. Users are able to reach a much larger resource of advice and support as they share
their own data and also comment on others' data. Also, by frequently uploading data, users are
able to track their progress compared to their peers' and are positively pressured into continuing
their own exercise activities or improving on them. Similarly, users are able to share their results
via Twitter, so those following someone using HatterHealthConnect may be inspired to live a
healthier lifestyle.
5. HARDWARE ARCHITECTURE
5.1 SHIMMER
Shimmer is a sensor platform designed for wireless applications that require the acquisition of
data in real time. The Shimmer is designed to be low power and light weight in order to make
wireless sensing efficient and unobtrusive in an everyday environment. The microprocessor and
hardware components are designed to minimize power consumption for a long battery life and the
6
7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
total size of the Shimmer baseboard is only 53mm x 32mm x 15mm. The total weight of the unit
is also only 22 grams, making the unit very versatile. Several key principles of the Shimmer
wearable sensor are listed on their website and they are:
• Flexible: Each application can be customized to meet exact data capture and transfer
requirements
• Configurable: Many different expansion modules/sensors are compatible with the
Shimmer baseboard, including third party sensors. Shimmer can communicate over
Bluetooth or 802.15.4 radio with any device that uses a similar radio.
• Open Source: The code is maintained and freely available at Sourceforge and
GoogleCode
• Raw Data: Developers have full control over how the sensed data is handled and
interpreted
• No Proprietary Software: Applications can be developed without having to match specific
project output or interface requirements
The specific hardware components within the Shimmer were chosen and designed to meet the
overall goal of making a low power and unobtrusive sensor. The MSP430 microprocessor was
developed specifically to run on embedded, battery devices. The Shimmer makes use of almost
every feature on the CPU, which controls all of the different peripherals attached. An integrated
analog-to-digital converter captures sensor data, such as the attached EMG sensor. The Shimmer
has the ability to store data internally via MicroSD flash storage, which allows data to be stored
before sending or saved in case a network connection is dropped while the sensor is still gathering
data [25].
Shimmer is an unobtrusive sensor platform because it communicates wirelessly. The Shimmer
module contains two different radios: an 802.15.4 and a Bluetooth radio. IEEE 802.15.4 was
developed specifically for low power personal area networks and is optimized to work within a
short range. There are 27 total channels available with three different data rates available under
this specification: 16 channels that have a data rate of 250 kb/s, 10 channels at 40 kb/s and 1
channel at 20 kb/s. 802.15.4 was specifically designed to be energy efficient at the physical and
MAC layers, allowing it to have a very low power consumption level. The Shimmer contains a
SR7 Radio module that communicates over 802.15.4 and has an indoor range of 5-10 meters.
Bluetooth is similar to 802.15.4 in that it is a short range, low power form of wireless
communication. Bluetooth equipped devices can communicate at rates up to 3 Mbps. Bluetooth
has 79 channels available that each have a data rate of 1 MHz. Unlike a network using the
802.15.4 protocol, which could contain up to 216 compatible devices, a Bluetooth network can
only contain up to 8 devices. These individual groups of 8 devices can connect to form a larger
group though, called a scatternet. The Shimmer device contains a Class 2 Bluetooth module that
communicates through a 2.4 GHz antenna. This device has a range over 10 meters and can make
use of all 79 channels. The overall goal of both protocols is to provide a short range, low power
form of wireless communication. 802.15.4 has a slower data transfer rate, but it also provides
more customization options and uses less power than Bluetooth. Bluetooth, on the other hand, is
an older protocol and much more prevalent in mass market devices. Although 802.15.4 may
7
8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
better suit an application dealing specifically with body sensor networks, we have chosen
Bluetooth due to its compatibility with Android devices [25].
5.2 EMG
Electromyography (EMG) measures the electrical impulses of the muscles within the body. It
provides a quantifiable way to view the activity of a muscle while at rest and throughout the
entire range of motion of a movement. The two different EMG techniques are intramuscular and
surface EMG. Intramuscular EMG involves an electrode needle being inserted into the muscle
tissue to target specific motor units. The muscle should behave in a certain manner in reaction to
the needle, and results are compared to that. On the other hand, surface EMG (SEMG) is a
noninvasive technique that allows EMG data to be measured without penetrating the skin and
provides for a much broader evaluation of a muscle. SEMG picks up the electrical signals that are
fired from a population of motor units within a muscle. These electrical signals travel through
tissue until they eventually reach the surface of the skin, where electrodes then sense the energy.
SEMG is a much more appropriate technique for sampling users in a workout environment and
the data gathered will be more appropriate because it relates to a wider range of muscle use.
Figure 3: Raw EMG data (top) and its Root Mean Square (bottom) [37]
Once data is gathered from the electrodes, it must be processed before it becomes easily
understandable. The initial type of processing is filtering, or removing the unnecessary data from
the sample. This attempts to remove the electrical noise that is caused by anything other than the
electrical impulses in the muscle. Once the data is properly filtered, the data can either be
analyzed in its raw form or it can be further processed. Displaying the raw EMG data in a graph
creates an oscillating line, which contains both positive and negative values as shown in Figure 3.
From this graph, a user can see when the muscles are activated by looking at the thickness and
height of the line. Although this may allow users to get a quick look at their muscle's energy
expenditure, it may be harder to draw conclusions from the data without further processing it. To
make the data easier to view, all processing techniques first rectify and smooth the data.
Rectifying converts the negative electrical potential and adds it to the positive potential, making
all values positive. Smoothing the data is done by integral averaging, which involves averaging a
set of points and plotting that average for each point instead of plotting each individual point.
This reduces variability in the data because now outlying values are averaged with their
surrounding values to form a smoother graph [26].
8
9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
Aside from processing raw EMG data for display, several processing techniques are also used to
quantify the data, yielding numbers that can more easily describe muscle energy expenditure.
Peak-to-peak measuring calculates the difference between the top and bottom of each trace and
averages this value over a period of time. Integral averaging, the same method used for smoothing
EMG graphs, can be calculated and represents .637 of one half of the peak-to-peak value. Root
Mean Square (RMS) is a method that squares the data, calculates the average, and then calculates
the square-root of this value. RMS is more commonly used than integral averaging because it
provides less distortion [26]. This processed EMG data can now be used to evaluate criteria such
as:
• The activation timing of a muscle: when energy expenditure of a muscle begins and ends
and how frequently that occurs within a set period of time.
• The symmetrical expenditure of muscles: whether symmetrical muscles, such as the left
and right bicep, display the same muscle activity levels for an exercise.
• A fatigue analysis on the muscle: how quickly or slowly the muscle decreases in energy
expenditure [27]
The Shimmer EMG sensor is an attachment to the main Shimmer board and maintains the
lightweight and small form factor of the unit. The EMG attachment is a surface EMG that
connects to the skin via disposable electrodes and captures the activity of the entire muscle. The
data gathered is filtered and the integral average is calculated before storing the data [28].
5.3 ZEPHYR HXM
The HxM connects with a mobile device over a Bluetooth link. It supports only one connection at
a time and sends messages at a rate of one per second while connected as seen in Figure 4.
Figure 4: HxM Bluetooth Link
The HxM operates in simplex mode: it only sends data packets and does not process received
packets. The discoverable name of the device is HXMxxxxxx where xxxxxx is the serial number
of the sensor and its passkey is 1234. The HxM uses the Bluetooth SPP (Serial Port Profile) to
connect to another device and uses the following structure:
9
10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
• 115,200 baud
• 8 data bits
• 1 stop bit
• No parity [28]
The body sensors connecting over Bluetooth to HHC must rely on their own batteries for data
transmission. Both the Zephyr HxM and Shimmer sensors are equipped with rechargeable
batteries which can be recharged by connecting to their corresponding charging stations included
with the products. The HxM has a standard battery life of 26 hours when activated due to its
constant streaming of sensor information. The Shimmer sensor’s battery life varies greatly
depending on the frequency the data is being sent. Because this value can be adjusted, battery life
is not constant after every use. It is recommended to recharge the sensors after every use to keep
the devices prepared for next use.
5.4 BASE STATION
The hardware architecture for the base station, which is running the Android platform, is
relatively up to the discretion of the manufacturers. Any new additional hardware added to the
platform requires software support from the manufacturer as well. However, there are common
pieces of hardware usually supported by the platform. These features include telephony (EDGE,
3G, Voice), local data connections (WiFi, Bluetooth), Camera, GPS, compass, and accelerometer.
The Linux kernel is responsible for the driver connection to the hardware, and once implemented,
developers can access the hardware through high-level application framework calls. While most
phones that run the Android platform will work for HatterHealthConnect, this project specifically
uses the Samsung Captivate.
The Samsung Captivate, or Captivate, is an AT&T variant of the Samsung Galaxy S and is a
high-end Android smartphone with many of the latest hardware features [29]. Those features
include:
• WGVA 4’ Touch Screen
• Bluetooth Capability
• GPS
• Wi-Fi
• 5 MP Camera
Although most phones currently support Bluetooth, it is an important feature to include when
discussing hardware architecture. Most low power consuming sensors use a wireless protocol for
connection, and because the Captivate accepts only Bluetooth, it is important to find sensors
which connect over Bluetooth.
10
11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
6. SOFTWARE ARCHITECTURE
6.1 TINYOS
TinyOS, initially a project at UC Berkeley, is an open source operating system specifically
designed for wireless sensor networks. This embedded operating system is completely non-
blocking, so the majority of input and output functions are asynchronous and require a callback.
TinyOS and applications that run on it are written in nesC [30]. The nesC (network embedded
system C) language is a programming language similar to C, and designed to follow the execution
model of TinyOS. NesC is made up of components, which encapsulate state and functionality
similarly to objects in an object-oriented language. However, each of these components can only
reference its local namespace. In order for one component to call a function from another
component it must explicitly declare that function as well. In this way, function pointers are not
needed and all connections are made during compile-time. This is possible because mainly
because the embedded systems TinyOS and nesC are running on generally have specific tasks that
do not require dynamic program loading due to user input. The behavior of each component is
represented by a set of interfaces. Each interface either contains some functionality that is
accessible to the user or represents some functionality the component needs to complete a task.
Interfaces provide a way for all the individual components to be linked together to form a
program. Overall, nesC was designed to provide a statically-linked environment that allows for
greater runtime efficiency in the embedded system environment [31].
6.2 BIOMOBIUS
The EMG application run in TinyOS on the Shimmer node is a part of the BioMOBIUS research
platform. This research platform was developed by TRIL Centre to allow the rapid creation of
applications involving biomedical monitoring devices and sensors. BioMOBIUS is aimed at those
who need to monitor the activity and physiological information of their users or research subjects.
This platform supports many third party sensors and devices, including the Intel Shimmer. One of
the main goals of the BioMOBIUS platform is to allow individual components to be encapsulated
into individual “blocks.” Once a single component is created, other users do not have to replicate
it, they can simply reuse that component. The code behind the BioMOBIUS platform is also open
and shared so that developers can make alterations to the source code to fit their specific needs
[33].
11
12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
6.3 COMMUNICATION PROTOCOLS
6.3.1 SHIMMER PROTOCOL
Figure 5: Shimmer Packet Format
The format of the data is identical in all instances except when the Shimmer has received a low
battery indication from the TinyOS operating system. This low battery indication stops the
streaming of data once the battery voltage drops below a regulator value of 3V. By default, the
EMG sensor samples data at 500hz and each packet of data sent by the Intel Shimmer to the
Android base station exactly contains fourteen bytes of data as shown in Figure 5. The MSP430
CPU is byte addressed and little endian, so slots of data that take more than one byte to hold the
data, such as the time stamp, are sent with the highest addressed bytes followed by the lowest
addressed bytes. In each packet, the first and last bytes are simply indicators of the beginning and
end of each packet. The Sensor ID byte contains a unique identifier for each sensor, which is
followed by a static byte used to describe the type of data being sent. This Data Type byte allows
the base station to distinguish the difference between similar Shimmer packets that contain a
different type of data, such as ECG data. An incrementing sequence number and timestamp are
used to record when the data was taken and to make sure the packets come in order. The actual
EMG data and its length are stored in bytes seven through nine. The tenth and eleventh bytes are
used to display the battery voltage remaining if the low battery indication has gone off on the
Shimmer, otherwise these bytes are empty. Finally CRC is calculated and stored so the data can
be validated on the base station.
6.3.2 HXM PROTOCOL
The HxM follows a very simple structure when transmitting messages. As mentioned in the
hardware architecture section, the HxM only sends data and does not process any received data.
The basic message format consists of a few bytes for handling message processing along with the
actual payload [29].
As shown in Figure 6, the message includes the following:
• STX - The start of text ASCII control character which signals the start of the message.
• Msg ID – uniquely identifies the HxM message and is in binary format. The standard
data packet ID for the HxM is 0x26.
12
13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
• DLC – Data Length Code specifies how many bytes of information are located within the
payload between zero and 128 (inclusive).
• Data Payload – The actual data recorded by the HxM and can contain anywhere between
zero and 128 bytes of data.
• CRC – An 8-bit CRC
• ETX – The end of text ASCII control character which signals the end of the message.
Figure 6: HxM Packet Format
The Data Payload contains the standard data message from the HxM. The message contains the
sensor data such as heart rate, speed, and distance. The past 14 heart rate measurements
timestamps are sent as well so packet loss can be determined. This is useful when calculating the
average values from the biological data. The standard data message can be seen in Figure 7.
Figure 7: HxM Standard Data Message
The payload of the data message contains more information about the sensor itself such as
Firmware ID, Hardware ID, and Battery Charge Indicator, along with the actual sensed data. The
remaining data is structured as follows [29].
• Heart Rate – an unsigned byte with a valid range between 30 and 240 bpm. If no heart
rate is detected, 0 is reported.
13
14. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
• Heart Beat Number – unsigned byte that is incremented each time a heart rate is detected.
Rolls over at 255.
• Heart Beat Timestamps (1-15) – 16 bit unsigned integer representing the heart beat
timestamp between 0 and 65535 milliseconds. Rolls over at 65535.
• Distance – 16 bit unsigned integer representing the total distance travelled in 16ths of a
meter. Rolls over ever 256 meters.
• Instantaneous Speed – 16 bit unsigned integer representing the instantaneous speed of the
device in steps of 1/256m/s. The valid range is between 0 and 15.996 m/s.
• Strides – unsigned byte representing the number of strides the wearer has taken between 0
and 255. Rolls over at 255.
6.4 ANDROID OPERATING SYSTEM
The Android is a mobile platform based on a software stack rich with features. It includes an
operating system, middleware, and key applications which can each be adjusted individually to
maximized platform performance. Some of the key software features Android includes are the
Dalvik virtual machine, integrated browser, optimized graphics, SQLite, and media support [34].
The Android architecture is essentially divided into four layers as can be seen in Figure 8. The
layers are built on top of each other, the lower layers vital for upper layer development. While the
majority of development of HHC was focused on the Application layers, this section briefly
discusses the function of the individual layers.
Figure 8: Android Operating System
14
15. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
Linux Kernel
The current Android Linux kernel is based on Linux 2.6 for its core services. It handles low level
system services such as security, memory management, process management, network stack, and
drivers. With the drivers, it is responsible for acting as an abstraction between the hardware and
other layers in the stack [34]. As seen in the hardware section, customization to the kernel can
support different hardware technologies included by manufacturers.
Android Runtime
As applications for Android are primarily written in Java, it includes a set of core libraries to
provide function for the Java programming language. Each application runs on an instance of the
Dalvik virtual machine, which has been optimized for mobile development. It has a minimal
memory footprint and relies on the Linux kernel for low level functionality such as memory
management, threading and networking [34]. In Android version Froyo (2.2) and beyond, the
Dalvik virtual machine includes a JIT (Just in time) compiler to greater improve the speed of
running code. Code is actively analyzed while running and translated into a faster form all while
using little memory. The JIT is just one of the enhancements made to the Android runtime to
make it highly efficient on mobile devices [35].
Library
In addition to the Java libraries included in the runtime, Android also includes a set of C/C++
libraries which can be accessed through the Application framework. The libraries handle lower
operations such as media, 2D graphics, 3D graphics, SQLite, and bitmap and vector font
rendering [34]. The Native Development Kit (NDK) provides direct access to several of these
libraries and can be used to create classes that may have a slight improvement over their Java
counterpart [36].
Application Framework
Android allows developers to deeply integrate their applications with the operating system
because of its open platform. Applications have access to the same framework APIs all the core
programs have and can take advantage of any currently designed components. The framework
does have security constraints, but if permissions are granted by the user, applications can publish
their capabilities to any other applications. Below all applications is the core of the framework
which includes Views, Content Providers, a Resource Manager, a Notification Manager, and an
Activity Manager [34].
Application
The application layer on the Android platform is mostly left to third party developers. Developers
can use the other layers, specifically the application framework, to develop applications in Java.
Most stock versions of Android come with default applications such as Phone, Browser, and
Contacts and developers can use them as examples for other applications. With the Software
15
16. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
Development Kit (SDK) for Android developers can create deeply integrated and graphically
pleasing applications for users.
6.5 SERVER SOFTWARE
The server-side of HatterHealthConnect is written in PHP. The first objective of this server is
collecting, storing, and summarizing the data uploaded from individual Android base stations.
MySQL is the chosen relational database management system for the server side of HHC. All
necessary information for HHC is stored within this database, including biophysical, user, and
team data. This database is built to support the individual Android phones and also the Facebook
and Twitter applications.
The second part of HatterHealthConnect's back-end server is to provide an interface where users
can view data and interact with other users. This is accomplished using social networking sites.
These social networking sites often provide developer-friendly APIs for accessing and updating
user data. Facebook and Twitter support APIs for a variety of platforms and languages. These
APIs often include multiple ways of accessing the site data and have security measures in place to
restrict whose data is visible. Additionally, many open-source projects have been initiated to wrap
these APIs and increase the ease of site interaction. Facebook development is more complex than
Twitter because of all the different functionality Facebook provides. User’s status updates are
only a small portion of the site. These applications can access third party information and can use
pre-made tools by Facebook for enhancement.
Facebook applications are web applications that are built in a common web programming
language, such as PHP, and then loaded into the context of Facebook. Essentially, a web
application is designed separately from Facebook on a server and then is linked from within
Facebook when the app is run. The benefit of using Facebook comes from all the information that
Facebook provides the application about the user. Once a user agrees to share their Facebook
information with the application, the application is able to make Facebook API calls to access his
or her user id and then link the id to the proper data in the database. The web application for
HatterHealthConnect is written in PHP and located on the same server as Android-facing scripts.
7. IMPLEMENTATION DETAILS
7.1 BASE STATION IMPLEMENTATION
The Android portion of HHC is designed similarly to the majority of Android applications. The
following sections describe the class structure of HHC along with the design implementation
7.1.1 BASE STATION CLASS DESIGN
The source code for HHC is structured such that Java class files are separated from the XML
files. The XML defines layout, styles, and global strings which can then be referenced from the
Java code.
16
17. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
Figure 10: HHC Package Structure
Figure 9: HatterHealthConnect program structure
As illustrated in Figure 9, the lower levels of HHC interact directly with the Android framework
to share data with other devices. Bluetooth calls are made to body sensors through the Bluetooth
service to handle remote data collection. The data is then processed and passed either directly to
Facebook through the Facebook Link classes, or uploaded to the backend database over HTTP.
User interaction is handled through the GUI. The user is able to choose how his/her data is
uploaded and at what frequency. The program can also be navigated through the menu to change
sensors and handle reconnections.
Java development allows class files to be separated into packages to increase encapsulation
during development. The package structure of HHC can be seen in Figure 10. Each piece of the
application is separated out into one of the following packages or classes:
• com.stetson.hhc.facebook – Handles Facebook authentication along with any buttons or
views needed to connect. When authenticating to Facebook, it checks to see if an instance
of the Facebook application is currently installed on the device. If so, it authenticates
through the application, otherwise opens up a web view to authenticate.
• com.stetson.hhc.network – Handles HTTP and remote database connections over the
Internet. Includes an abstract web database connection class for extensions to other
databases.
17
18. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
• com.stetson.hhc.sensor – Contains the majority of the code handling sensor connections
along with class creating the GUI.
• AbstractSensorView – Abstract class serving as the base view for any GUI needing to
connect to a sensor. Contains methods for connecting and handling sensor information.
• EMGSensorView and ZephyrSensorView – AbstractSensorViews each dedicated to a
specific HHC sensor.
• com.stetson.hhc.sensor.bluetooth – Handles Bluetooth sensors such as the HxM and
Shimmer EMG. Base packages com.stetson.sensor.bluetooth.HXM and
com.stetson.sensor.bluetooth.Shimmer extend AbstractBluetoothService and
ConnectedThread to create a fully functional sensor connection.
• AbstractBluetoothSensorService – Establishs an initial connection to a sensor and
manages the connection by sending messages to the extending class.
• ConnectThread and ConnectedThread – Used by a sensor service to connect to a
sensor and handle any information sent to the device from the sensor.
7.1.2 BASE STATION DESIGN
The HHC Android application was designed with both functionality and user perspective in mind.
The application needed to contain the necessary pieces to perform a variety of useful functions,
while at the same time feeling very intuitive. The resulting application ended up with a very
simple design, with much of the connection work being done in the background, and the user
having the options to handle where the data is uploaded.
Figure 11: Screenshot of HHC heart Figure 12: Screenshot of HHC EMG
monitor view monitor view
In order for the user to start recording data, they simply select which attachment he or she is using
and then begin the connection. The application then connects to the sensor and data is passed
back to the phone. Within each of the individual views a user can also log into Facebook, or
directly post current information onto his or her Facebook wall. Figures 11 and 12 show
snapshots of the Android Application for heart monitor and EMG monitor respectively
Security is an important part of an application when dealing with personal information such as
health data. HHC maintains security by only submitting/posting data the user has willfully
decided to submit. The user has full control over what data is uploaded to the backend or social
18
19. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
networking sites. The base station does not transmit any data without first being prompted by the
user.
7.2 SERVER IMPLEMENTATION
7.2.1 USER DATABASE
The BSN-facing side of the server is a collection of PHP scripts that wait for data to be sent via
POST to the server's main receiving script. These PHP scripts evaluate the type of data being sent
and store it appropriately into HatterHealthConnect's database. As shown in Figure 13, this
database is made up of several tables that can easily be queried for future data retrieval. The table
“Users” has been created to store data that allows HHC to link users to their appropriate Facebook
and Twitter accounts. A “Teams” table contains the data pertaining to the many different groups
created through the Facebook application, including their unique name. Individual users can be a
part of several teams and each team can have many users so a “UsersToTeams” table is defined to
map those relationships. Finally, the “Workouts” table contains all the necessary information
about every individual workout the user performs. Information such as the day, time, and duration
are included. The data passed from the health sensors is stored in separate tables specific to the
sensor gathering the data and then linked to a workout. This way, more sensors could easily be
added by creating more sensor-specific tables and linking them to a specific workout. The social
networking applications can now pull data about the frequency, length, and health data of
workouts by querying this database.
Figure 14: Facebook Application Design
Figure 13: Database Design
7.2.2 SERVER APPLICATION DESIGN
A user has several ways of sharing or storing the physiological and other workout data once he or
she has finished a workout. HatterHealthConnect includes a Facebook application as the primary
method of exposing content to users. Figure 14 shows Facebook application for EMG monitor.
The Facebook application pulls data from a database that contains uploaded data from the users
and displays it to them. Users are able to see their progress as well as others connected with them.
19
20. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
By being able to view their own workout history, users are able to see if they have improved or
view the results of different training patterns. Within the application users can create or join
groups so that data from other members that belong to the same group can be accessed and
compared against a user's own health data. There are also several other features that make use of
Facebook that do not require a user to access the web application. For instance, Facebook has
released an open source API for Android, allowing a user to interact directly with his/her
Facebook account. The Android application, if prompted, can then update a user’s status based on
the information received from the healthcare monitoring portion. Interacting directly through the
Facebook Android API for status updates should increase awareness, because it will require little
work to update one’s status and many users should use it. It will be much easier for users to
activate the updates on their phones than to go through the Facebook web application and update
it there.
Figure 15: Methods of Social Interaction
Twitter integration is similar to the status update portion of the Facebook integration. Twitter is a
micro blogging site that lets users “tweet” updates about themselves, and remotely interacting
with the site is fairly simple. A HatterHealthConnect user has the option to tweet about his/her
progress or current status, very similar to how one would update his/her Facebook status. Along
with Facebook, Twitter should provide another channel for promoting health and fitness by
creating exercise awareness for peers. Figure 15 shows the methods of different social interaction.
8. CONCLUSION
Body sensor networks continue to play an important role in the development of healthcare
applications as the need for lightweight and remote monitoring continues to grow. In this paper
we have presented HatterHealthConnect, a network that combines the mobility and monitoring of
a BSN with the interaction capabilities of social networks. With the advent of social networking
and the increased ability to share data, people are able to communicate like never before. We
believe that creating a tool to connect health/sensor data to a social media channel will help
promote physical wellness by creating peer groups that can help motivate and encourage each
20
21. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
other. HatterHealthConnect includes a reliable BSN that is easy to operate, as it can run on any
mobile phone the uses Android OS 2.1 or greater and is completely wireless. Promoting physical
wellness is an important goal to focus on and self motivation is not always enough to encourage
it. HatterHealthConnect is designed to meet that goal effectively by easily connecting users to a
global network of those who want to pursue a healthier lifestyle. Nowadays more and more
people are comfortable using social networks and will not have any difficulty to access and
interact with data on these sites. Users can choose to share information with a group of friends or
only with their doctors. They can also choose not to share any data, but use the system as a
method to keep track of their exercise routine and monitor their own progress. Our preliminary
evaluation of the survey completed by twenty three users with different demographic data such as
age, social network usage, and workout rate show that it is reasonable to assume users who
already workout will be quicker to adopt HHC and without too much concern. However, older
users who do not use social networking sites may be slower to adopt the application. We think
that this application can be more popular among youth. We hope that it could act as a tool to
promote health awareness that could yield in solving child obesity problems.
REFERENCES
[1] Otal, B., L. Alonso, Ch. Verikoukis, "Towards Energy Saving Wireless Body Sensor Networks in Health
Care Systems," Communications Workshops (ICC), 2008 IEEE International Conference on, Proc. of
Communications Workshops, 2008, ICC Workshops '08. IEEE International Conference, Capetown, pp.1-
5, 2010.
[2] Misra, S., Tiwari, V., Obaidat, M., “LACAS: learning automata-based congestion avoidance scheme for
healthcare wireless sensor networks,” IEEE J. Sel. Areas Commun., 27(4): 466-479, 2009.
[3] David Bauschlicher, Steven Bauschlicher and Hala ElAarag, "Framework for the Integration of Body
Sensor Networks and Social Networks to Improve Healthcare", Communication and Networking
Symposium, International Society of Modeling and Simulation 2011 Spring Simulation Multiconference,
Boston, MA, April 3-6, 2011, pp.19-26
[4] Kuryloski, P., Giani, A., Giannantonio, R., Gilani, K., Gravina, R., Seppa, V., Seto, E., Shia, V., Wang, C.,
Yan, P., Yang, A.Y., Hyttinen, J., Sastry, S., Wicker, S., and Bajcsy, R. 2009. DexterNet: An Open
Platform for Heterogeneous Body Sensor Networks and its Applications. Body Sensor Networks 2009
(BSN 2009 Berkeley, CA June 3-5, 2009)
[5] Seto, E., Martin, E., Yang, A., Yan, P., Gravina, R., Lin, I., Wang, C., Roy, M., Shia, V., and Bajcsy, R.
2010. Opportunistic strategies for lightweight signal processing for body sensor networks. In Proceedings
of the 3rd international Conference on Pervasive Technologies Related To Assistive Environments (Samos,
Greece, June 23 - 25, 2010). F. Makedon, I. Maglogiannis, and S. Kapidakis, Eds. PETRA '10. ACM, New
York, NY, 1-6.
[7.] M. J. Moron, J. R. Luque, A. A. Botella, E. J. Cuberos, E. Casilari and A. Diaz-Estrella, "A smart phone-
based personal area network for remote monitoring of biosignals," International Federation for Medical
and Biological Engineering Proceedings, 2007.
[8.] B. Lo, S. Thiemjarus, R. King, and G.Z. Yang. Body sensor network - a wireless sensor platform for
pervasive healthcare monitoring. In Adjunct Proceedings of the 3rd International Conference on Pervasive
Computing, May 2005.
[10] C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov, “System architecture of a wireless body area sensor
network for ubiquitous health monitoring,” Journal of Mobile Multimedia, vol. 1, no. 4, pp. 307–326, 2006.
[11] Munishwar, Vikram P., Samer S. Tilak, and Nael B. Abu-Ghazaleh, Congestion and Flow Control in
Wireless Sensor Networks. Guide to Wireless Sensor Networks, Dordrecht: Springer, 2009.
[12] C. Tan, H. Wang, S. Zhong, and Q. Li, “Body sensor network security: an identity-based cryptography
approach,” Proc. 1st ACM conference on Wireless Network Security, pp. 148–153, 2008.
21
22. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
[13] K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “EKG-based key agreement in Body Sensor
Networks,” IEEE Conference on Computer Communications Workshops (INFOCOM), pp. 1-6, 2008.
[14] K. K. Venkatasubramanian and S. K. S. Gupta, “Security for pervasive health monitoring sensor
applications,” Proceedings of the 4th International Conference on Intelligent Sensing and Information
Processing (ICISIP '06 Bangalore, India), pp. 197 – 202, December 18, 2006.
[15] W. Leister, T. Fretland and I. Balasingham, “Use of MPEG-21 for Security and Authentication in
Biomedical Sensor Networks,” 3rd International Conference on Systems and Networks Communications
(ICSNC), Sliema, Malta, pp. 151 – 156, October 26, 2008.
[16] D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, “CodeBlue: An ad hoc sensor network
infrastructure for emergency medical care,” Proceedings
of the International Workshop on Wearable and Implantable Body Sensor Networks, pp. 12-14, June 6, 2004.
[17] G. Virone, A. Wood, L. Selavo, Q. Cao, L. Fang, T. Doan, Z. He, and J. Stankovic, “An advanced wireless
sensor network for health monitoring,” Transdisciplinary Conference on Distributed Diagnosis and Home
Healthcare (D2H2), Apr. 2006.
[18] Chien-Chih Lai, Ren-Guey Lee, Chun-Chieh Hsiao , Hsin-Sheng Liu , Chun-Chang Chen, “A H-QoS-
demand personalized home physiological monitoring system over a wireless multi-hop relay network for
mobile home healthcare applications,” Journal of Network and Computer Applications, v.32 n.6, p.1229-
1241, November, 2009.
[19] B. Korel, S. Koo, “A Survery on Context-Aware Sensing for Body Sensor Networks, Wireless Sensor
Network,” Volume 2, p. 571-583, 2010.
[20] P. R. Pereira, A. Grilo, F. Rocha, M. S. Nunes, A. Casaca, C. Chaudet, P. Almstrom and M. Johansson,
“End-to-end reliability in Wireless Sensor Networks: survey and research challenges,” EuroFGI Workshop
on IP QoS and Traffic Control, Lisbon, December, 2007.
[21] Al-Ali, A.R., Al-Rousan, M., Ozkul, T., “Implementation of experimental communication protocol for
health monitoring of patients,” Computer Standards & Interfaces, Vol. 28, Issue 5, pp. 523-530, June 2006.
[22] Fang, W., Chen, J., Shu, L., Chu, T., Qian, D., “Congestion avoidance, detection and alleviation in wireless
sensor networks,” J. Zhejiang Univ. 2010.
[23] Varshney, U., “Pervasive healthcare and wireless health monitoring,” Mobile Network Applications, 12(2-
3), pp. 113-127, 2007.
[24] B. Otal, L. Alonso, and C. Verikoukis, “Highly reliable energy saving mac for wireless body sensor
networks in healthcare systems,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp.
553–565, 2009.
[25] Shimmer booklet
[26] Jeffrey R. Cram and Eleanor Criswell, Introduction to Surface Electromyography, Jones & Bartlett
Learning, 2011
[27] Carlo J. De Luca, “Surface Electromyography: Detection and Recording,” DelSys Incorporated, 2002.
[28] Wireless EMG Sensor – Shimmer, http://www.shimmer-research.com/p/products/sensor-units-and-
modules/wireless-emg-sensor
[29] Zephyr Hxm Manual
[30] Features and Specifications – Samsung Captivate, http://www.samsung.com/us/mobile/cell-phones/SGH-
I897ZKAATT-features
[31] Phillip Levis, “TinyOS Programming,”October 27, 2006.
[32] David Gay, Philip Levis, David Culler, and Eric Brewer, “nesC 1.1 Language Reference Manual,” May
2003.
[33] BioMOBIUS - Overview, http://biomobius.org/
[34] What is Android? | Android Developers, http://developer.android.com/guide/basics/what-is-android.html
[35] Android Developers Blog: Dalvik JIT, http://android-developers.blogspot.com/2010/05/dalvik-jit.html
[36] What is the NDK? | Android Developers, http://developer.android.com/sdk/ndk/overview.html
[37] JSM, http://www.jssm.org/vol9/n4/12/F1.htm
22