This was the final presentation made during the external review. The Android
Apps with regard to the ICU Automation shown in the slides were also demonstrated using the Aakash Tablet
This document provides an overview of an ICU automation project. It discusses the timeline of events, including industrial training. It describes the goals of automation and research possibilities in the ICU, as well as the development tools and network architecture used. It also discusses the mini project, which involves designing Android applications for the ICU automation system, and the thesis phase-1, which will include a literature survey and scope of proposed work.
A UML Profile for Security and Code Generation IJECEIAES
Recently, many research studies have suggested the integration of safety engineering at an early stage of modeling and system development using Model-Driven Architecture (MDA). This concept consists in deploying the UML (Unified Modeling Language) standard as aprincipal metamodel for the abstractions of different systems. To our knowledge, most of this work has focused on integrating security requirements after the implementation phase without taking them into account when designing systems. In this work, we focused our efforts on non-functional aspects such as the business logic layer, data flow monitoring, and high-quality service delivery. Practically, we have proposed a new UML profile for security integration and code generation for the Java platform. Therefore, the security properties will be described by a UML profile and the OCL language to verify the requirements of confidentiality, authorization, availability, data integrity, and data encryption. Finally, the source code such as the application security configuration, the method signatures and their bodies, the persistent entities and the security controllers generated from sequence diagram of system’s internal behavior after its extension with this profile and applying a set of transformations.
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIEScscpconf
This document discusses effective embedded systems software design methodologies. It begins with an introduction to the need to improve engineering curricula to include subjects like embedded systems and multiprocessor system-on-chip design. It then discusses multiprocessor system-on-chip and embedded programming. Key steps in the design methodology are outlined, including system specification, hardware/software partitioning, use of real-time operating systems, and embedded C programming. Applications of embedded systems are also mentioned. The document concludes that the demand for skilled graduates in embedded systems will increase and subjects must be taught effectively to meet industry needs.
Discusses sociotechnical issues that arose in the design of a national digital learning system intended for use by more than a million students and their teachers
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
This paper proposes a new mechanism called HMADCAS for continuous user authentication and adaptive session management in distributed internet services. HMADCAS uses biometric information like facial recognition to authenticate users transparently without requiring explicit user actions. It assigns adaptive session timeouts based on the quality, frequency and type of biometric data obtained from the user. The goal is to balance security and usability by keeping user sessions open even during periods of user inactivity, while continuously authenticating the user to detect potential intrusions. The paper discusses the system architecture of HMADCAS and describes modules for authentication servers, certificates and continuous authentication using biometrics. It concludes that the protocol can improve security and usability compared to traditional single-factor authentication methods with fixed
Information security management guidance for discrete automationjohnnywess
This document summarizes guidance for establishing an information security management program for industrial automation departments. It finds that while standards and guidance are now readily available, implementing a comprehensive security program requires extensive cross-functional collaboration. None of the publications can be implemented alone by automation departments due to their complexity and need for interdepartmental expertise in areas like risk assessment and network segmentation. Effectively addressing vulnerabilities will require integrating security practices with existing organizational processes and acquiring new technical knowledge across roles.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document analyzes studies on automation in the field of information security management. It finds that about 30% of the 133 controls from ISO 27001 can be automated using existing security software tools. It also discusses how the Security Content Automation Protocol (SCAP) can automate compliance and security configuration checking. SCAP provides a standardized way for security software to communicate information about vulnerabilities and configurations. The document concludes that while some isolated automation approaches exist, integrating these approaches can help organizations maximize the benefits of automation in their information security management systems.
This document provides an overview of an ICU automation project. It discusses the timeline of events, including industrial training. It describes the goals of automation and research possibilities in the ICU, as well as the development tools and network architecture used. It also discusses the mini project, which involves designing Android applications for the ICU automation system, and the thesis phase-1, which will include a literature survey and scope of proposed work.
A UML Profile for Security and Code Generation IJECEIAES
Recently, many research studies have suggested the integration of safety engineering at an early stage of modeling and system development using Model-Driven Architecture (MDA). This concept consists in deploying the UML (Unified Modeling Language) standard as aprincipal metamodel for the abstractions of different systems. To our knowledge, most of this work has focused on integrating security requirements after the implementation phase without taking them into account when designing systems. In this work, we focused our efforts on non-functional aspects such as the business logic layer, data flow monitoring, and high-quality service delivery. Practically, we have proposed a new UML profile for security integration and code generation for the Java platform. Therefore, the security properties will be described by a UML profile and the OCL language to verify the requirements of confidentiality, authorization, availability, data integrity, and data encryption. Finally, the source code such as the application security configuration, the method signatures and their bodies, the persistent entities and the security controllers generated from sequence diagram of system’s internal behavior after its extension with this profile and applying a set of transformations.
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIEScscpconf
This document discusses effective embedded systems software design methodologies. It begins with an introduction to the need to improve engineering curricula to include subjects like embedded systems and multiprocessor system-on-chip design. It then discusses multiprocessor system-on-chip and embedded programming. Key steps in the design methodology are outlined, including system specification, hardware/software partitioning, use of real-time operating systems, and embedded C programming. Applications of embedded systems are also mentioned. The document concludes that the demand for skilled graduates in embedded systems will increase and subjects must be taught effectively to meet industry needs.
Discusses sociotechnical issues that arose in the design of a national digital learning system intended for use by more than a million students and their teachers
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
This paper proposes a new mechanism called HMADCAS for continuous user authentication and adaptive session management in distributed internet services. HMADCAS uses biometric information like facial recognition to authenticate users transparently without requiring explicit user actions. It assigns adaptive session timeouts based on the quality, frequency and type of biometric data obtained from the user. The goal is to balance security and usability by keeping user sessions open even during periods of user inactivity, while continuously authenticating the user to detect potential intrusions. The paper discusses the system architecture of HMADCAS and describes modules for authentication servers, certificates and continuous authentication using biometrics. It concludes that the protocol can improve security and usability compared to traditional single-factor authentication methods with fixed
Information security management guidance for discrete automationjohnnywess
This document summarizes guidance for establishing an information security management program for industrial automation departments. It finds that while standards and guidance are now readily available, implementing a comprehensive security program requires extensive cross-functional collaboration. None of the publications can be implemented alone by automation departments due to their complexity and need for interdepartmental expertise in areas like risk assessment and network segmentation. Effectively addressing vulnerabilities will require integrating security practices with existing organizational processes and acquiring new technical knowledge across roles.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document analyzes studies on automation in the field of information security management. It finds that about 30% of the 133 controls from ISO 27001 can be automated using existing security software tools. It also discusses how the Security Content Automation Protocol (SCAP) can automate compliance and security configuration checking. SCAP provides a standardized way for security software to communicate information about vulnerabilities and configurations. The document concludes that while some isolated automation approaches exist, integrating these approaches can help organizations maximize the benefits of automation in their information security management systems.
This document discusses an industrial training project at Mobilexion Technologies to design an Intensive Care Unit Automation System (ICUAS) integrated with a Hospital Information Management System (HIMS). It provides an overview of the current HIMS workflow, the ICUAS architecture including key components like the network, tools used, and sample Android implementation screens. The goal of ICUAS is to overcome problems in ICUs by providing effective decision support and seamlessly integrating with HIMS to save time and efficiently manage patient information.
This document presents an overview of an ICU automation project being developed by students. It discusses developing a centralized server to store patient data from various monitoring instruments connected through different interfaces. It describes the top-level architecture and network architecture involving a central server and wireless connectivity. It also discusses the monitoring instruments being used, development tools and platforms, and provides sample android app designs. The goal is to automate ICU processes like generating electronic medical records and alerts to improve patient care.
Solit 2013, Презентация факультета информационных технологий и робототехники ...solit
Александр Леонидович Руденя, Минск. Ассистент Факультета информационных технологий и робототехники БНТУ.
«Презентация Факультета информационных технологий и робототехники БНТУ». studentCamp.
IRJET- Application of Emerging Artificial Intelligence Methods in Structural ...IRJET Journal
This document discusses the application of emerging artificial intelligence methods in structural engineering. It provides an overview of expert systems and artificial neural networks, which are manifestations of artificial intelligence that have been applied in structural engineering. Specifically, it discusses how expert systems and neural networks have been used for structural analysis, design, non-destructive testing, and other applications in civil engineering. The document also reviews the potential for using knowledge-based systems and machine learning approaches to assist with conceptual and preliminary structural design processes.
Lec 01(introduction) Mechatronic systems Mohamed Atef
This document outlines a course on mechatronics, including course content, assessment, textbooks, and examples of mini-projects. The course covers topics like mechatronics systems components, product design techniques, actuators, sensors, and PLC and data acquisition. Assessment includes lab progress, mini-project progress and submission, attendance, and a final exam. Examples of mini-projects provided include a medical needle insertion simulator and an adaptive bionic gripper. The document also discusses definitions and background of mechatronics, components of mechatronic systems, and advancements in fields like automotive, biomedical, and aviation applications.
IBMS IN HIGH RISE BUILDINGS (HVAC AND LIGHTING) COST OPTIMIZATIONIRJET Journal
This document discusses the optimization of HVAC and lighting costs in high-rise buildings using integrated building management systems (IBMS). It begins with an abstract introducing the use of internet-connected sensor networks and cloud technologies for intelligent building management. The document then reviews the objectives and methodology of the study, provides a literature review of relevant IBMS technologies and case studies of high-rise buildings employing optimized IBMS frameworks. Key components of IBMS discussed include HVAC, lighting, security, fire detection and individual building case studies analyzing implemented systems.
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering.
Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher.
Learn More: https://bit.ly/3bWsGpz
Contact Us:
Website: https://www.phdassistance.com/
UK NO: +44–1143520021
India No: +91–4448137070
WhatsApp No: +91 91769 66446
Email: info@phdassistance.com
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
Supervised Active Intelligence: an innovative approach to Automated Incident Response based on Machine Learning, leveraging orchestration, automated playbooks and integration with existing Security Ecosystem
This document provides an overview of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS), including fundamentals, evolution over time, vulnerabilities, security frameworks, good practices, and resources. It defines SCADA/ICS, describes how they have become more interconnected, lists vulnerabilities like outdated systems and remote access, outlines security standards like NIST and NERC, recommends practices like segmentation and patching, and provides example frameworks and resources.
ELEMENTS OF MECHANICAL ENGG. Module 5 MECHATRONICS (1).pptxManjunathtv2
The document discusses open loop and closed loop control systems. An open loop system has no feedback, so its accuracy depends solely on the controller's ability to output the correct number of steps. A closed loop system has feedback, so it is more accurate and reliable as it can account for any errors in its output. The document provides examples of open and closed loop diagrams and compares various characteristics of the two systems such as definition, construction, reliability, accuracy, and response.
This document discusses trends in industrial IoT and how equipment companies can respond. It outlines Cathy Yeh's agenda which includes trends in industrial IoT and Microsoft's strategy, smart manufacturing use cases, and an innovative business model example using AOI cloud. It describes challenges facing global manufacturing from trends like shortened product lifecycles, rapidly changing operating environments, and industry ecosystem changes. It then provides examples of how industrial IoT solutions from Microsoft and partners can provide insights, reduce costs, and enable new revenue streams for customers through solutions like predictive maintenance and remote monitoring.
This document describes a proposed user-centric machine learning framework for a cyber security operations center. It discusses the typical data sources in a SOC like security logs and alerts from various systems. It explains how this data can be processed and used to create an effective machine learning system to evaluate user risks. This would help security analysts prioritize investigations and improve efficiency. The proposed framework integrates alert information, security logs, and analyst notes to generate features and labels for machine learning models. It aims to reduce manual analysis workload while enhancing security. The document also provides an example implementation using real industry data to demonstrate the full process from data collection and labeling to model training and evaluation.
Ron McGary wrote a paper on the future of artificial intelligence in manufacturing. He discusses how AI can reduce costs by enabling predictive maintenance to minimize unexpected downtime. Wireless monitoring technologies allow AI systems to continuously monitor equipment and predict failures. Expert systems and knowledge-based AI can be applied to manufacturing processes to optimize production parameters and diagnose faults. The basic architecture of AI systems involves continuous data collection, analysis, and feedback to adjust processes accordingly. As AI technologies continue to advance, they will play a larger role in improving manufacturing productivity and competitiveness.
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...Sunil Rajput
Setup your own cloud for Software as a Service (SaaS) over the existing LAN in your laboratory. In this assignment you have to write your own code for cloud controllers using open source technologies without HDFS. Implementing the basic operations may be like uploading and downloading files on/from cloud in encrypted form.
IPsoft is a company that provides autonomic technology and remote infrastructure management services to manage IT infrastructure with minimal human intervention. It has managed over 10 million incidents autonomically through its Virtual Engineer technology. This reduces the mean time to resolution by 60% and operational costs by 30-35% for customers. IPsoft is compliant with several security and industry standards and manages hundreds of customers across various industries globally through its centralized management platform IPcenter.
Nexthink-See your infrastructure as never before!!rolandpiedl
Nexthink helps IT departments improve end-user experience through real-time monitoring, analytics, and visualization from the end-user perspective. It monitors all configurations, activities, events, connections, bandwidth, abnormalities and errors continuously. Nexthink provides instant visibility into the end-user experience and adds a new perspective to existing IT tools. It allows real-time notification of issues and their scope of impact, as well as real-time root cause analysis for help desks. Nexthink can also detect abnormal configurations and security issues in real-time to improve security and aid in IT projects and infrastructure changes.
The document summarizes a presentation on collaborative robots for industrial and commercial applications. It includes an introduction to collaborative robots, outlines the problem definition, provides a literature survey summarizing several research papers, lists the objectives of the project, and outlines the methodology, implementation plan, model design, and probable outcomes. It concludes with references cited in the presentation.
Cloud computing bukanlah satu bagian dari teknologi seperti microchip atau telepon genggam. Sebaliknya, ini merupakan sebuah sistem yang utamanya terdiri dari tiga layanan: software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), dan platform-as-a-service (PaaS).
How stuxnet spreads – a study of infection paths in best practice systemsYury Chemerkin
The document analyzes how the Stuxnet worm could spread from an infected computer on a corporate network to compromise an isolated industrial control system (ICS) following best security practices. It describes a hypothetical high-security ICS site and proposes several pathways Stuxnet could use to migrate internally and sabotage the system. Key findings include that completely preventing infection is impossible and ICS security must focus on containment, segmentation, diversity, and improving security culture.
Environmental economics applies economic principles to study human interaction with the environment. It examines how people use and manage environmental resources and how economic activities impact the environment. Environmental economics draws from other economic subdisciplines and analyzes how economic behaviors, institutions, and policies can address environmental issues. It also considers the interdependence between human economies and the environment, addressing issues like non-optimal pricing of environmental goods and services.
This document provides a course file for the "Programming in C" course offered from July 2013 to November 2013. It includes information on the course objectives, syllabus, lecture schedule, assignments, and assessments. The file also maps the course outcomes to the program outcomes to demonstrate how the course meets the overall program objectives.
This document discusses an industrial training project at Mobilexion Technologies to design an Intensive Care Unit Automation System (ICUAS) integrated with a Hospital Information Management System (HIMS). It provides an overview of the current HIMS workflow, the ICUAS architecture including key components like the network, tools used, and sample Android implementation screens. The goal of ICUAS is to overcome problems in ICUs by providing effective decision support and seamlessly integrating with HIMS to save time and efficiently manage patient information.
This document presents an overview of an ICU automation project being developed by students. It discusses developing a centralized server to store patient data from various monitoring instruments connected through different interfaces. It describes the top-level architecture and network architecture involving a central server and wireless connectivity. It also discusses the monitoring instruments being used, development tools and platforms, and provides sample android app designs. The goal is to automate ICU processes like generating electronic medical records and alerts to improve patient care.
Solit 2013, Презентация факультета информационных технологий и робототехники ...solit
Александр Леонидович Руденя, Минск. Ассистент Факультета информационных технологий и робототехники БНТУ.
«Презентация Факультета информационных технологий и робототехники БНТУ». studentCamp.
IRJET- Application of Emerging Artificial Intelligence Methods in Structural ...IRJET Journal
This document discusses the application of emerging artificial intelligence methods in structural engineering. It provides an overview of expert systems and artificial neural networks, which are manifestations of artificial intelligence that have been applied in structural engineering. Specifically, it discusses how expert systems and neural networks have been used for structural analysis, design, non-destructive testing, and other applications in civil engineering. The document also reviews the potential for using knowledge-based systems and machine learning approaches to assist with conceptual and preliminary structural design processes.
Lec 01(introduction) Mechatronic systems Mohamed Atef
This document outlines a course on mechatronics, including course content, assessment, textbooks, and examples of mini-projects. The course covers topics like mechatronics systems components, product design techniques, actuators, sensors, and PLC and data acquisition. Assessment includes lab progress, mini-project progress and submission, attendance, and a final exam. Examples of mini-projects provided include a medical needle insertion simulator and an adaptive bionic gripper. The document also discusses definitions and background of mechatronics, components of mechatronic systems, and advancements in fields like automotive, biomedical, and aviation applications.
IBMS IN HIGH RISE BUILDINGS (HVAC AND LIGHTING) COST OPTIMIZATIONIRJET Journal
This document discusses the optimization of HVAC and lighting costs in high-rise buildings using integrated building management systems (IBMS). It begins with an abstract introducing the use of internet-connected sensor networks and cloud technologies for intelligent building management. The document then reviews the objectives and methodology of the study, provides a literature review of relevant IBMS technologies and case studies of high-rise buildings employing optimized IBMS frameworks. Key components of IBMS discussed include HVAC, lighting, security, fire detection and individual building case studies analyzing implemented systems.
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering.
Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher.
Learn More: https://bit.ly/3bWsGpz
Contact Us:
Website: https://www.phdassistance.com/
UK NO: +44–1143520021
India No: +91–4448137070
WhatsApp No: +91 91769 66446
Email: info@phdassistance.com
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
Supervised Active Intelligence: an innovative approach to Automated Incident Response based on Machine Learning, leveraging orchestration, automated playbooks and integration with existing Security Ecosystem
This document provides an overview of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS), including fundamentals, evolution over time, vulnerabilities, security frameworks, good practices, and resources. It defines SCADA/ICS, describes how they have become more interconnected, lists vulnerabilities like outdated systems and remote access, outlines security standards like NIST and NERC, recommends practices like segmentation and patching, and provides example frameworks and resources.
ELEMENTS OF MECHANICAL ENGG. Module 5 MECHATRONICS (1).pptxManjunathtv2
The document discusses open loop and closed loop control systems. An open loop system has no feedback, so its accuracy depends solely on the controller's ability to output the correct number of steps. A closed loop system has feedback, so it is more accurate and reliable as it can account for any errors in its output. The document provides examples of open and closed loop diagrams and compares various characteristics of the two systems such as definition, construction, reliability, accuracy, and response.
This document discusses trends in industrial IoT and how equipment companies can respond. It outlines Cathy Yeh's agenda which includes trends in industrial IoT and Microsoft's strategy, smart manufacturing use cases, and an innovative business model example using AOI cloud. It describes challenges facing global manufacturing from trends like shortened product lifecycles, rapidly changing operating environments, and industry ecosystem changes. It then provides examples of how industrial IoT solutions from Microsoft and partners can provide insights, reduce costs, and enable new revenue streams for customers through solutions like predictive maintenance and remote monitoring.
This document describes a proposed user-centric machine learning framework for a cyber security operations center. It discusses the typical data sources in a SOC like security logs and alerts from various systems. It explains how this data can be processed and used to create an effective machine learning system to evaluate user risks. This would help security analysts prioritize investigations and improve efficiency. The proposed framework integrates alert information, security logs, and analyst notes to generate features and labels for machine learning models. It aims to reduce manual analysis workload while enhancing security. The document also provides an example implementation using real industry data to demonstrate the full process from data collection and labeling to model training and evaluation.
Ron McGary wrote a paper on the future of artificial intelligence in manufacturing. He discusses how AI can reduce costs by enabling predictive maintenance to minimize unexpected downtime. Wireless monitoring technologies allow AI systems to continuously monitor equipment and predict failures. Expert systems and knowledge-based AI can be applied to manufacturing processes to optimize production parameters and diagnose faults. The basic architecture of AI systems involves continuous data collection, analysis, and feedback to adjust processes accordingly. As AI technologies continue to advance, they will play a larger role in improving manufacturing productivity and competitiveness.
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...Sunil Rajput
Setup your own cloud for Software as a Service (SaaS) over the existing LAN in your laboratory. In this assignment you have to write your own code for cloud controllers using open source technologies without HDFS. Implementing the basic operations may be like uploading and downloading files on/from cloud in encrypted form.
IPsoft is a company that provides autonomic technology and remote infrastructure management services to manage IT infrastructure with minimal human intervention. It has managed over 10 million incidents autonomically through its Virtual Engineer technology. This reduces the mean time to resolution by 60% and operational costs by 30-35% for customers. IPsoft is compliant with several security and industry standards and manages hundreds of customers across various industries globally through its centralized management platform IPcenter.
Nexthink-See your infrastructure as never before!!rolandpiedl
Nexthink helps IT departments improve end-user experience through real-time monitoring, analytics, and visualization from the end-user perspective. It monitors all configurations, activities, events, connections, bandwidth, abnormalities and errors continuously. Nexthink provides instant visibility into the end-user experience and adds a new perspective to existing IT tools. It allows real-time notification of issues and their scope of impact, as well as real-time root cause analysis for help desks. Nexthink can also detect abnormal configurations and security issues in real-time to improve security and aid in IT projects and infrastructure changes.
The document summarizes a presentation on collaborative robots for industrial and commercial applications. It includes an introduction to collaborative robots, outlines the problem definition, provides a literature survey summarizing several research papers, lists the objectives of the project, and outlines the methodology, implementation plan, model design, and probable outcomes. It concludes with references cited in the presentation.
Cloud computing bukanlah satu bagian dari teknologi seperti microchip atau telepon genggam. Sebaliknya, ini merupakan sebuah sistem yang utamanya terdiri dari tiga layanan: software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), dan platform-as-a-service (PaaS).
How stuxnet spreads – a study of infection paths in best practice systemsYury Chemerkin
The document analyzes how the Stuxnet worm could spread from an infected computer on a corporate network to compromise an isolated industrial control system (ICS) following best security practices. It describes a hypothetical high-security ICS site and proposes several pathways Stuxnet could use to migrate internally and sabotage the system. Key findings include that completely preventing infection is impossible and ICS security must focus on containment, segmentation, diversity, and improving security culture.
Environmental economics applies economic principles to study human interaction with the environment. It examines how people use and manage environmental resources and how economic activities impact the environment. Environmental economics draws from other economic subdisciplines and analyzes how economic behaviors, institutions, and policies can address environmental issues. It also considers the interdependence between human economies and the environment, addressing issues like non-optimal pricing of environmental goods and services.
This document provides a course file for the "Programming in C" course offered from July 2013 to November 2013. It includes information on the course objectives, syllabus, lecture schedule, assignments, and assessments. The file also maps the course outcomes to the program outcomes to demonstrate how the course meets the overall program objectives.
The document summarizes an industrial visit, mini project, and main project phase 1 work done by Asha Yeldose. It includes:
1) An industrial visit to JMMC Trichur from December 2012 to February 2013.
2) A mini project involving preparing documentation and an IEEE technical paper on integrating ICU data into electronic medical records.
3) A main project involving identifying problems, conducting a literature survey, and developing a strategy for an ICU automation system using an Android tablet interface. Implementation is pending.
The presentation provides an overview of the work, describes the proposed ICU automation system architecture, and discusses development of an IEEE conference paper on integrating ICU data into electronic medical records.
Laboratory Linkage for NICU Automation in JMMCJoms Antony
This document provides an overview of the work completed as part of an industrial training program, mini project, and major project. It discusses an industrial visit to Jubilee Mission Medical College, a mini project involving the automation of laboratory linkage for an ICU, and a major project to develop a server-side architecture for an ICU automation system. The mini project proposed using tablets to submit lab test requests and view results electronically. The major project involved defining problems, conducting a literature review, and developing a solution strategy and implementation approach for the server-side architecture.
The document summarizes work completed for an industrial visit, mini project, and main thesis project. It includes an overview of work at a medical college, a mini project on ICU automation and electronic medical records, and a main project involving development of an icon-based text editor for nurse records input in ICU. Next steps for the main project involve further literature review, implementation, and testing strategies.
This document proposes a dynamic alert system to improve on existing static alert systems in hospitals. It describes monitoring patients' vital signs, detecting when thresholds are exceeded, and generating alerts. The proposed system would dynamically calculate alert seriousness based on trends over time and the recipient's context. Alerts would be audio, text, or both depending on severity. The architecture includes modules to classify signals, generate smart adaptive alerts using medical expert rules, and integrate with electronic medical records. This dynamic approach aims to reduce alarm fatigue by prioritizing the most important alerts.
The document discusses context aware computing and context aware alert delivery. Context aware computing aims to enhance user experience by scheduling tasks based on context, which includes location, identity, and state of people, groups, and objects. Context aware alert delivery considers the seriousness of alerts, location and activity of the recipient, time of day, and constraint specifications to determine the best mode for delivering alerts. The constraint specifications provide rules for selecting a delivery mode based on the recipient's context.
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...APCO
The Radar reflects input from APCO’s teams located around the world. It distils a host of interconnected events and trends into insights to inform operational and strategic decisions. Issues covered in this edition include:
Industrial Tech SW: Category Renewal and CreationChristian Dahlen
Every industrial revolution has created a new set of categories and a new set of players.
Multiple new technologies have emerged, but Samsara and C3.ai are only two companies which have gone public so far.
Manufacturing startups constitute the largest pipeline share of unicorns and IPO candidates in the SF Bay Area, and software startups dominate in Germany.
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
Digital Marketing with a Focus on Sustainabilitysssourabhsharma
Digital Marketing best practices including influencer marketing, content creators, and omnichannel marketing for Sustainable Brands at the Sustainable Cosmetics Summit 2024 in New York
𝐔𝐧𝐯𝐞𝐢𝐥 𝐭𝐡𝐞 𝐅𝐮𝐭𝐮𝐫𝐞 𝐨𝐟 𝐄𝐧𝐞𝐫𝐠𝐲 𝐄𝐟𝐟𝐢𝐜𝐢𝐞𝐧𝐜𝐲 𝐰𝐢𝐭𝐡 𝐍𝐄𝐖𝐍𝐓𝐈𝐃𝐄’𝐬 𝐋𝐚𝐭𝐞𝐬𝐭 𝐎𝐟𝐟𝐞𝐫𝐢𝐧𝐠𝐬
Explore the details in our newly released product manual, which showcases NEWNTIDE's advanced heat pump technologies. Delve into our energy-efficient and eco-friendly solutions tailored for diverse global markets.
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdfonlyfansmanagedau
In the competitive world of content creation, standing out and maximising revenue on platforms like OnlyFans can be challenging. This is where partnering with an OnlyFans agency can make a significant difference. Here are five key benefits for content creators considering this option:
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....Lacey Max
“After being the most listed dog breed in the United States for 31
years in a row, the Labrador Retriever has dropped to second place
in the American Kennel Club's annual survey of the country's most
popular canines. The French Bulldog is the new top dog in the
United States as of 2022. The stylish puppy has ascended the
rankings in rapid time despite having health concerns and limited
color choices.”
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
MCCS301-Final Presentation
1. Overview of ICU Automation Project
Industrial Training
Mini Project
Research Papers
Future work
Industrial Training & Mini Project
(Intensive Care Unit Automation Project)
Joms Antony
Guided by
Mr.Santhosh GS, AP CSE Dept
AMAL JYOTHI COLLEGE OF ENGINEERING
April 10, 2013
MCSCS 301 FINAL REVIEW 1of 31
2. Overview of ICU Automation Project
Timeline of events
Industrial Training
Automation & Research Possibilities
Mini Project
Development Tools Used
Research Papers
Network Architecture
Future work
1 Overview of ICU Automation Project
Timeline of events
Automation & Research Possibilities
Development Tools Used
Network Architecture
2 Industrial Training
Mobilexion Technologies
Profile
Core Competencies
Support & Training
3 Mini Project
Android Implementations
ICUAS-JMMC Android App Demonstration
4 Research Papers
5 Future work
Interfacing
Preliminary Work
MCSCS 301 FINAL REVIEW 2of 31
3. Overview of ICU Automation Project
Timeline of events
Industrial Training
Automation & Research Possibilities
Mini Project
Development Tools Used
Research Papers
Network Architecture
Future work
Timeline of events
The notification regarding MCSCS 301 was done on 21/11/2013.
With the consent of the Department and Project guides, our team
was allotted to involve in the ICU-Automation Project from
3/12/2013 onwards.
It was agreed that a part of our team will shift to JMMC Trichur
after the initial set-up.
Our team was expected to provide technical support for the project
from Mobilexion Technologies, Techno Park.
The first review of MCSCS 301 was done on 6/2/2013.
We had interactions with JMMC & ICFOSS during this period-12
days.
Our primary focus was on Technical Implementation.
MCSCS 301 FINAL REVIEW 2of 31
4. Overview of ICU Automation Project
Timeline of events
Industrial Training
Automation & Research Possibilities
Mini Project
Development Tools Used
Research Papers
Network Architecture
Future work
Intensive Care Unit
An Intensive Care Unit (ICU), also known as a Critical Care Unit (CCU)
is a special department of a hospital that provides intensive-care
medicine. Intensive Care Units cater to patients with the most serious
injuries and illnesses, most of which are life-threatening and need
constant, close monitoring and support from specialist equipment and
medication in order to maintain normal bodily functions
MCSCS 301 FINAL REVIEW 3of 31
5. Overview of ICU Automation Project
Timeline of events
Industrial Training
Automation & Research Possibilities
Mini Project
Development Tools Used
Research Papers
Network Architecture
Future work
Automation & Research Possibilities
Generation of Electronic
Medical Records
Dynamic Decision Support
Progress notes Systems Eg: Alert generation
Charts & recommendations.
Documents
Patient Data Ubiquitous Computing Eg:
Ubiquitous patient Monitoring.
Automated Monitoring and
Alert Generation. Human Machine Interface
Systems Eg: Touch user
Interfacing of Bed Side interface, Intelligent user
Monitors and Data Storage inteface(gestures)
Bar Code Integration Context Aware Computing Eg:
Lab Tests and Results Doctor/Patient context.
and many more...
MCSCS 301 FINAL REVIEW 4of 31
6. Overview of ICU Automation Project
Timeline of events
Industrial Training
Automation & Research Possibilities
Mini Project
Development Tools Used
Research Papers
Network Architecture
Future work
Development Tools Used
Programming Language: DBMS:
Java FrameWork:
IDE: Mobile/Tab Platform:
SERVER: Server Machine OS:
MCSCS 301 FINAL REVIEW 5of 31
7. Overview of ICU Automation Project
Timeline of events
Industrial Training
Automation & Research Possibilities
Mini Project
Development Tools Used
Research Papers
Network Architecture
Future work
Network Architecture
MCSCS 301 FINAL REVIEW 6of 31
8. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Mobilexion Technologies
Mobilexion Technologies is a start-up company located in Techno Park
which hosts over 270 IT and ITES companies employing over 40,000 IT
professionals. Mobilexion Technologies incubated our team for the
execution of this project from 3/12/2013.
MCSCS 301 FINAL REVIEW 7of 31
9. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Mobilexion Technologies-Profile
Private Limited Company incorporated in July 2012.
Located at Amstor House, Technopark, Trivandrum.
Vision - Explore Areas Others Wont Venture.
Areas of interest Health Informatics, Biomedical, Acoustic, Sonar,
Space, Astronomy, etc.
MCSCS 301 FINAL REVIEW 8of 31
10. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Mobilexion- Core Competencies
Mobilexion Technologies is a Science and Engineering Company aims to
provide Core Competencies in the following areas.
Ubiquitous Computing for Scientific and Engineering Applications
Image processing
Communications
Mathematical Modeling and Visualization
Healthcare Informatics
Contract R&D
MCSCS 301 FINAL REVIEW 9of 31
11. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Support & Training
The Company provided us with 24/7 working environment with
internet facility.
Provided and initiated Technical Training in different domains
Jboss Server Configuration(CDAC)
WIFI Network Configuration in Linux
Aakash Workshop(ICFOSS)
Open Hardware Workshop(ICFOSS)
Ubuntu Server Configuration(IIT-M)
MCSCS 301 FINAL REVIEW 10of 31
12. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Support & Training
Procured and provided the following for testing and implementation
Server Machine
WIFI Modem & adapter.
Local Network.
Provided directions for creation and maintenance of a publicly
accessible protected wiki icuautomation.wikispaces.com
Provided assistance in preparing the research paper which got
accepted in IEEE ICT-2013 Conference.
Discussion under progress with ICFOSS for training on Web
Services, JSON parsing etc.
MCSCS 301 FINAL REVIEW 11of 31
13. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Training Schedule
SNo Period Activity
1 3/12/12 to 18/12/12 Initiation and introductory
sessions
2 19/12/12 to 30/12/12 Xmas Holidays
3 Rest of the period Main sessions
4 15/1/13 to 16/1/13 Interaction at JMMC
5 6/2/13 Presentation in College
6 16/2/13 to 17/2/13 ICFOSS workshop on Akash
7 23/2/13 to 24/2/13 ICFOSS workshop on
Things that think
4 26/2/13 to 28/2/13 Server Set Up at JMMC
8 8/3/13 Internal presentation in
College
MCSCS 301 FINAL REVIEW 12of 31
14. Overview of ICU Automation Project
Mobilexion Technologies
Industrial Training
Profile
Mini Project
Core Competencies
Research Papers
Support & Training
Future work
Major Accomplishments
The major achievements of the industrial training are listed below:-
Was able to understand the working of the Android Operating
System and development of Android applications.
Was able to set up an Ubuntu server system that can used to
communicate with the Akash Tablets over the WiFi network as the
back-end platform for providing the DBMS and Application Server
services.
Was able to set up the Postgresql DBMS server as the DBMS
engine for the back-end system.
Setting up the JBOSS application server on the back-end system.
Established an architectural design for the system envisaged under
the mini project.
Participated in the ICFOSS workshops on Open Source Software
and Hardware
MCSCS 301 FINAL REVIEW 13of 31
15. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
Mini Project
Title:“Intensive Care Unit Automation-Android Implementations”
This Mini-Project focusses on design& development Android
Implementations for ICUAS.
Some of the Apps under development is
1 Patient Data
2 Vitals Chart
3 ICU Direct Monitor
4 Lab Wizard
MCSCS 301 FINAL REVIEW 14of 31
16. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
Android Implementation
Our requirement was to create a Android App which can send requests
and receive responses from a server. In that process the android client
need to retrieve values from database located in a server. In our case the
Application Server was Jboss and the database was Postgres. So our
focus was on Android Implementations that talks to a database located
in a remote server.
We were able to retrieve values from a database using the Android App.
Writing to the Database requires the use of Web Services, JSON
Parsing/XML Parsing.
MCSCS 301 FINAL REVIEW 15of 31
17. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
ICUAS-JMMC: Opening Screen
We have had interactions with JMMC, a Christian Minority Institution
which is one of the well known Medical Colleges in Kerala. We are
focussing on delivering an App for the automation of neuro ICU of the
Hospital and subsequently to other ICU’s.
MCSCS 301 FINAL REVIEW 16of 31
18. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
Patient Data Monitor
This App is used for the overall monitoring of an ICU patient. The
doctors or the clinical staff can easily review a patient selected by his bed
number.
MCSCS 301 FINAL REVIEW 17of 31
19. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
The different review facets include charts, documents, images, lab results
etc. The different iconic interfaces are carefully designed which will allow
an end user to collect the required information within a few taps.
MCSCS 301 FINAL REVIEW 18of 31
20. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
Vitals Chart
This App is used for hourly recording of vital signs and for providing a
chart view to the consulting clinicians. This App had a major impact by
making life easier for ICU nursing staff. In the conventional system the
nursing staff will have to run around different beds to collect the reading
and again re-enter these to the system/forms.
MCSCS 301 FINAL REVIEW 19of 31
21. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
Vitals Chart
A view of the TPR Chart
MCSCS 301 FINAL REVIEW 20of 31
22. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
ICU Direct Monitor-Real time Chart
A View of the real time chart
MCSCS 301 FINAL REVIEW 21of 31
23. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
Lab Wizard
This App is used to issue lab test request and retrieve the details of
investigation results. This App took away a lot of overhead involved
when it was done manually.The procedure for requesting for a lab test
and retrieving results is as shown.
MCSCS 301 FINAL REVIEW 22of 31
24. Overview of ICU Automation Project
Industrial Training
Android Implementations
Mini Project
ICUAS-JMMC Android App Demonstration
Research Papers
Future work
ICUAS-JMMC Android App Demonstration
This Android App makes the all the relevant ICU related data available in
an ubiquitous manner. Data is retrieved from a postgres database
running on a Jboss Server.
MCSCS 301 FINAL REVIEW 23of 31
25. Overview of ICU Automation Project
Industrial Training
Mini Project
Research Papers
Future work
Research Papers Accepted
1. A Context Aware System for Generation and Propagation of
Automated Alerts from an Intensive Care Unit
Publishers: IEEExplore
Conference: ICT 2013(IEEE Confer-
ence)
Paper submitted on: February 15-2013
Paper accepted on: February 28-2013
To be presented on: April 11-2013
Venue: NIU Kanyakumari
Category: e-health
Authors: Joms Antony, Bichu Vi-
jayan, Sudhin Joy, San-
thoshkumar GS.
MCSCS 301 FINAL REVIEW 24of 31
26. Overview of ICU Automation Project
Industrial Training
Mini Project
Research Papers
Future work
Research Papers Accepted
2. A Tablet PC based System for Ubiquitous Patient Monitoring
and Smart Alert Generation in an Intensive Care Unit
Publishers: International Journal
of Computer Applica-
tions(IJCA)
Paper submitted on: March 4-2013
Paper accepted on: March 24-2013
To be published on: April 18-2013
Authors: Joms Antony, Anju K.S,
Anumol Mathew.
Indexed by: Google Scholar, NASA
ADS (Harvard Univ.),
CiteSeer, University of
Washington etc
MCSCS 301 FINAL REVIEW 25of 31
27. Overview of ICU Automation Project
Industrial Training
Interfacing
Mini Project
Preliminary Work
Research Papers
Future work
Future Scopes-Interfacing
Monitoring of Vital Parameters happen only at bedside monitors or at
central station inside the ICU. The measurements from these instruments
are stored using archaic methods such as a patient history record on a
paper. The access to these records is cumbersome and not available
unless the medical personnel is present at the point of care.
Data Communication
RS232
RS422
Via network using TCP/IP
MCSCS 301 FINAL REVIEW 26of 31
28. Overview of ICU Automation Project
Industrial Training
Interfacing
Mini Project
Preliminary Work
Research Papers
Future work
Literature Survey
Thongpithoonrat, Pongnarin; McKneely, Paul K.; Gumudavelli, Suman; Gurkan, D.; Chapman, Frank M.
Networking and plug-and-play of bedside medical instruments. EMBS 2008; 1514 - 1517.
Insup Lee, Oleg Sokolsky, Sanjian Chen. Challenges and Research Directions in Medical Cyber-Physical
Systems. Invited Paper in Special Issue on Cyber-Physical Systems, Proceedings of the IEEE, vol.100, no.1,
pp.75-90, Jan. 2.
Apkon M, Singhaviranon P. Impact of an electronic information system on physician workflow and data
collection in the intensive care unit. Intensive Care Med 2000; 27: 122130. 11.
Waylon Brunette, Rita Sodt, Rohit Chaudhri, Mayank Goel, Michael Falcone, Jaylen VanOrden, Gaetano
Borriello. Open Data Kit Sensors: A Sensor Integration Framework for Android at the Application-Level*
*An interesting paper shared by Dr.Beth Kolko, Washington University during the open hardware conference.
MCSCS 301 FINAL REVIEW 27of 31
29. Overview of ICU Automation Project
Industrial Training
Interfacing
Mini Project
Preliminary Work
Research Papers
Future work
Issues in Interfacing
Unfortunately, each medical instrument has its unique proprietary API
(application programming interface - if any) to provide automated and
electronic access to monitoring data.
There are some IP addressable Multipara Monitoring devices. Our Effort
is to interface these instruments to the Tablet PC. Hopefully we will be
able provide the implementation for the same.
Our focus is to provide monitoring of Vitals using a Tablet PC and
Storage of the Vital parameters(some if not all) by logging these values
into file or database.
MCSCS 301 FINAL REVIEW 28of 31
30. Overview of ICU Automation Project
Industrial Training
Interfacing
Mini Project
Preliminary Work
Research Papers
Future work
Preliminary Work
Work done
Checked the different types of equipment in JMMC.
Studied about Starplus monitor(L & T).
Received the Starplus service manual from L & T.
Studied about Philips MP-20 monitor device which is IP
addressable.
Learned about Arduino/Raspberry Pi micro controller boards.
MCSCS 301 FINAL REVIEW 29of 31
31. Overview of ICU Automation Project
Industrial Training
Interfacing
Mini Project
Preliminary Work
Research Papers
Future work
Preliminary Work
Was able to create a data logging application using arduino micro
controller board
Learned about different shields that can be connected to the
arduino board like SDCard, Bluetooth, WIFI etc
MCSCS 301 FINAL REVIEW 30of 31
32. Overview of ICU Automation Project
Industrial Training
Interfacing
Mini Project
Preliminary Work
Research Papers
Future work
Thank You
MCSCS 301 FINAL REVIEW 31of 31