Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment of a small room with a specific purpose of monitoring of person's health with a kind of assistance which can be remotely controlled. RF identification (RFID) technology is smart enough to provide personal healthcare providing part of the IoT physical layer through low-cost sensors. Recently researchers have shown more IoT applications in the health service department using RFID technology which also increases real-time data collection. IoT platform which is used in the following research is Blynk and RFID technology for the user's better health analyses and security purposes by developing a two-level secured platform to store the acquired data in the database using RFID and Steganography. Steganography technique is used to make the user data more secure than ever. There were certain privacy concerns which are resolved using this technique. Smart healthcare medical box is designed using SolidWorks health measuring sensors that have been used in the prototype to analyze real-time data.
Harnessing and securing cloud in patient health monitoringAshok Rangaswamy
Presented in International conference on Computer communications and Informatics (January 9-11, 2012) and got the paper indexed in IEEE Xplore.(link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6158924&contentType=Conference+Publications&queryText%3DOpenCloudCare)
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Emerging Threats and Countermeasures - Digital health is the convergence of digital technology in healthcare. The emerging technology and the use of innovations are needed in healthcare for advancements and better outcomes. With the use of innovations, new threats and challenges are emerging in the industry which needs to be managed for efficient operations.
This paper aims to provide an understanding of the model and exploring options available for complementing the technology and infrastructure needs of Healthcare organizations.
Cloud Computing Stats - Cloud for HealthcareRapidScale
Security concerns are especially prevalent in the healthcare industry, and understandably so, due to its sensitive, private patient data. In the past, the industry has let innovation pass it by due to these worries, but today, the cloud is ready! As cloud security strengthens, healthcare can finally take advantage of the efficiency and cost savings of the cloud.
Here are some statistics about how cloud is affecting healthcare today.
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...ijceronline
Electronic Health Record (EHR) is a digital record shared across different healthcare settings, by network-connected enterprise-wide information systems called EHR systems. Cloud computing paradigm is one of the popular Health Information Technology infrastructures for facilitating Electronic Health Record (EHR) sharing and EHR integration. Healthcare clouds offer new possibilities, such as easy and ubiquitous access to medical data, and opportunities for new business models. However, they also bear new risks and raise challenges with respect to security and privacy aspects. The global economic crisis has affected the health sector. The costs of healthcare services rise and healthcare professionals are becoming scarce and hard to find, it is imminent that healthcare organizations consider adopting health information technology (HIT) systems. Healthcare professionals must have all the information they require to make prompt patient-care decisions. The growing of mobility connections, people can access all the resources hosted in the cloud any time using any device. The adoption of Cloud Computing in healthcare system for delivering health information and services, driven by the fact that healthcare services in Jordan are almost provided manually from tools to technologies, the growth of inhabitants and refugees crisis, healthcare stakeholders ICT consciousness, and the technical challenges and delays faces the implementation e-Healthcare system. The different problems concerning the managerial, administrative and management aspects, to the concern of physician or researcher, that necessities the infrastructure to process, store, manage patient data, analysis, diagnosis, and so on. Cloud computing is a significant alternative to solve many of these problems providing several advantages in terms of resource management and computational capabilities. In this paper we propose a national cloud computing data centers architecture solution to host healthcare system services computing resources components, proposing building a national e-health cloud environment to overcome many of the challenges confronting the success of Hakeem the core of the National e-Health System (NHS) for the provision of e-Health as a Service.
Harnessing and securing cloud in patient health monitoringAshok Rangaswamy
Presented in International conference on Computer communications and Informatics (January 9-11, 2012) and got the paper indexed in IEEE Xplore.(link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6158924&contentType=Conference+Publications&queryText%3DOpenCloudCare)
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Emerging Threats and Countermeasures - Digital health is the convergence of digital technology in healthcare. The emerging technology and the use of innovations are needed in healthcare for advancements and better outcomes. With the use of innovations, new threats and challenges are emerging in the industry which needs to be managed for efficient operations.
This paper aims to provide an understanding of the model and exploring options available for complementing the technology and infrastructure needs of Healthcare organizations.
Cloud Computing Stats - Cloud for HealthcareRapidScale
Security concerns are especially prevalent in the healthcare industry, and understandably so, due to its sensitive, private patient data. In the past, the industry has let innovation pass it by due to these worries, but today, the cloud is ready! As cloud security strengthens, healthcare can finally take advantage of the efficiency and cost savings of the cloud.
Here are some statistics about how cloud is affecting healthcare today.
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...ijceronline
Electronic Health Record (EHR) is a digital record shared across different healthcare settings, by network-connected enterprise-wide information systems called EHR systems. Cloud computing paradigm is one of the popular Health Information Technology infrastructures for facilitating Electronic Health Record (EHR) sharing and EHR integration. Healthcare clouds offer new possibilities, such as easy and ubiquitous access to medical data, and opportunities for new business models. However, they also bear new risks and raise challenges with respect to security and privacy aspects. The global economic crisis has affected the health sector. The costs of healthcare services rise and healthcare professionals are becoming scarce and hard to find, it is imminent that healthcare organizations consider adopting health information technology (HIT) systems. Healthcare professionals must have all the information they require to make prompt patient-care decisions. The growing of mobility connections, people can access all the resources hosted in the cloud any time using any device. The adoption of Cloud Computing in healthcare system for delivering health information and services, driven by the fact that healthcare services in Jordan are almost provided manually from tools to technologies, the growth of inhabitants and refugees crisis, healthcare stakeholders ICT consciousness, and the technical challenges and delays faces the implementation e-Healthcare system. The different problems concerning the managerial, administrative and management aspects, to the concern of physician or researcher, that necessities the infrastructure to process, store, manage patient data, analysis, diagnosis, and so on. Cloud computing is a significant alternative to solve many of these problems providing several advantages in terms of resource management and computational capabilities. In this paper we propose a national cloud computing data centers architecture solution to host healthcare system services computing resources components, proposing building a national e-health cloud environment to overcome many of the challenges confronting the success of Hakeem the core of the National e-Health System (NHS) for the provision of e-Health as a Service.
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
The advent of Cloud Computing in the healthcare industry is heralded as the Healthcare Information Revolution (HIR). Healthcare companies initiated into the cult of Cloud Computing have become ground for talk about the evolution of healthcare informationally. In the healthcare industry, cloud computing is marked by global sharing of electronic medi-records. It has brought to the menu of healthcare progress the merits of enhanced security and the limitless scope of innovation. This is made possible through communication with the healthcare matrix across the world. Let's find out more:
http://suyati.com/impact-of-cloud-computing-on-healthcare-industry/
Connecting the Healthcare Ecosystem - An Architecture for Improved HealthProlifics
While healthcare reform has many underlying goals and will solve many problems in the healthcare ecosystem, the essence is to provide seamless and secure connectivity, enabling the exchange of patient information, allowing improved continuity and coordination of care. The correct approach to enabling this connectivity will allow information to flow on an unprecedented scale, enabling better clinical decisions while allowing the patient, payer and provider to collaborate in new and meaningful ways. Join us in this session to learn how the WebSphere Healthcare ESB (Message Broker and Healthcare Pack), content and predictive analytics, Worklight mobile technology and Portal form the perfect building blocks for the future of healthcare.
Speeding up Healthcare Application with HTTP/2CitiusTech
Healthcare data is being increasingly accessed over the public internet. With the rapid adoption of EHRs and patient portals, more and more healthcare technology providers are looking at providing the same features over the internet in a SaaS model to reduce feature to market time. As they embrace trends and begin supporting new use cases such as wearables, mobile health, AI and chat bots, more data gets transferred over the same public internet infrastructure
Secondly, there is a pressing need to optimize the time healthcare professionals spend on IT per patient instead of patient care. Hence, getting timely and accurate information is of utmost importance to ensure better patient care.
Patient engagement initiatives such as patient education, medication and visit reminder, positively impact patient outcomes and are a huge success if the applications built for the same provide seamless user experience. Internet based applications rely on HTTP. As web application became more prevalent, inefficiencies of HTTP need to be addressed. HTTP/2 (Hypertext Transfer Protocol Version 2) is the update to HTTP protocol that has been built with the aim of improving performance and reducing end user perceived latency, reducing network and server resource usage.This document introduces the features and benefits of HTTP/2 and how you can start using HTTP/2
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
This is a very nice IEEE paper to get latest information on cloud computing security and privacy practices, challenges and the solution. This paper mainly discusses the significances of adopting cloud computing in healthcare sector and describes that how cloud computing can be adopted by the healthcare organization and what are the challenged for it.
Healthcare information exchange using blockchain technologyIJECEIAES
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
با گسترش فناوری اطلاعات و سرویس های مختلفی امروزه در زندگی انسان ها ارائه می شود حوزه سلامت و درمان هم بی بهره از این گسترش فناوری نبوده و در صورتی که سیاستمداران و برنامه ریزان کشور بتوانند از ظرفیت های ترکیب دانش پزشکی و فناوری اطلاعات بهره ببرند شاید با وجود افزایش جمعیت کهنسال و نیاز به رسیدگی های خاصی که در این قشر احساس می شود بتوان در کاهش هزینه های درمان گامی برداشت
An innovative IoT service for medical diagnosis IJECEIAES
Due to the misdiagnose of diseases that increased recently in a scarily manner, many researchers devoted their efforts and deployed technologies to improve the medical diagnosis process and reducing the resulted risk. Accordingly, this paper proposed architecture of a cyber-medicine service for medical diagnosis, based internet of things (IoT) and cloud infrastructure (IaaS). This service offers a shared environment for medical data, and extracted knowledge and findings between patients and doctors in an interactive, secured, elastic and reliable way. It predicts the medical diagnosis and provides an appropriate treatment for the given symptoms and medical conditions based on multiple classifiers to assure high accuracy. Moreover, it entails different functionalities such as on-demand searching for scientific papers and diseases description for unrecognized combination of symptoms using web crawler to enrich the results. Where such searching results from crawler, are processed, analyzed and added to the resident knowledge base (KB) to achieve adaptability and subsidize the service predictive ability.
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging StrategyCarestream
What is the cloud's future in imaging?
Enterprise imaging strategies are front and center in healthcare IT these days. The increasing sophistication of imaging technology has resulted in substantial increases in imaging data. The upside of this increase is that clinicians have more imaging information available to aid in diagnosis and treatment. www.carestream.com/cloud
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
The advent of Cloud Computing in the healthcare industry is heralded as the Healthcare Information Revolution (HIR). Healthcare companies initiated into the cult of Cloud Computing have become ground for talk about the evolution of healthcare informationally. In the healthcare industry, cloud computing is marked by global sharing of electronic medi-records. It has brought to the menu of healthcare progress the merits of enhanced security and the limitless scope of innovation. This is made possible through communication with the healthcare matrix across the world. Let's find out more:
http://suyati.com/impact-of-cloud-computing-on-healthcare-industry/
Connecting the Healthcare Ecosystem - An Architecture for Improved HealthProlifics
While healthcare reform has many underlying goals and will solve many problems in the healthcare ecosystem, the essence is to provide seamless and secure connectivity, enabling the exchange of patient information, allowing improved continuity and coordination of care. The correct approach to enabling this connectivity will allow information to flow on an unprecedented scale, enabling better clinical decisions while allowing the patient, payer and provider to collaborate in new and meaningful ways. Join us in this session to learn how the WebSphere Healthcare ESB (Message Broker and Healthcare Pack), content and predictive analytics, Worklight mobile technology and Portal form the perfect building blocks for the future of healthcare.
Speeding up Healthcare Application with HTTP/2CitiusTech
Healthcare data is being increasingly accessed over the public internet. With the rapid adoption of EHRs and patient portals, more and more healthcare technology providers are looking at providing the same features over the internet in a SaaS model to reduce feature to market time. As they embrace trends and begin supporting new use cases such as wearables, mobile health, AI and chat bots, more data gets transferred over the same public internet infrastructure
Secondly, there is a pressing need to optimize the time healthcare professionals spend on IT per patient instead of patient care. Hence, getting timely and accurate information is of utmost importance to ensure better patient care.
Patient engagement initiatives such as patient education, medication and visit reminder, positively impact patient outcomes and are a huge success if the applications built for the same provide seamless user experience. Internet based applications rely on HTTP. As web application became more prevalent, inefficiencies of HTTP need to be addressed. HTTP/2 (Hypertext Transfer Protocol Version 2) is the update to HTTP protocol that has been built with the aim of improving performance and reducing end user perceived latency, reducing network and server resource usage.This document introduces the features and benefits of HTTP/2 and how you can start using HTTP/2
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
This is a very nice IEEE paper to get latest information on cloud computing security and privacy practices, challenges and the solution. This paper mainly discusses the significances of adopting cloud computing in healthcare sector and describes that how cloud computing can be adopted by the healthcare organization and what are the challenged for it.
Healthcare information exchange using blockchain technologyIJECEIAES
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
با گسترش فناوری اطلاعات و سرویس های مختلفی امروزه در زندگی انسان ها ارائه می شود حوزه سلامت و درمان هم بی بهره از این گسترش فناوری نبوده و در صورتی که سیاستمداران و برنامه ریزان کشور بتوانند از ظرفیت های ترکیب دانش پزشکی و فناوری اطلاعات بهره ببرند شاید با وجود افزایش جمعیت کهنسال و نیاز به رسیدگی های خاصی که در این قشر احساس می شود بتوان در کاهش هزینه های درمان گامی برداشت
An innovative IoT service for medical diagnosis IJECEIAES
Due to the misdiagnose of diseases that increased recently in a scarily manner, many researchers devoted their efforts and deployed technologies to improve the medical diagnosis process and reducing the resulted risk. Accordingly, this paper proposed architecture of a cyber-medicine service for medical diagnosis, based internet of things (IoT) and cloud infrastructure (IaaS). This service offers a shared environment for medical data, and extracted knowledge and findings between patients and doctors in an interactive, secured, elastic and reliable way. It predicts the medical diagnosis and provides an appropriate treatment for the given symptoms and medical conditions based on multiple classifiers to assure high accuracy. Moreover, it entails different functionalities such as on-demand searching for scientific papers and diseases description for unrecognized combination of symptoms using web crawler to enrich the results. Where such searching results from crawler, are processed, analyzed and added to the resident knowledge base (KB) to achieve adaptability and subsidize the service predictive ability.
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging StrategyCarestream
What is the cloud's future in imaging?
Enterprise imaging strategies are front and center in healthcare IT these days. The increasing sophistication of imaging technology has resulted in substantial increases in imaging data. The upside of this increase is that clinicians have more imaging information available to aid in diagnosis and treatment. www.carestream.com/cloud
In this research, the proposed system is to design and construct IoT based healthcare monitoring system using ESP8266 Node MCU that supports healthcare system under circumstances for people. IoT based healthcare monitoring system is evaluated for certain parameter like heartbeat and temperature. This system consists of Node MCU, Temperature Sensor, Heartbeat Sensor, IoT, SPSS, Thinger.io cloud sever and mobile phone. Node MCU board collects temperature and heartbeat data from the sensors and transfer wirelessly to IoT website via internet connection 1 . This data can be transmitted to the data set linked with SPSS software and this software can be calculated the future data for people using linear regression method. So, Mobile health system helps to know health conditions in real time to people. The aim of this system is to improve the healthcare system by using internet and easily to measure their condition of health from home. Su Hlaing Phyo | Kyaw Zin Latt ""Analysis on Healthcare System using IoT"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25140.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25140/analysis-on-healthcare-system-using-iot/su-hlaing-phyo
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
Technology plays the most important role in healthcare not only for sensory devices but besides in communication, recording and display device. It is very important to monitor various medical parameters and post operational days. Therefore the latest development in Healthcare communication method using IOT is adapted. Internet of things serves as a catalyst for the healthcare and plays prominent role in wide range of healthcare applications. In this project the PIC16F877A microcontroller is used as a gateway to communicate to the various sensors such as temperature sensor, Respiration sensor, Blood Oxygen level and heart beat sensor. The microcontroller picks up the sensor data and sends it to the network through IOT and hence provides real time monitoring of the health care parameters for doctors. The data can be access anytime by the doctor. The controller is in addition connected with buzzer to alert the caretaker about variation in sensor output. Other than the main issue in remote patient monitoring system is that the data as to be securely transmitted to the destination end and provision is made to allow only authorized user to access the data. The security problem is be addressed by transmitting the data through the password protected internet which will be encrypted by standard AES128 and the Doctors can access the records by logging to the html webpage. Next to the instance of extremity situation alert message is send to the doctor through IOT connected to the controller. For this reason quick provisional medication can be easily done by this system. This system is capable with low power consumption capability, easy setup, high performance and time to time response.
An efficient IoT based biomedical health monitoring and diagnosing system usi...TELKOMNIKA JOURNAL
With the growing and aging population, patient auto monitoring systems are becoming more popular. Smart sensors linked with the internet of things (IoT) make patients' auto monitoring system possible. Nowadays myRIO with LabVIEW is more popular for easy data acquisition, instrument control, and automation. This paper proposed myRIO and IoT based health monitoring and diagnosing system (HMDS) to acquire heartbeat rate, pulse, blood pressure (BP), temperature and activities of the patient using various smart sensors with more accuracy. The acquired raw data from the various sensors had been sent to the myRIO using ESP 8266 Wi-Fi module. The received raw data by the myRIO would be processed to the equivalent medical parameters using LabVIEW and the same might be transferred to the remote monitoring system (RMS) using cloud via a gateway. The abnormalities in the obtained data would be monitored and the diagnosis was made. The experimental setup was developed using various wearable sensors, ESP 8266, myRIO with LabVIEW and cloud with the gateway.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
IoT and Mobile Application Based Model for Healthcare Management Systemijtsrd
The last decade has witnessed extensive research in the field of healthcare services and their technological upgradation. To be more specific, the Internet of Things IoT has shown potential application in connecting various medical devices, sensors, and healthcare professionals to provide quality medical services in a remote location. This has improved patient safety, reduced healthcare costs, enhanced the accessibility of healthcare services, and increased operational efficiency in the healthcare industry. The current study gives an up to date summary of the potential healthcare applications of IoT HIoT based technologies. It is necessary to develop an innovative solution in the Smart Building context that increases guests’ hospitality level during the pandemics in locations like hotels, conference locations, campuses, and hospitals. The solution supports features intending to control the number of occupants by online appointments, smart navigation, and queue management in the building through mobile phones and navigation to the desired location by highlighting interests and facilities. Moreover, checking the space occupancy, and automatic adjustment of the environmental features are the abilities that can be added to the proposed design in the future development. The proposed solution can address all mentioned issues regarding the smart building by integrating and utilizing various data sources collected by the internet of things IoT sensors. Then, storing and processing collected data in servers and finally sending the desired information to the end users. Consequently, through the integration of multiple IoT technologies, a unique platform with minimal hardware usage and maximum adaptability for smart management of general and healthcare services in hospital buildings will be created. Dr. Rajendra Kumar Bharti "IoT and Mobile Application Based Model for Healthcare Management System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-6 , October 2022, URL: https://www.ijtsrd.com/papers/ijtsrd51889.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/51889/iot-and-mobile-application-based-model-for-healthcare-management-system/dr-rajendra-kumar-bharti
Challenges and Opportunities of Internet of Things in Healthcare IJECEIAES
The Internet of Things (IoT) relies on physical objects interconnected between each other’s, creating a mesh of devices producing information and services. In this context, sensors and actuators are being continuously embedded in everyday objects (e.g., cars, home appliances, and smartphones) thus pervading our living environment. Among the plethora of application contexts, smart Healthcare is gaining momentum. Indeed IoT can revolutionize the healthcare industry by improving operational efficiency and clinical trials’ quality of monitoring, and by optimizing healthcare costs. This paper provides an overview of IoT, its applicability in healthcare, some insights about current trends and an outlook on future developments of healthcare systems.
Internet of Things IoT Based Smart Environment Integrating Various Business A...ijtsrd
In this paper, we emphasize the concept of Internet of Things IoT , in addition to reviewing the main challenges of the IoT environment by focusing on the recent research directions in this topic. With the increasing dependency of events over the smart objects which can be easily controlled and monitored, can be identified automatically and communicate with each other through internet and can make decisions by themselves, there is an urgent need of new paradigm which can connect these smart devices together and that new paradigm is Internet of Things. in fact, the IoT environment possesses a large range of challenges has a wide impact on their performance, which can be divided into two categories, that is i General challenges for example communication, heterogeneity, virtualization and security plus ii Unique challenges for example wireless sensor network WSN , Radio Frequency Identification RFID , and as a final point Quality of service QoS which is measured as a common factor between general and special challenges. This paper highlights the major applications of the IoT. More than a small number of sectors like security and emergency, meteorology, banking, agriculture, Surveillances, health care, education, government e services, domestic appliances monitoring, traffic surveillance are integrated and a variety of objects and devices are connected using RFID technology. This paper as well describes that how various fields are connected by means of RFID technology and sensor networks. Dr. Vijeta Kumawat | B. Umamaheswari ""Internet of Things (IoT) Based Smart Environment Integrating Various Business Applications and Recent Research Directions"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23658.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/23658/internet-of-things-iot-based-smart-environment-integrating-various-business-applications-and-recent-research-directions/dr-vijeta-kumawat
Internet of Things (IOT) has provided an opportunity to construct powerful industrial system and applications by leveraging the increasing ubiquity of RFID, wireless, mobile and sensor devices. Various industrial IOT applications have been progressively developed and deployed in recent years. Now-a-days, modifying and monitoring plays a main role in our day to day life. Everything we can monitor and control using innovative technologies. Remote access is a ideal feature that came because of high speed internet. The main objective of suggested system is to deliver a technology oriented and low-cost system to make an advanced industry for those who away from their industry and want to control devices.
Similar to IoT based on secure personal healthcare using RFID technology and steganography (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
IoT based on secure personal healthcare using RFID technology and steganography
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 4, August 2021, pp. 3300~3309
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3300-3309 3300
Journal homepage: http://ijece.iaescore.com
IoT based on secure personal healthcare using RFID technology
and steganography
Haider Ali Khan1
, Raed Abdulla2
, Sathish Kumar Selvaperumal3
, Ammar Bathich4
1,2,3
Faculty of Computing, Engineering, and Technology, Asia Pacific University of Technology and Innovation (APU),
Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia
4
Faculty of Electrical Engineering, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia
Article Info ABSTRACT
Article history:
Received Sep 23, 2020
Revised Dec 4, 2020
Accepted Jan 14, 2021
Internet of things (IoT) makes it attainable for connecting different various
smart objects together with the internet. The evolutionary medical model
towards medicine can be boosted by IoT with involving sensors such as
environmental sensors inside the internal environment of a small room with a
specific purpose of monitoring of person's health with a kind of assistance
which can be remotely controlled. RF identification (RFID) technology is
smart enough to provide personal healthcare providing part of the IoT
physical layer through low-cost sensors. Recently researchers have shown
more IoT applications in the health service department using RFID
technology which also increases real-time data collection. IoT platform
which is used in the following research is Blynk and RFID technology for the
user's better health analyses and security purposes by developing a two-level
secured platform to store the acquired data in the database using RFID and
Steganography. Steganography technique is used to make the user data more
secure than ever. There were certain privacy concerns which are resolved
using this technique. Smart healthcare medical box is designed using
SolidWorks health measuring sensors that have been used in the prototype to
analyze real-time data.
Keywords:
IoT
NodeMCU
RFID
Sensors
Smart healthcare
Steganography
This is an open access article under the CC BY-SA license.
Corresponding Author:
Raed Abdulla
School of Engineering
Asia Pacific University of Technology and Innovation (APU)
Technology Park Malaysia, Bukit Jalil, Kuala Lumpur 57000, Malaysia
Email: dr.raed@apu.edu.my
1. INTRODUCTION
People's safety and critical health become a paramount concern whereas, an estimate of 421 million
hospitalizations adverse each year. A lot of research has been studied and conducted related to the IoT using
it to acquire data continuously and wirelessly which is distributed in the healthcare field. With the
employment of IoT in the health sector, which is defined on mobile or computer, medical sensors, and
researcher's communication technology for healthcare services [1-3]. Remote monitoring has become a
strategic tool for social platforms over the last few years. Over the past few years, RFID has become emerged
for automated and data collection identity. RFID technology is applied and manufactured by a lot of
industries in terms of retail and logistics but it is not related to the medical instrument [4]. Emerging
technology is related to the IoT and increment of a variety of cheap medical sensors such as wearable,
environmental, and implanted, have the potential habitat of a person and the internet to manage and produce
medical knowledge. In recent research goals of extraction of physical information about tags through
electromagnetic signals received. RFID, therefore, provides efficient ways of interaction of a person with the
2. Int J Elec & Comp Eng ISSN: 2088-8708
IoT based on secure personal healthcare using RFID technology and steganography (Haider Ali Khan)
3301
surrounded environment with the last few meters of IoT concerning quantification [5]. RFID system having a
battery-powered surrounding will be wearable smart IoT device supporting aid services with a network of the
reader. The project focuses on the scenery of current RFID work from an IoT viewpoint. The project is
launched to aim the IoT based system for personal healthcare using RFID technology. This research will
cover passive devices having a UHF short range of (10-13.56 MHz) which are capable of providing enough
read range to implement sensors for wellness and monitoring the local quality environment [6]. IoT is the
most innovative resource in manufacturing, commercial, and residential structures every day, playing a
critical role [7-12]. The use of IoT in monitoring and personal healthcare helps reduce human interaction in
remote monitoring, processing, and review of RFID-powered data [13-16].
IoT based Personal healthcare RFID systems in Smart spaces have been developed being costly, In-
home IoT based technology a suitable platform is still missing with user security concerns and implantation
of RFID tags in the human body has also been a major issue raised by many people. According to the study
in [17] found that average people questioned the idea of implanted chips. Security and safety of the user are
still missing in smart health care systems using RFID which is a questionable problem till now.
There was much research that has been conducted contributing to the field of IoT technology to
acquire data continuously which is processed timely and wirelessly in Personal healthcare, but the results are
not satisfactory [18-20]. RFID systems can help identify patients but built systems efficacy and user's
protection are still missing [21-22]. Systems that have been developing so far lack all health parameters in
one system which is not convenient for the user’s experience [23-25]. The system with different sensors
measuring heart rate, oxygen level, body temperature, humidity level, air quality, and sweat level of the body
using GSR can be more effective and efficient for user experience and personal healthcare parameters. In
general, most of the systems built based on RFID healthcare do not effectively cover the concerning
parameters. RFID used in this project will act as a security shield for the user's safety in the health care
system. Given all this, with all physical health parameters and data reliability, a wearable smart design or
medical box would be more successful.
This research aims to design and develop IoT based Personal healthcare system using RFID
technology for the user's better health analyses and security purposes by developing a two-level secured
platform to store the acquired data in the database using RFID and Steganography. The current medical
model towards medicine filed can be wisely boosted involving sensors such as environmental, wearable
sensors. RFID smart health care system enables the remote assistance of the user's health and monitoring
parameters. Making the environment smart enough through low-cost energy-autonomous and disposable
sensors. For necessary evolution, IoT passed personal health care using RFID technology comes in handy.
Sensors are used for air monitoring and to avoid the inhalation of anesthetic gases along with a check on
other health parameters such as heart rate, oxygen level, body temperature, humidity level, air quality, and
Co2. The model/design which will be used in this proposal consists of body network sensors attached to the
microcontroller Arduino Mega2560 and Arduino Uno linked with Node MCU. The final testing will include
IoT and the data will be displayed on a mobile android app. RFID adoption in healthcare will improve patient
safety which includes monitoring, physical health, surrounding information, and body health level in all
aspects.
This paper is organized as follows. In the following section, we discuss the issues of people's safety,
critical health and IoT based Personal healthcare RFID systems. In section 2, we describe the overall block
diagram and design consideration. In section 3, we explain the results occupied from the data analysis using
smart healthcare medical box. Then, we evaluate the system performance in section 4 and give a conclusion
in section 5.
2. PROPOSED DESIGN METHOD
2.1. Overall block diagram
The key sections of the framework as proposed are shown in Figure 1 where a type of block is
connected with arrows indicating the relationships between the blocks and the contact with data stream
directions. Stage 1 of the block diagram is the main controller of the system which is Arduino mega 2560.
There are multiple sensors connected with the microcontroller which are taking input data from the hand as
shown in stage 2 of the block diagram. For the two-step, security feature the keypad is connected with the
Arduino mega which requires an input password to access the system.
Stage 3 is the IoT platform using Blynk software where all the necessary data is displayed as shown
in the block diagram. NodeMCU is connected with Arduino mega using Rx pin which transmits data from
Arduino once the passcode is correct and displays it on the IoT platform using Wi-Fi connection. An RFID
reader is connected to NodeMCU which is operated manually and also used for two-step security features in
the project. To access the data on the IoT platform, the user has to place their RFID card on the reader. If the
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3300 - 3309
3302
card ID is correct, data will be transmitted or otherwise, the system will display access denied text. For
security purposes, the user is required to enter a security passcode to assess. The system and get full access to
all the functions within the system in such a way that each user, that is, the RFID cardholder has their
password.
Stage 4 consists of an IoT database where the passcode and user ID are stored in arrays along with
RFID tag ID and user data received from the sensors. The data is stored in a tabular fashion to analyze user
previous data and recent data and check whether the patient needs immediate medical assistance or not. If the
data falls below the threshold value, then the authorities and family members are informed using SMS
technology making the system automated and completely closed.
Stage 5 shows the LCD system installed on the smart healthcare medical box for quick assistance of
the user from which they can get to know their healthcare parameters and can easily access healthcare data in
their surroundings e.g. (temperature, humidity, and air quality (Co2)). Each block diagram is divided into
step by step procedures which best describes the best possible ways to implement the idea practically.
Figure 1. Overall main block diagram of a complete system
2.2. Working principle
Turn on the system by using an N.O switch as shown above in Figure 2. Once the system gets turned
on, all the components attached to that system are powered on such as Arduino Mega, NodeMCU which are
used for data acquisition and transmission. The sensing circuitry consists of a heart rate sensor, GSR sensor,
air quality sensor, smoke detection sensor, body temperature sensor, and digital humidity and temperature
4. Int J Elec & Comp Eng ISSN: 2088-8708
IoT based on secure personal healthcare using RFID technology and steganography (Haider Ali Khan)
3303
sensor which are being connected to the main microcontroller, Arduino Mega. The display unit of the system
consists of one OLED and one LCD screen for displaying the patient relative data. Arduino Mega, that is, the
brain of the smart healthcare system is utilized within the implemented system to acquire data from all
sensors excluding the RFID reader that is connected to the Nodemcu.
Figure 2. Complete flowchart of the system
The main reason behind connecting the RFID reader to the Nodemcu instead of connecting it to the
main Microcontroller is that the Arduino Mega SCL and SDL pins are occupied by the display unit
represented by the OLED and LCD screens. In terms of user security, the developed medical healthcare
system incorporates a reliable security system for securing patent data. For security purposes, the user is
required to enter a security code to access the system and get full access to all the functions within the system
in such a way that each user is provided with a personal RFID card and passcode. Once the RFID is placed
and the corresponding password is entered, the system will send the data to the IoT cloud using the data
received by the NODEMCU from the Arduino Mega. To get easy access to the data, the user is required to
place their hand on the machine and place their RFID card on to the system. Once the system recognizes the
user card, data will be shown on the IoT platform. The transmitted data will be sent to a DATABASE so that
each user data can be stored safely which can be later reviewed for better medical health analysis. This
database file is called out in the MATLAB program. Run the MATLAB program and GUI will appear. Click
on the user button to enter. Each user is asked to put in their passcode assigned personally to them only. Once
the user enters the password, on the left side an image will appear, and on the right-side data will be appeared
which has been stored in the database. The image on right can only be seen by others and the data can be
seen by the user himself only. This technique is call steganography which is used to keep the user data
secure.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3300 - 3309
3304
3. SOFTWARE RESULTS (GUI)
Figure 3 shows the results occupied from the data analysis using smart healthcare medical box. The
galvanic skin response is measured using GSR sensors on the fingers and the working principle of it is very
simple. As the user moves his fingers, there is sweat on the fingers from which the sensor detects the
emotional change of the user. For example, as seen in Figure 4, there is a galvanic skin response graph with
two-line indicating the normal emotion was the user and the change in emotion by just moving his finger.
Redline shows the normal emotion and the white line shows a change in emotion as the user moves his
fingers. If the sweating threshold moves above the pre-defined value which is 60 then the white line starts to
move above of red line for a specified time as shown in the graph. The live graph which is used to display the
emotional change of the user has the ability to shown live data for up to 3 months. The smoke detection
alarm is used for two different conditions, such as the "Normal" condition and "Alert" condition. As the
threshold passes 102 then the smoke detection sensors (MQ-135) sends the data to the app as “Alert” and the
value is showed to see how much smoke is present in that particular area. Max 30102 sensor is used to
measure heart rate and Spo2 level of the body. The body temperature is sensed by the LM 35 sensor module
which shows an accurate body temperature which is 36. Air quality, which is shown in Figure 5, the GUI is
CO2 gas present in the air which is also measured by MQ 135 air quality sensor. User is required to place
their hands on the device. Place RFID card on the reader to send the data on IoT platform and the data is
stored locally on txt. file. Run MATLAB and call text. file there in the code and run. The text. file in which
the data is being stored is called out in the steganography program where the whole data is being hidden in a
random image.
Figure 3. Software results
Run MATLAB code and a GUI will be displayed. Select user login and out in the unique password
for each user to view the data. Data can be only viewed by the user who has entered the unique password and
others will only see an image where the text is being stored and hence data is not visible to the unknown.
Users can compare the data with the IoT platform which is Blynk in this case where data is transmitted using
NodeMCU. Following are the steps that how the steganography technique is applied to keep the data secure
and private for the users and family members so that their data is not in the wrong hands. This technique is
very useful in the healthcare field as many of the users had a concern that their data is being stolen and used
against them but now that will not be so easy again.
6. Int J Elec & Comp Eng ISSN: 2088-8708
IoT based on secure personal healthcare using RFID technology and steganography (Haider Ali Khan)
3305
Figure 4. MATLAB GUI (steganography)
4. TESTING OF THE PROPOSED DESIGN
4.1. Air quality and smoke detection
The sensor output was connected to Arduino mega. Sensor MQ 135 was used to measure Co2 in the
surroundings for patients' better health analysis and monitor breathing conditions. The gases were also
identified by assigning the threshold using the same sensor. The voltage output of the sensor was connected
to 5v of Arduino mega and the Gnd was connected with the ground of Arduino mega using wires. The
software used to program the sensor was Arduino IDE and the programming language used for conduction
the data was C+. The data was analyzed using the serial monitor in the Arduino software by Serial. print
function. Co2 is shown in PPM and smoke detection is shown in percentage with a threshold of 102 which
means once the percentage crosses the threshold of 102 the Alert sign will be indicated on a mobile app using
Blynk. The average of samples is not taken for this experiment as Co2 in the air is not constant and changes
rapidly. There were in total of 10 samples taken for the following experiment.
In normal conditions, the Co2 present in the air is around 450-550 PPM and smoke present in room
condition is about 60-80 percent. Once the sensor was exposed to the smoke of cigarette the smoke threshold
crossed 120 and gave an alert on the mobile app and the value of Co2 was shoot to 755 PPM indicating the
danger in the user's surroundings. The C02 detection test is shown in Figure 5. The data were also analyzed
in the Arduino graph plotter where the data can be seen in form of a graph and the amount of change
happening at a particular time which is shown in Figure 6 which is smoke detection. Air quality rises from
the normal threshold which is about 450-580 PPM once the smoke is detected by the sensor. The more smoke
is present in the air determines the more PPM which can be dangerous for the user in terms of personal
healthcare.
4.2. Latency test
NodeMCU is connected with Arduino mega and transmits data once it is connected with Wi-Fi.
Latency test helps to determine how much latency is there in the system which is a system delay while
processing the data. As a result, it can be predicted whether the device will meet the criteria of low latency
and hence take steps to minimize it before losing vital data. Figure 7 shows the latency test of the hardware
and the expected time data is from 0 seconds to 1 second. Values of both real-time data are not constant
whereas, expected data is constant along with average data, and hence it can be analyzed that there is a delay
in the system of 1.18 s. Figure 8 shows the latency test of the software and its results. The range of software
is from 0 seconds to 1.4 seconds which is also real-time data and the expected time data is from 0 seconds to
0.8 seconds. Values of both real-time data are not constant and expected data is constant along with average
data and hence it can be analyzed that there is a delay in the system of about 1.7 s.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3300 - 3309
3306
Figure 5. Co2 Graphical testing Figure 6. Smoke detection graphical testing
Figure 7. Latency test hardware Figure 8. Latency test software
4.3. Heartrate testing
This section well illustrates the use of the max 30102 sensor for measurement of heart rate and Spo2
level in the body. The sensor is used for measuring the heart rate and Spo2 level of the user. The sensor was
programmed using Arduino software and C+ programming language. The microcontroller used to program
the sensor was NodeMCU and data was analyzed and send to the Blynk app using Wi-Fi. There was serval
testing done for measuring the accuracy and precision of the sensors used in the smart healthcare medical box
and it was compared by Samsung S10 mobile phone which is much more accurate. The values of the
obtained heart rate are shown in Figure 9. The average value of heartrate measured from Samsung s10 was
taken as the values shown by the device are not precise and accurate enough as per their information on the
Samsung website. The average value which was calculated was 83.5 BPM and the average value of smart
healthcare box was 98 BPM at the same interval giving an error of 15.5%. Data measured by smart medical
box is not accurate as the sensor used to measure the data was not industrially manufactured and it can be
improved. SPo2 is blood oxygen level measured by two different devices having 12 sample data each as
shown in Figure 10. Sample data were fluctuating for both of the devices because with average was
calculated and the final sample data was analyzed in the IoT platform. The average data of Samsung s10 was
accurate enough rather than that of smart healthcare medical box because the sensor used in getting the data
was not industrial accurate enough.
4.4. Interbeat analysis
The pulse sensor which is used to measure heart rate is maxed 30102 and the user can get the data
only by placing one finger on the sensor. From the pulse sensor, interbeat time can be calculated which is the
time required for one heartbeat. The test is done for various patients with a change in activities. Interbeat time
is calculated for two activities one is when the patient is at rest and the other one is when the patient is
8. Int J Elec & Comp Eng ISSN: 2088-8708
IoT based on secure personal healthcare using RFID technology and steganography (Haider Ali Khan)
3307
exercising. The data which was collected is for 5 different people to know the accuracy of the tests and the
error difference between interbeat actual time and detected time. The data is shown in tabulated form in
Tables 1 and 2. Interbeat is measured in milliseconds.
Figure 9. Heartrate testing plotter
Figure 10. Spo2 testing plotter
Table 1. Interbeat time at rest
No of
People
Interbeat Time
Actual (ms)
Interbeat Time
Detected (ms)
Error
Difference
Accuracy %
1 731.7 731.7 0.00 100
2 731.7 750 -18.3 97.4
3 652.1 625 27.1 95.8
4 833.3 882.35 49.05 94.1
5 769.2 750 19.2 97.5
Table 2. Interbeat time at rest
No of
People
Interbeat Time
Actual (ms)
Interbeat Time
Detected (ms)
Error
Difference
Accuracy %
1 468.7 483.8 -15.1 98.9
2 444.4 428.5 15.9 96.4
3 394.7 379.7 15 96.1
4 454.5 468.7 -14.2 96.8
5 434.7 491.8 -57.1 86.86
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3300 - 3309
3308
4.5. GUI & GSR testing
The galvanic skin response is calculated by GSR finger sensors and is very easy to use. As the user
moves his finger, the sensor detects emotional change for the user by sweating his finger. The line displays
natural emotion and the white line indicates emotional change when the user's fingers pass. The white line
travels above a red line for a specified time, as seen in the graph, when it is above a given value of 60. The
Arduino-Software was used to program the NodeMCU ESP8266 microcontroller with the Arduino super
RFID reader that handles all sensors and displays. The heart rate is determined by max 30102 and Spo2 is
also calculated by the same oxygen level of the blood of the body. The sensor module of LM 35 sensors is
used to sensor the body temperature, which is precisely 36. Air quality which is shown in the GUI is CO2 gas
present in the air which is also measured by MQ 135 air quality sensor. The line displays natural emotion and
the white line indicates emotional change when the user's fingers pass. Figure 11 shows the testing of the
complete GUI. The white line stays above the red line for the defined time, as seen in the graph if the sweat
level moved above the value 60. There was a total so 10 samples taken while doing the final testing of the
prototype and these testing were taken as an average of the complete system.
Figure 11. Testing of complete GUI
5. CONCLUSION
This research aims to design and develop IoT based secure personal healthcare system using RFID
technology and steganography for user's better health analyses and security purposes. The proposed design
has been programmed successfully on Wi-Fi-based Arduino Mega integrated with MATLAB using two
different GUI. One GUI is used for the IoT platform which is Blynk and the data is smartly transmitted there.
Another GUI is for securing data behind an image using Steganography Technique. 1st GUI was built on
Blynk and 2nd GUI was built on MATLAB app designer. The consumer had a separate database with RFID
technology to make health assessments safer and more reliable and open only to doctors and consumer
relatives. objectives were achieved by the integration of sensors using Arduino mega and the implementation
of two-step security. The RFID was used in such a way that the user is only capable of getting the data once
they have placed their card on the reader where the data is stored in a database and IoT.
REFERENCES
[1] R. Mitra and R. Ganiga, “A novel approach to sensor implementation for healthcare systems using internet of
things,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 5031–5045,
2019.
[2] A. Rghioui and A. Oumnad, “Challenges and Opportunities of the Internet of Things in Healthcare,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 2753–2761, 2018.
[3] Murugan, A., Chechare, T., Muruganantham, B., and Kumar, S. G., “Healthcare information exchange using block
chain technology,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1,
pp. 421–426, 2020, doi: 10.11591/ijece.v10i1.pp421-426.
[4] Rodrigues, A. M., Gouveia, N., Da Costa, L. P., Eusébio, M., Ramiro, S., Machado, P et al., “EpiReumaPt- the
study of rheumatic and musculoskeletal diseases in Portugal: a detailed view of the methodology,” Acta Reumatol
Port, vol. 40, pp. 110–124, 2015.
10. Int J Elec & Comp Eng ISSN: 2088-8708
IoT based on secure personal healthcare using RFID technology and steganography (Haider Ali Khan)
3309
[5] Tyagi, S., Agarwal, A., and Maheshwari, P., “A conceptual framework for IoT-based healthcare system using cloud
computing,” in 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), Jan.
2016, pp. 503–507, doi: 10.1109/CONFLUENCE.2016.7508172.
[6] Cui, L., Zhang, Z., Gao, N., Meng, Z., and Li, Z., “Radio Frequency Identification and Sensing Techniques and
Their Applications-A Review of the State-of-the-Art,” Sensors, vol. 19, no. 18, p. 4012, 2019,
doi: 10.3390/s19184012.
[7] Dong, H. J., Abdulla, R., Selvaperumal, S. K., Duraikannan, S., Lakshmanan, R., and Abbas, M. K., “Interactive on
smart classroom system using beacon technology,” International Journal of Electrical and Computer Engineering
(IJECE), vol. 9, no. 5, pp. 4250–4257, 2019, doi: 10.11591/ijece.v9i5.pp4250-4257.
[8] Eldemerdash, T., Abdulla, R., Jayapal, V., Nataraj, C., and Abbas, M. K., “IoT Based Smart Helmet for Mining
Industry Application,” Int. Journal of Advanced Science and Technology, vol. 29, no. 1, pp. 373–387, 2020.
[9] Rose, K., Eldridge, S., and Chapin, L., “The Internet of Things and Overview,” The Internet Society (ISOC), 2015.
[10] N. Gondchawar and R. S. Kawitkar, “IOT based smart agriculture,” International Journal of Advanced Research in
Computer and Communication Engineering, vol. 5, no. 6, pp. 838–842, 2016.
[11] Abdulla, R., Abdillahi, A., and Abbas, M. K., “Electronic Toll Collection System based on Radio Frequency
Identification System,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 3,
p. 1602, Jan. 2018, doi: 10.11591/ijece.v8i3.pp1602-1610.
[12] Lakshmanan, R., Djama, M., Selvaperumal, S. K., and Abdulla, R., “Automated smart hydroponics system using
internet of things,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6,
pp. 6389–6398, 2020, doi: 10.11591/ijece.v10i6.pp6389-6398.
[13] S. Li, L. Xu, and X. Wang, “Compressed sensing signal and data acquisition in wireless sensor networks and
internet of things,” IEEE Trans. Ind. Information., vol. 9, no. 4, pp. 2177–2186, Nov. 2013.
[14] Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S et al., “Building the Internet of Things Using
RFID The RFID Ecosystem Experience,” IEEE Internet Computing, vol. 13, pp. 48–55, 2016,
doi: 10.1109/MIC.2009.52.
[15] Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., and Marrocco, G., “RFID technology for IoT-based personal
healthcare in smart spaces,” IEEE Internet of Things Journal, vol. 1, no. 2, pp. 144–152, 2014,
doi: 10.1109/JIOT.2014.2313981.
[16] C. E. Turcu and C. O. Turcu, “Internet of Things as Key Enabler for Sustainable Healthcare Delivery,” Procedia -
Social and Behavioral Sciences, vol. 73, pp. 251–256, 2013.
[17] K. R. Foster and J. Jaeger, “Ethical implications of implantable radiofrequency identification (RFID) tags in
humans,” The American Journal of Bioethics, vol. 8, no. 8, pp. 44–48, 2008.
[18] A. G. Sampoornam, “An Efficient Healthcare System in IoT Platform Using RFID System,” International Journal
of Advanced Research in Electronics and Communication Engineering (IJARECE), vol. 5, no. 2, pp. 421–424,
2020.
[19] S. Holey and S. Bhosale, “Smart Health Care System Using Internet of Things,” in Internet of Things: Towards a
Smart Future & Recent Trends in Electronics & Communication, Karvenagar, 2016, vol. 52, pp. 1–4.
[20] Firouzi, F., Rahmani, A. M., Mankodiya, K., Badaroglu, M., Merrett, G. V., Wong, P., and Farahani, B., “Internet-
of-Things and Big Data for Smarter Healthcare: From Device to Architecture, Applications, and Analytics,” Future
Generation. Comput. Syst., vol. 78, pp. 583–586, Jan. 2018, doi: 10.1016/j.future.2017.09.016.
[21] S. Jindarat and P. Wuttidittachotti, “Smart Farm Monitoring using Raspberry Pi and Arduino,” in Proc. 2015
International Conference on Computer, Communications, and Control Technology (I4CT), pp. 284–288, 2015,
doi: 10.1109/I4CT.2015.7219582.
[22] Gope, P., Gheraibia, Y., Kabir, S., and Sikdar, B., “A Secure IoT-based Modern Healthcare System with Fault-
tolerant Decision Making Process,” IEEE Journal of Biomedical and Health Informatics, 2020,
doi: 10.1109/JBHI.2020.3007488.
[23] Martínez Pérez, M., Vázquez González, G., and Dafonte, C., “Evaluation of a Tacking System for Patients and
Mixed Intravenous Medication Based on RFID Technology,” Sensors, vol. 16, no. 12, p. 2031, 2016,
doi: 10.3390/s16122031.
[24] Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M. L., and Tarricone, L., “An iot-
aware architecture for smart healthcare systems,” IEEE Internet of Things Journal, vol. 2, no. 6, pp. 515-526, 2015,
doi: 10.1109/JIOT.2015.2417684.
[25] U. Salama, L. Yao, and H. Paik, “An Internet of Things Based Multi-Level Privacy-Preserving Access Control for
Smart Living,” Informatics (Basel), vol. 5, no. 23, May 2018.