Today we have an abundant increase in the development of Information and Technology, which inturn made the Humans body even to carry a Mini- Computer in their Palms with Screen touch, Ex: Smart phone�s & Tablets etc., and parallel with the rich Enhancement in the Wireless Body Sensor Units, it is quite useful to the Enrichment of the Medical Treatment to be perfectly useful, comfortable via Smart Phones Using the networks (2G & 3G) carriers and made the treatment very easy even to the Common person in the society with the low cost money. With these the healthcare Authorities can treat the Patients (medical users) remotely where the patients reside at home or company or school or college or anywhere or at various places they work. This type of a treatment called for MHealthcare (Mobile- Healthcare). Although in the mhealthcare service there are many security and data Private problems to be overcome. Here we have A Secure and Private- Preserving Opportunistic Computing Framework called M-HealthCare, for Mobile-Healthcare Emergency. Using the Smart phone and SPOC, the Software or Hardware like computing power and energy can be gathered opportunistically to process the intensive Personal Health Information (PHI) of the medical user when he/she is in critical situation with minimal Private Disclosure. And also we introduce an efficient usercentric Private access control in SPOC Framework which is based on attribute access control and a new privatepreserving scalar product computation (PPSPC) technique and Makes a medical user (patient) to participate in opportunistic computing in transmitting his PHI data. Elaborated security analysis describes that the proposed SPOC framework can efficiently achieve usercentric Private access control in M-Healthcare emergency. In this paper we introduce Private-Preserving Support for Mobile Healthcare using Message Digest where we have used MD5 algorithm ,which can certainly achieves an efficient way and minimizes the memory consumed and the large amount of PHI data of the medical user (patient) is reduced to a fixed amount of size compared to AES which parallels increases the Speed of the data to be sent to TA without any delay which in-turn the professionals at Healthcare center can get exactly the Recent tablet user PHI data and can save their lives in correct time. As the algorithm is provided tight security in transmitting the patients PHI to TA. In respective performance evaluations with extensive simulations explains the MD (message digest) effectiveness in-term of providing high-reliable Personal Health Information (PHI) process and transmission while reducing the Private disclosure during Mobile-Healthcare emergency
In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In addition the proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical
advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliability and accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy.
IoT and machine learning (ML) are becoming increasingly efficient in the medical and telemedicine areas all around the world. This article describes a system that employs latest technology to give a more accurate method of forecasting disease. This technology uses sensors to collect data from the body of the patient. The obtained sensor information is collected with NodeMcU before being transferred to the Cloud Platform "ThinkSpeak" through an ESP8266 Wi-Fi module. ThinkSpeak is a cloud server that provides real-time data streams in the cloud. For the best results, data currently saved in the cloud is evaluated by one of the machine learning algorithms, the KNN algorithm. Based on the findings of the analysis and compared with the data sets, the disease is predicted and a prescription for the relevant disease is issued.
In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In addition the proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical
advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliability and accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy.
IoT and machine learning (ML) are becoming increasingly efficient in the medical and telemedicine areas all around the world. This article describes a system that employs latest technology to give a more accurate method of forecasting disease. This technology uses sensors to collect data from the body of the patient. The obtained sensor information is collected with NodeMcU before being transferred to the Cloud Platform "ThinkSpeak" through an ESP8266 Wi-Fi module. ThinkSpeak is a cloud server that provides real-time data streams in the cloud. For the best results, data currently saved in the cloud is evaluated by one of the machine learning algorithms, the KNN algorithm. Based on the findings of the analysis and compared with the data sets, the disease is predicted and a prescription for the relevant disease is issued.
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...paperpublications3
Abstract: Today total world use Smart phones, with an increasingly mobile society and the worldwide deployment of mobile and wireless networks the wireless communications can support many current and emerging healthcare applications. It could fulfil the vision of Patient Self-Controllable and Multi Level Privacy Preserving or healthcare to anyone, anytime, and anywhere by removing place, time and other restraints while increasing both the coverage and the quality. This present applications provide the requirements of pervasive healthcare systems, wireless networking solutions , many important research problem and this applications also include pervasive health monitoring, intelligent emergency management system. Here, the present design and development of a pervasive health system enabling self-management of chronic patients during their daily activities. Directly approved physicians the indirectly approved physicians and therefore the unauthorized persons in medical consultation will severally decipher the private health data and or verify patient’s identities by satisfying the access tree with their own symptoms.
The worldwide network of internet of things (IOT) combined with advancements in sensor networks, FID and software platform connects objects of various application fields and technology. IOT is most commonly described as an ecosystem of technologies but it requires necessary components to enable communication between devices and objects. Components being RFID and sensors. Many organization have already implemented IOT. Healthcare industry too have adopted IOT and can be extensively used in the future for the benefit of patients, elderly people and caregivers. A new concept named 'Health Internet of Things (HIOT)' was proposed to exploit sensor technologies and wireless networks in monitoring medical conditions. Also advancements in E textile technologies make the textile multifunctional, adaptive and responsive system which combined with IOT performs functions such as communication, computation and health care benefits. Cloud is used to store, control and retrieve or transform or classify information. The use of cloud based application in healthcare industries is constantly growing to benefit patients so that they can monitor their health, store and share records. This paper aims at developing a dependable, productive, high performance and assured smart healthcare system to deliver service to patients avoiding health risks using e textile technologies
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
Nowadays, many researchers are contributing their research in the field of Internet of things IOT , since it is important and attractive technology. IOT means communication between human to device or device to device, anywhere in real time. This communication takes place with the help of different smart sensors which are connected via internet. In the IOT infrastructure different sensors can sense, analyse, transmit and store all the datas on cloud. This paper presents a wearable sensor network system for Internet of Things IoT connected safety and health applications. The wearable sensors on different subjects can communicate with each other and transmit the data to a gateway via a Local Area Network which forms a heterogeneous IoT platform with wifi based medical signal sensing network. It consists of two sections the basic information and condition of patient is collected in the wagon by the means IoT Internet of Things and make it available to hospital before the emergency vehicle reaches the hospital. On the base of such data, the system is able to detect anomalous situations and provide information about the status directly and exclusively to the hospital. The second path is control of traffic lights from the wagon and makes free for its path automatically. This project is to save the time of major late time aspects in more efficient manner and save the life. Mrs. S. Kirthica | Mrs. S. Priyadharsini "Design and Implementation of Smart Monitoring Systems in Hospital Wagon using IoT Technology: A Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31731.pdf Paper Url :https://www.ijtsrd.com/mathemetics/other/31731/design-and-implementation-of-smart-monitoring-systems-in-hospital-wagon-using-iot-technology-a-case-study/mrs-s-kirthica
The world is more connected. Smart sensors including barcode and RFID labels assigned to patients and medication give everything a digital voice. That digital voice captured by
handheld barcode scanners and RFID readers can help improve patient care and operational efficiency and reduce medical errors and costs. That's why barcode and RFID technologies are more and more valued in healthcare these days.
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
Improving health care with IoT - Research into a weight monitoring bed - ECIS 2017 paper.
Resulting from smart furniture applications research project in Germany, Oliver Neuland and partners from AUT developed a smart bed concept which utilizes weight monitoring for AAL and elderly care. Initially strategies were applied to find meaningful use cases, later a prototype was developed. Here a paper presented during ECIS in Portugal which describes the architecture of the prototype.
Intelligent Healthcare Monitoring in IoTIJAEMSJORNAL
The developing of IoT-based health care systems must ensure and increase the safety of the patients, their quality of life and other health care activities. We may not be aware of the health condition of the patient during the sleeping hours. To overcome this problem. This paper proposes an intelligent healthcare monitoring system which monitors and maintains the patient health condition at regular intervals. The heart rate sensor and temperature sensor would help us analyze the patients’ current health condition. In case of major fluctuations in consecutive intervals a buzzer is run in order to notify the hospital staff and doctors. The monitored details are stored in the cloud "ThingSpeak". The doctor can view the patient health condition using Virtuino simulator. This system would help in reducing the random risks of tracing a patient medical highly. Arduino UNO is used to implement this intelligent healthcare monitoring system.
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOTEditor IJCATR
In the latest technology, NFC(Near Field Communication) is a recently growing technology for communication
for short range which is aimed to augment existing near field technologies such as RFID(Radio Frequency Identification). In
this paper, we have to propose a system which describes how an android application is used as our own NFC tag writer to
write patient unique id in NFC tag. Doctors using NFC enabled smart phones to retrieve patient information when placed
near NFC tag. This proposed system uses an android smart phone which automatically monitors the patients status and keeps
the doctor/nurse updated and maintained through logs that are stored on a cloud server and also alerts are generated through
/Email in case of emergency/detection of death of any patient. This system helps in reducing the paper work required during
the registration of the patient and also eliminates the disadvantages of using RFID based system
Real time health monitoring using gprs technologyRahul Sharma
Advances in sensor technology, personal mobile devices, and wireless broadband communications are enabling the development of an integrated personal mobile health monitoring system that can provide patients with a useful tool to assess their own health and manage their personal health information anytime and anywhere. Personal mobile devices, such as PDAs and mobile phones, are becoming more powerful integrated information management tools and play a major role in many people's lives. Here I focus on designing a Mobile health-monitoring system for people who stay alone at home or suffering from Heart Disease. This system presents a complete unified and mobile platform based connectivity solution for unobtrusive health monitoring. Developing a hardware which will sense heart rate and temperature of a patient, using Bluetooth modem all information lively transmitted to smart phone, from smart phone all information transmitted to server using GPRS. At server the received data compared with the standard threshold minimum and maximum value. The normal range of heart rate is 60 to 135 and the temperature of the patient is said to be normal above 95^F and below 104^F. If at all the rate increases above 145 or decreases below 55,it may be fatal and if it crossed this threshold limit then SMS will be sent to the relative of patient and Doctors along with measured values. The build-in GPS further provides the position information of the monitored person. The remote server not only collects physiological measurements but also tracks the position of the monitored person in real time. For transmitting data from Smartphone to the server using GPRS, here we need to create a website on data will be continuously transmitted from Smartphone to the website and from website data will be downloaded continuously on the server.
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
As elderly population increases day by day caretaking demands are also increasing. Hence patient health monitoring systems are gaining importance these days. This paper is based on monitoring of patients. We have designed and developed a reliable, energy efficient patient monitoring system. It is able to send parameters of patient in real time. It enables the doctors to monitor patient's health parameters (temp, heartbeat, ECG, position) in real time. In the current proposed system the patient health is continuously monitored using different sensors which is connected to the Arduino board. And the acquired data is send to the server using Ethernet shield attached to the Arduino board. If any of the parameter values goes beyond the threshold value an alert is given to the doctor using an Android application installed in the doctor’s smartphone.
The term Internet of Things (Often abbreviated IOT) was coined more than ten years ago by industry researchers but has emerged into mainstream public view only more recently. Some claim the Internet of Things will completely transform how computer networks are used for the next 10 or 100 years, while others believe Internet Of Things is hype that won't much impact the daily lives of most people.
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services. In this survey we will ensure a survey of applications and research difficulties for Internet Of Things in Healthcare. Shivani Ramesh Sharma ""Internet of Things (IoT): IoT in Healthcare"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23971.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-security/23971/internet-of-things-iot-iot-in-healthcare/shivani-ramesh-sharma
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...TheEntrepreneurRevie
Here are 7 Best Points of The Future of Digital Technology in Healthcare; 1. Smartphones and wearable technology, 2. Virtual Machines (VMs), 3. Telecommunications medicine,
Facial Feature Recognition Using Biometricsijbuiiir1
Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged.
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
Color of the surface is one of the most imperative characteristics in the process of recognition as well as classification of the object which is based on camera. On the other hand, color of the object sometimes differs a lot due to the difference in illumination as well as the conditions of the surface. Utilization of the diverse features of the color gets impeded due to such variations. However, Characterization of the color of the object is possible with a controlling tool known as color invariants without considering the factors such asillumination and conditions of the surface. In the research proposal, analysis has been done on the estimation procedure related to RGB images color invariants. Object color is an imperative descriptor that can find the corresponding matching object in applications based on image matching as well as search, like- Object searching based on template and CBIR otherwise known as Content Based Image Retrieval. But, many times it has been observed that the apparent color of different objects gets varied significantly due to illumination, conditions of the surface as well as observation (Finlayson et al., 1996)
More Related Content
Similar to SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mobile HealthCare Emergency Using Smart Phone
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...paperpublications3
Abstract: Today total world use Smart phones, with an increasingly mobile society and the worldwide deployment of mobile and wireless networks the wireless communications can support many current and emerging healthcare applications. It could fulfil the vision of Patient Self-Controllable and Multi Level Privacy Preserving or healthcare to anyone, anytime, and anywhere by removing place, time and other restraints while increasing both the coverage and the quality. This present applications provide the requirements of pervasive healthcare systems, wireless networking solutions , many important research problem and this applications also include pervasive health monitoring, intelligent emergency management system. Here, the present design and development of a pervasive health system enabling self-management of chronic patients during their daily activities. Directly approved physicians the indirectly approved physicians and therefore the unauthorized persons in medical consultation will severally decipher the private health data and or verify patient’s identities by satisfying the access tree with their own symptoms.
The worldwide network of internet of things (IOT) combined with advancements in sensor networks, FID and software platform connects objects of various application fields and technology. IOT is most commonly described as an ecosystem of technologies but it requires necessary components to enable communication between devices and objects. Components being RFID and sensors. Many organization have already implemented IOT. Healthcare industry too have adopted IOT and can be extensively used in the future for the benefit of patients, elderly people and caregivers. A new concept named 'Health Internet of Things (HIOT)' was proposed to exploit sensor technologies and wireless networks in monitoring medical conditions. Also advancements in E textile technologies make the textile multifunctional, adaptive and responsive system which combined with IOT performs functions such as communication, computation and health care benefits. Cloud is used to store, control and retrieve or transform or classify information. The use of cloud based application in healthcare industries is constantly growing to benefit patients so that they can monitor their health, store and share records. This paper aims at developing a dependable, productive, high performance and assured smart healthcare system to deliver service to patients avoiding health risks using e textile technologies
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
Nowadays, many researchers are contributing their research in the field of Internet of things IOT , since it is important and attractive technology. IOT means communication between human to device or device to device, anywhere in real time. This communication takes place with the help of different smart sensors which are connected via internet. In the IOT infrastructure different sensors can sense, analyse, transmit and store all the datas on cloud. This paper presents a wearable sensor network system for Internet of Things IoT connected safety and health applications. The wearable sensors on different subjects can communicate with each other and transmit the data to a gateway via a Local Area Network which forms a heterogeneous IoT platform with wifi based medical signal sensing network. It consists of two sections the basic information and condition of patient is collected in the wagon by the means IoT Internet of Things and make it available to hospital before the emergency vehicle reaches the hospital. On the base of such data, the system is able to detect anomalous situations and provide information about the status directly and exclusively to the hospital. The second path is control of traffic lights from the wagon and makes free for its path automatically. This project is to save the time of major late time aspects in more efficient manner and save the life. Mrs. S. Kirthica | Mrs. S. Priyadharsini "Design and Implementation of Smart Monitoring Systems in Hospital Wagon using IoT Technology: A Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31731.pdf Paper Url :https://www.ijtsrd.com/mathemetics/other/31731/design-and-implementation-of-smart-monitoring-systems-in-hospital-wagon-using-iot-technology-a-case-study/mrs-s-kirthica
The world is more connected. Smart sensors including barcode and RFID labels assigned to patients and medication give everything a digital voice. That digital voice captured by
handheld barcode scanners and RFID readers can help improve patient care and operational efficiency and reduce medical errors and costs. That's why barcode and RFID technologies are more and more valued in healthcare these days.
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
Improving health care with IoT - Research into a weight monitoring bed - ECIS 2017 paper.
Resulting from smart furniture applications research project in Germany, Oliver Neuland and partners from AUT developed a smart bed concept which utilizes weight monitoring for AAL and elderly care. Initially strategies were applied to find meaningful use cases, later a prototype was developed. Here a paper presented during ECIS in Portugal which describes the architecture of the prototype.
Intelligent Healthcare Monitoring in IoTIJAEMSJORNAL
The developing of IoT-based health care systems must ensure and increase the safety of the patients, their quality of life and other health care activities. We may not be aware of the health condition of the patient during the sleeping hours. To overcome this problem. This paper proposes an intelligent healthcare monitoring system which monitors and maintains the patient health condition at regular intervals. The heart rate sensor and temperature sensor would help us analyze the patients’ current health condition. In case of major fluctuations in consecutive intervals a buzzer is run in order to notify the hospital staff and doctors. The monitored details are stored in the cloud "ThingSpeak". The doctor can view the patient health condition using Virtuino simulator. This system would help in reducing the random risks of tracing a patient medical highly. Arduino UNO is used to implement this intelligent healthcare monitoring system.
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOTEditor IJCATR
In the latest technology, NFC(Near Field Communication) is a recently growing technology for communication
for short range which is aimed to augment existing near field technologies such as RFID(Radio Frequency Identification). In
this paper, we have to propose a system which describes how an android application is used as our own NFC tag writer to
write patient unique id in NFC tag. Doctors using NFC enabled smart phones to retrieve patient information when placed
near NFC tag. This proposed system uses an android smart phone which automatically monitors the patients status and keeps
the doctor/nurse updated and maintained through logs that are stored on a cloud server and also alerts are generated through
/Email in case of emergency/detection of death of any patient. This system helps in reducing the paper work required during
the registration of the patient and also eliminates the disadvantages of using RFID based system
Real time health monitoring using gprs technologyRahul Sharma
Advances in sensor technology, personal mobile devices, and wireless broadband communications are enabling the development of an integrated personal mobile health monitoring system that can provide patients with a useful tool to assess their own health and manage their personal health information anytime and anywhere. Personal mobile devices, such as PDAs and mobile phones, are becoming more powerful integrated information management tools and play a major role in many people's lives. Here I focus on designing a Mobile health-monitoring system for people who stay alone at home or suffering from Heart Disease. This system presents a complete unified and mobile platform based connectivity solution for unobtrusive health monitoring. Developing a hardware which will sense heart rate and temperature of a patient, using Bluetooth modem all information lively transmitted to smart phone, from smart phone all information transmitted to server using GPRS. At server the received data compared with the standard threshold minimum and maximum value. The normal range of heart rate is 60 to 135 and the temperature of the patient is said to be normal above 95^F and below 104^F. If at all the rate increases above 145 or decreases below 55,it may be fatal and if it crossed this threshold limit then SMS will be sent to the relative of patient and Doctors along with measured values. The build-in GPS further provides the position information of the monitored person. The remote server not only collects physiological measurements but also tracks the position of the monitored person in real time. For transmitting data from Smartphone to the server using GPRS, here we need to create a website on data will be continuously transmitted from Smartphone to the website and from website data will be downloaded continuously on the server.
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
As elderly population increases day by day caretaking demands are also increasing. Hence patient health monitoring systems are gaining importance these days. This paper is based on monitoring of patients. We have designed and developed a reliable, energy efficient patient monitoring system. It is able to send parameters of patient in real time. It enables the doctors to monitor patient's health parameters (temp, heartbeat, ECG, position) in real time. In the current proposed system the patient health is continuously monitored using different sensors which is connected to the Arduino board. And the acquired data is send to the server using Ethernet shield attached to the Arduino board. If any of the parameter values goes beyond the threshold value an alert is given to the doctor using an Android application installed in the doctor’s smartphone.
The term Internet of Things (Often abbreviated IOT) was coined more than ten years ago by industry researchers but has emerged into mainstream public view only more recently. Some claim the Internet of Things will completely transform how computer networks are used for the next 10 or 100 years, while others believe Internet Of Things is hype that won't much impact the daily lives of most people.
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services. In this survey we will ensure a survey of applications and research difficulties for Internet Of Things in Healthcare. Shivani Ramesh Sharma ""Internet of Things (IoT): IoT in Healthcare"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23971.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-security/23971/internet-of-things-iot-iot-in-healthcare/shivani-ramesh-sharma
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...TheEntrepreneurRevie
Here are 7 Best Points of The Future of Digital Technology in Healthcare; 1. Smartphones and wearable technology, 2. Virtual Machines (VMs), 3. Telecommunications medicine,
Similar to SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mobile HealthCare Emergency Using Smart Phone (20)
Facial Feature Recognition Using Biometricsijbuiiir1
Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged.
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
Color of the surface is one of the most imperative characteristics in the process of recognition as well as classification of the object which is based on camera. On the other hand, color of the object sometimes differs a lot due to the difference in illumination as well as the conditions of the surface. Utilization of the diverse features of the color gets impeded due to such variations. However, Characterization of the color of the object is possible with a controlling tool known as color invariants without considering the factors such asillumination and conditions of the surface. In the research proposal, analysis has been done on the estimation procedure related to RGB images color invariants. Object color is an imperative descriptor that can find the corresponding matching object in applications based on image matching as well as search, like- Object searching based on template and CBIR otherwise known as Content Based Image Retrieval. But, many times it has been observed that the apparent color of different objects gets varied significantly due to illumination, conditions of the surface as well as observation (Finlayson et al., 1996)
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
Knowledge is the ultimate output of decisions on a dataset. The revolution of the Internet has made the global distance closer with the touch on the hand held electronic devices. Usage of social media sites have increased in the past decades. One of the most popular social media micro blog is Twitter. Twitter has millions of users in the world. In this paper the analysis of Twitter data is performed through the text contained in hash tags. After Preprocessing clustering algorithms are applied on text data. The different clusters formed are compared through various parameters. Visualization techniques are used to portray the results from which inferences like time series and topic flow can be easily made. The observed results show that the hierarchical clustering algorithm performs better than other algorithms.
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
Today, Cybercrime has caused lot of damages to individuals, organizations and even the Government. Cybercrime detection methods and classification methods have came up with varying levels of success for preventing and protecting data from such attacks. Several laws and methods have been introduced in order to prevent cybercrime and the penalties are laid down to the criminals. However, the study shows that there are many countries facing this problem even today and United States of America is leading with maximum damage due to the cybercrimes over the years. According to the recent survey carried out it was noticed that year 2013 saw the monetary damage of nearly 781.84 million U.S. dollars. This paper describes about the common areas where cybercrime usually occurs and the different types of cybercrimes that are committed today. The paper also shows the studies made on e-mail related crimes as email is the most common medium through which the cybercrimes occur. In addition, some of the case studies related to cybercrimes are also laid down
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
The content downloading is internet based service and the expectation of this services are highly popular in wireless communication it will be supporting for road side communication. We are focusing in content downloading system for both infrastructure-to-vehicle and vehicle-to-vehicle communication. The goal to improving system throughput and formulating a max-flow problem including the channel contention and data transfer paradigm. A system communication while transferring the files or downloading some application in road side environment there is the possibility of getting disconnected. The purpose of this study used to avoid the in conventional connection at the road side environment while using system or mobile based internet connection used for content or file downloader using MILP(Mixed Integer Linear programming) for max flow problem. The bounding box technique will be used to get the proper signal from base station. To avoid the traffic and access the quick response from the server the bounding box will used. The mail goal of the mobility management service is to trace the location where the subscribers are, allowing calls, SMS and other mobile phone services to be delivered to them. First we can analysing the data and select for correct location.. It will be provide challenging in vehicular networks, that is the transmission speed of the nodes will even more efficient though the area surrounded of buildings and many other architectural infrastructures of the radio signal.
A Survey on Implementation of Discrete Wavelet Transform for Image Denoisingijbuiiir1
Image Denoising has been a well studied problem in the field of image processing. Images are often received in defective conditions due to poor scanning and transmitting devices. Consequently, it creates problems for the subsequent process to read and understand such images. Removing noise from the original signal is still a challenging problem for researchers because noise removal introduces artifacts and causes blurring of the images. There have been several published algorithms and each approach has its assumptions, advantages, and limitations. This paper deals with using discrete wavelet transform derived features used for digital image texture analysis to denoise an image even in the presence of very high ratio of noise. Image Denoising is devised as a regression problem between the noise and signals, therefore, Wavelets appear to be a suitable tool for this task, because they allow analysis of images at various levels of resolution.
A Study on migrated Students and their Well - being using Amartya Sens Functi...ijbuiiir1
This paper deals with the multidimensional analysis of well-being from the theoretical point of views suggested by Dr. Amartya Sen. Sens Functioning Multidimensional Approach is broadly recognized as one of the most satisfying approaches to well-being. The Capability approach and the Functioning approach of Sen have found relatively many pragmatic applications mainly for its strong informational and methodological requirements. An attempt has been made to realize a multidimensional assessment of Sens concept of wellbeing with the use of the Fuzzy Set theory. The methodology is applied to the evaluative space of Functionings, with an experimental application to migrated students studying in Chennai, Tamil Nadu.
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...ijbuiiir1
Web Usage Mining is a kind of web mining which provides knowledge about user navigation behavior and gets the interesting patterns from web. Web usage mining refers to the mechanical invention and scrutiny of patterns in click stream and linked data treated as a consequence of user interactions with web resources on one or more web sites. Identify the need and interest of the user and its useful for upgrade web Sources. Web site developers they can update their web site according to their attention. In this paper discuss about the different types of Methodologies which has been carried out in previous research work for Discovering User Behavior and Predicting the Future Request.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Modelijbuiiir1
Levels of conceptual interoperability model is used to develop the method and model towards enhancing interoperability among mobile apps. The LCIM is used as descriptive and prescriptive form and it also make available of both metric of the degree of conceptual representation that exists between interoperating systems. In descriptive form LCIM is used to decrease the discrepancies in rating mobile apps based on content by suggesting a rating system that is completely based on interoperability. In the prescriptive form it receives information for app development, which allows producing apps with prominent level of interoperability. The Levels of Conceptual Interoperability has the abstract backbone for developing and implementing an interoperability framework that supports to exchange of XML based languages used by M&S systems across the web
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...ijbuiiir1
The emerging increase in vehicles and very high traffic, demands the need for improved Intelligent Transport Systems (ITS). The available ITSs do not meet all the requirements of the present day situation in providing safetravels and avoidance of congestionin spite of its limitations on road. Intelligent Transport Systemsrequiremore research and implementation of better solutions on the traffic network with increased mobility and more rapid acquisition of data by sense network technology. In this paper a review is made on the present ITS where research is required so that improvement in the course of implementing reality mining can enhance the behavior of ITS. This will breed a forward leap in the improvement of safety and convenience of personal and commercial travel and in turn guarantee an ultimate drop in fatality in the society
Stock Prediction Using Artificial Neural Networksijbuiiir1
Accurate prediction of stock price movements is highly challenging and significant topic for investors. Investors need to understand that stock price data is the most essential information which is highly volatile, non-linear, and non-parametric and are affected by many uncertainties and interrelated economic and political factors across the globe. Artificial Neural Networks (ANN) have been found to be an efficient tool in modeling stock prices and quite a large number of studies have been done on it. In this paper ANN modeling of stock prices of selected stocks under BSE is attempted to predict closing prices. The network developed consists of an input layer, one hidden layer and an output layer and the inputs being opening price, high, low, closing price and volume. Mean Absolute Percentage Error, Mean Absolute Deviation and Root Mean Square Error are used as indicators of performance of the networks. This paper is organized as follows. In the first section, the adaptability of ANN in stock prediction is discussed. In section two, we justify the using of ANNs in forecasting stock prices. Section three gives the literature review on the applications of ANNs in predicting the stock prices. Section four gives an overview of artificial neural networks. Section five presents the methodology adopted. Section six gives the simulation and performance analysis. Last section concludes with future direction of the study
Indian Language Text Representation and Categorization Using Supervised Learn...ijbuiiir1
India is the home of different languages, due to its cultural and geographical diversity. The official and regional languages of India play an important role in communication among the people living in the country. In the Constitution of India, a provision is made for each of the Indian states to choose their own official language for communicating at the state level for official purpose. In the eighth schedule as of May 2008, there are 22 official languages in India.The availability of constantly increasing amount of textual data of various Indian regional languages in electronic form has accelerated. So the Classification of text documents based on languages is essential. The objective of the work is the representation and categorization of Indian language text documents using text mining techniques. South Indian language corpus such as Kannada, Tamil and Telugu language corpus, has been created. Several text mining techniques such as naive Bayes classifier, k-Nearest-Neighbor classifier and decision tree for text categorization have been used.There is not much work done in text categorization in Indian languages. Text categorization in Indian languages is challenging as Indian languages are very rich in morphology. In this paper an attempt has been made to categories Indian language text using text mining algorithms
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes.
Software Developers Performance relationship with Cognitive Load Using Statis...ijbuiiir1
The success of the software development highly appreciated with the intellectual capital instead of physical assets of the concern. Human resource is the challenging resource in the software development industry to meet the customer requirement and deliver the project on time to the client. The software industry requires multi-skill and dynamic performers to meet the challenges. The skills domain knowledge and the developer�s performance are considered as the potential key factors for the success of the delivery of projects. The developer�s performance is influenced with cognitive factors and its measures. This study aimed to relate developer�s performance in the software industry with his/her cognitive workload. The various statistical measures like correlation, regression, variance and standard deviations are to be calculated for the developer�s performance with the cognitive load. The real-time development sector observations made of around 250 employees, 15 projects work and its corresponding cognitive load such as physical ability, mental ability, temporal ability, effort, frustration and performance in Web application, Database application and Multimedia. This paper provides the measurable analysis of the development process of the developers with their assigned task using statistical approach
Wireless Health Monitoring System Using ZigBeeijbuiiir1
Recent developments in off-the-shelf wireless embedded computing boards and the increasing need for efficient health monitoring systems, fueled by the increasing number of patients, has prompted R&D professionals to explore better health monitoring systems that are both mobile and cheap. This work investigates the feasibility of using the ZigBee embedded technology in health-related monitoring applications. Selected vital signs of patients are acquired using sensor nodes and readings are transmitted wirelessly using devices that utilize the ZigBee communications protocols. A prototype system has been developed and tested with encouraging results
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transformijbuiiir1
This research paper presents a proposed method for the compression of medical images using hybrid compression technique (DWT, DCT and Huffman coding). The objective of this hybrid scheme is to achieve higher compression rates by first applying DWT and DCT on individual components RGB. After applying this image is quantized to calculate probability index for each unique quantity so as to find out the unique binary code for each unique symbol for their encoding. Finally the Huffman compression is applied. Results show that the coding performance can be significantly improved by the hybrid DWT, DCT and Huffman coding algorithm
Agile development methodologies are very promising in the software industry. Agile development techniques are very realistic n understanding the fact that requirement in a business environment changes constantly. Agile development processes optimize the opportunity provided by cloud computing by doing software release iteratively and getting user feedback more frequently. The research work, a study on Agile Methods and cloud computing. This paper analyzes the Agile Management and development methods and its benefits with cloud computing. Combining agile development methodology with cloud computing brings the best of both worlds. A business strategy, the outcomes of which optimize profitability revenue and customer satisfaction by organizing around customer segments, fostering customer-satisfying behaviors, and implementing customer-centric processes
SOA is becoming important for Business Process Management and Enterprises. Now SOA is widely used by Enterprises as it provides seamless environment, flexibility, interoperability, but at the same time security should also consider because the basic SOA framework doesn�t possess any security. It depends upon the respective proprietor for security [1]. In recent times many research work had done for SOA security. Researchers have also proposed various frameworks and models such as FIX [2], SAVT [3] which tries a lot, but cannot achieve any landmark as they are based on XML schema.This proposed novel work contains an inbuilt security module which was based on PKI. At the same time this model will intact the flexibility and interoperability as the security module is embedded by analyzing the nature of WSDL, UDDI, SOAP and XML. These protocols are also compatible with PKI. Proposed Model was implemented in the asp.net environment then experimental results are compared with other security methods such as data mining based web security and automata based web security
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Schedulingijbuiiir1
Bluetooth includes the concept of devices participating in multiple �piconets� interconnected via bridge devices and thereby forming a �scatternet�. This paper presents a scheme for Bluetooth scatternet operation that adapts to varying traffic patterns. According to the traffic information of all masters that the bridge is connected, the bridge switches to the masters with high traffic loads and increase the usage of the bridge. In addition, load adaptive interpiconet scheduling can reduce the number of failed unsniffs and the overhead of the bridge switch wastes to further increase the overall system performance.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Technical Drawings introduction to drawing of prisms
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mobile HealthCare Emergency Using Smart Phone
1. -2389Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 04 Issue: 01 June 2015 Page No.47-49
ISSN: 2278-2389
47
SPOC: A Secure and Private-pressuring
Opportunity Computing Framework for Mobile –
HealthCare Emergency Using Smart Phone
M.Sankareswari1
,V.Sarala Devi2
1
Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai
2
Assistant Professor, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai
Email- sankareswari4@gmail.com, saralavinoraj@reddiffmail.com
Abstract- Today we have an abundant increase in the
development of Information and Technology, which in-
turn made the Humans body even to carry a Mini-
Computer in their Palms with Screen touch, Ex: Smart
phone’s & Tablets etc., and parallel with the rich
Enhancement in the Wireless Body Sensor Units, it is
quite useful to the Enrichment of the Medical Treatment
to be perfectly useful, comfortable via Smart Phones
Using the networks (2G & 3G) carriers and made the
treatment very easy even to the Common person in the
society with the low cost money. With these the
healthcare Authorities can treat the Patients (medical
users) remotely where the patients reside at home or
company or school or college or anywhere or at various
places they work. This type of a treatment called for M-
Healthcare (Mobile- Healthcare). Although in the m-
healthcare service there are many security and data
Private problems to be overcome. Here we have A
Secure and Private- Preserving Opportunistic Computing
Framework called M-HealthCare, for Mobile-Healthcare
Emergency. Using the Smart phone and SPOC, the
Software or Hardware like computing power and energy
can be gathered opportunistically to process the intensive
Personal Health Information (PHI) of the medical user
when he/she is in critical situation with minimal Private
Disclosure. And also we introduce an efficient user-
centric Private access control in SPOC Framework which
is based on attribute access control and a new private-
preserving scalar product computation (PPSPC)
technique and Makes a medical user (patient) to
participate in opportunistic computing in transmitting his
PHI data. Elaborated security analysis describes that the
proposed SPOC framework can efficiently achieve user-
centric Private access control in M-Healthcare
emergency. In this paper we introduce Private-Preserving
Support for Mobile Healthcare using Message Digest
where we have used MD5 algorithm ,which can certainly
achieves an efficient way and minimizes the memory
consumed and the large amount of PHI data of the
medical user (patient) is reduced to a fixed amount of
size compared to AES which parallels increases the
Speed of the data to be sent to TA without any delay
which in-turn the professionals at Healthcare center can
get exactly the Recent tablet user PHI data and can save
their lives in correct time. As the algorithm is provided
tight security in transmitting the patients PHI to TA. In
respective performance evaluations with extensive
simulations explains the MD (message digest)
effectiveness in-term of providing high-reliable Personal
Health Information (PHI) process and transmission while
reducing the Private disclosure during Mobile-Healthcare
emergency.ge
Keywords: Healthcare, Computing, Private Preserving,
Message Digest, Mobile-Healthcare, Remote Healthcare.
I. INTRODUCTION
Today in the world we have an abundant development
the side of the Information and Technology. By which
comparatively increased in the enrichment of the Body
Sensor Nodes (BSN), Smartphone‟s, and sensor Units.
The Pharmacy field achieved a lot of improvement and
advancement in saving the People lives using the latest
technology based on the body sensor nodes, body sensor
Units and Smartphone‟s. The sensor nodes are made in a
small Where as in m-healthcare system the patients
(medical users) who are registered at the healthcare
centre and implanted the sensor nodes and appended with
a Smart phone device can be easily monitored remotely
and there is no need of wasting their valuable time here
and they can move anywhere they require and can have
their works be done. Likewise the medical user (patient)
can achieve a high quality medical healthcare remotely.
The professionals at the healthcare centre are supposed to
monitor the patient’s condition at regular intervals of
time.Things to be done at this particular time spending
at the hospitals and clinics, the patient or the medical
user can attain a high quality of the medical healthcare
remotely by monitoring at the healthcare centre by a
TrustedAuthority (TA). The above scenario can come
under the mobile healthcare system (m-healthcare). The
m-healthcare is completely and purely remote based
monitoring to the people who are regularly affected from
the Chronic medical problems like, heart diseases and
diabetes, blood oxygen saturation .In general the Real-
time, continuous patient monitoring, Patients have to
wait for a Longer period of time losing their important
2. -2389Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 04 Issue: 01 June 2015 Page No.47-49
ISSN: 2278-2389
48
For Example, The patient who is suffering or facing from
chronic diseases such as heart attacks and diabetes heart
rate variability, respiration rate, skin conductance,Skin
temperature, arterial blood pressure, and blood alcohol
concentration. Any people have registered at the
healthcare centre available. Once the patient is registered
in user id any people is to be treated as a medical user
like which there can be a n number of medical users
registered and for each user there given a user id by
which the trusted authority (TA) at the healthcare centre
monitors the PHI data periodically. The medical user
registration if completed he/she can be implanted to body
wearable miniaturized body sensor nodes and a Smart
phone device with the software available in it.
Now the patient can move to a anywhere place where any
person decides at anytime and can achieve a high quality
medical treatment. The sensor nodes (BSN) which are
implanted to body gathers all the typical readings at first
as minimum such as heart rate, pulse, sugar, blood sugar
level, blood pressure and body temperature, eye problem
etc, and via Bluetooth transmits to the mobile device and
then transmitted to the healthcare center via 3G networks
with the user id. The healthcare centre professionals can
identify the readings of which medical user is sent and
when the user in Emergency required actions taken by
sending an ambulance and a medical representative with
the vehicle and can protect the user life and thus the
medical user can achieve a high quality medical
healthcare service.
II. LITERATURE SURVEY
When the medical user is at normal situation [6] the
sensor nodes can send the PHI data readings to the
healthcare centre for every 10 minutes of regular
intervals of time and if the patient (medical user)
situation is serious then the body
Sensor nodes are in busy getting the readings from the
patient’s body in less period of time and transmit a huge
and large amount of data for every 5-10 seconds in
regular time intervals. Where the medical user provided
Smart phone is used as a normal phone like we can use it
for phoning, chatting, playing videos, listening music and
browse internet. Due to which the resources of the
mobile like power, battery gets down and in emergency
happens unfortunately and it might happen at low
probability. Any medical emergency, when all of us take
in to 10, 000 emergency cases into account, the common
event amount will reach 50, that's not minimal and
outstandingly indicates the actual reliability regarding m-
Healthcare system is demanding throughout emergency.
III. GG AND GGT
Bilinear Pairings
Let GG and GGT be two multiplicative cyclic groups
with the same prime order q. suppose GG and GGT are
equipped with a pairing, i.e., a non-degenerated and
efficiently computable bilinear map. In group GG, the
Computational Differ-Hellman (CDH) problem is hard; it
is intractable to compute gab in a polynomial time.
However, the Decisional Differ-Hellman (DDH) problem
is easy, it is easy to judge.
System Initialization
For a single-authority in m-Healthcare program under
consideration, we arrange a trusted authority stated at the
healthcare centre will bootstrap the entire system.
Especially, by giving the security parameter, TA first
attains the Bilinear parameters; and selects a secure
symmetric encryption, i.e., MD5, and two secure
cryptographic hash functions H and H0 . In addition, TA
chooses two random numbers as the master key, two
random elements in GG, and computes we use MD5
algorithm which is enhancement to the AES. Where as in
the AES the PHI data of the medical user collected by the
sensor nodes at the emergency situation is a large amount
of data within a less period of time and the AES having
to encrypt the PHI data is very delay and lot of time and
memory space is wasted and by which the TA is unable
to view the current status of the medical user. But
IV. TA ALGORITHMS
Depending upon Ui‟s personal health information, TA
first selects the exact body sensor nodes to govern Ui‟s
personal BSN, and installs the required medical
software’s in Uri’s Smart phone device. Then, TA
selects two random numbers and performs to compute
the access control key for Ui. Finally, TA uses the
master key b to compute the secret key. Ui first selects
the current date CDate, computes the session key for a
single day, and distributes the session key ki to his
personal BSN and Smart phone device. For every five
minutes, BSN gathers the raw PHI data and sends the
encrypted results; to the Smart phone device. On getting
the Smart phone device uses ki to recover rPHI from
Enc. After performing rPHI, the Smart phone device uses
the 3G technology to submit the performed PHI data
undergone to healthcare center. When the TA receives
Ui at the healthcare center, he first goes with the master
key b to compute Ui‟s secret key ski, and uses ski to
compute the current session key after performing that,
TA uses kit to recover PHI from Enc. If the recovered
3. -2389Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 04 Issue: 01 June 2015 Page No.47-49
ISSN: 2278-2389
49
CDate is corrected, TA sends PHI to the medical
representatives for monitoring.
V. OUTPUT
The concept of this paper is implemented and different
results are shown below, the propose paper’s concepts
shows efficient results and has been efficiently tested on
different Datasets.The results shown below in Figure 4,
5, & 6, are performed on various datasets and are
picturised according to the results obtained.
Here fig.4 graph is obtained by taking under
considerations of the number of datasets to be taken for a
particular time instance. Likewise a number of datasets
for a six time instances, for every single time instance a
lot of datasets are performed, as per the data obtained the
graph is drawn.
Here in fig.5 the graph drawn shows a relation between
the time instances and the memory used. Similar as the
above graph the datasets are to be considered for every
single time instance and six instances are taken for our
convenience.
The fig.6 indicates the graph related to the time instances
and the free memory that is left. The above fig.4 clearly
depicts the graph of the instances that are used by each
and every single node and the objects whereas in fig.5 it
shows the graph between the time instances of each and
every single node and the memory utilized.
VI. CONCLUSIONS
In this paper, we had explained the secure and
Robustness ,scalability and private preserving
opportunistic computing framework for m-Healthcare
emergency, which clearly explains the usage of
opportunistic computing to gain a high achievement of
PHI process and transmission when in emergency and
which mainly reduces the Private exposure during the
opportunistic computing. Elaborated security analysis
gives that the exhibited SPOC framework will attain the
efficient user-centric Private access control.In our further
work, we are able to perform on Smart phone-based
experiments to Identify and verify the effectiveness of
the exhibited SPOC framework and m-healthcare.
Adding to this, we also will security and scalability
reasons of PPSPC with inner system attacker, with which
the protocol is not followed by the inner System
attackers, are not purely honest.
REFERENCES
[1] A. Toninelli, R. Montanari, and A. Corradi, “Enabling Secure Service
Discovery in Mobile Healthcare Enterprise Networks,” IEEE Wireless
Comm., vol. 16, no. 3, pp. 24-32, June 2009.
[2] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Handshake with
Symptoms-Matching: The Essential to the Success of Mhealthcare
Social Network,” Proc. Fifth Int‟l Conf. Body Area Networks
(BodyNets ‟10), 2010.
[3] Y. Ren, R.W.N. Pazzi, and A. Boukerche, “Monitoring Patients via a
Secure and Mobile Healthcare System,” IEEE Wireless Comm., vol. 17,
no. 1, pp. 59-65, Feb. 2010.
[4] R. Lu, X. Lin, X. Liang, and X. Shen, “A
Secure handshake scheme with symptoms-matching for mhealthcare
social network,” MONET, vol. 16,no. 6, pp. 683–694, 2011.
[5] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure shar-
ing of personal health records in cloud computing using attribute-
basedencryption,” IEEE Transactions on Parallel and Distributed
System, to appear.