This document discusses frequency reuse in cellular networks. It describes the frequency bands used in GSM900 and GSM1800 standards. Common frequency reuse patterns include "4 3", "3 3", and dual frequency reuse. Frequency reuse allows the same frequencies to be used in different cells by ensuring sufficient distance between those cells. The document also provides equations to calculate frequency reuse distance based on cell radius and reuse factor.
Wireless power transmission for implantable medical devicesDILSHAD AHMAD
The document discusses wireless power transmission for implantable medical devices. It provides historical background on wireless power transmission dating back to Nikola Tesla's proposals in 1899. The document then discusses the motivation and challenges for wirelessly powering implantable medical devices to avoid battery replacement surgery. It reviews various technologies and commercial alliances for wireless power transfer including Qi, A4WP, and PMA. Finally, it provides diagrams of the system block for an A4WP wireless power transfer system including the power transmitter and receiver units.
This document summarizes the evolution of mobile networks from 2G to 4G. It describes the key technologies and capabilities of 2G (9.6 Kbps speed), 2.5G/GPRS (up to 115 Kbps), 3G (2 Mbps, increased bandwidth to 2GHz, supports video/GPS), LTE (200 active clients per 5MHz cell, up to 2Gbps speed), and 4G (formally approved in 2009 as IMT-Advanced, 2Gbps speed, improved coverage and capacity). Each generation brought increased speeds and bandwidth as well as new multimedia capabilities.
The key characteristic of a cellular network is the ability to reuse frequencies to increase both coverage and capacity. Cellular networks divide geographic areas into smaller cells and assign different frequency groups to neighboring cells to minimize interference and allow for frequency reuse. This allows the same frequencies to be reused in different cells separated by a sufficient distance.
DESIGNING PHASE FREQUENCY DETECTOR USING DIFFERENT DESIGN TECHNOLOGIESIAEME Publication
This paper presents the designs of phase frequency detector. The simulation results are focused on accounting the frequency operation, power dissipation and noise. The various PFDs are designed using 0.35 m CMOS technology on SPICE simulator with 3.3V supply voltage. The transfer curve of the different logic designed PFDs shows that the mentioned designs are dead zone free. In the first section, a basic introduction ab out phase locked loop and the importance of PFD is discussed. In the second section, a brief description about the different logic designs used in this paper is given. Subsequently, in the third section, simulation results of various models optimized are observed, explained and finally based on these observations results have been concluded at the end.
This document provides an overview of Narrow Band Internet of Things (NB IoT) technology. It begins with introductions to IoT and the key elements that make up IoT systems. It then describes NB IoT, including its objectives to enable low cost, long battery life connections for a large number of devices. The document outlines the NB IoT standards development and provides details on its deployment scenarios, operation modes, architecture and characteristics. It also summarizes the different layers of the NB IoT protocol stack, including the radio resource control layer.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
This document discusses frequency reuse in cellular networks. It describes the frequency bands used in GSM900 and GSM1800 standards. Common frequency reuse patterns include "4 3", "3 3", and dual frequency reuse. Frequency reuse allows the same frequencies to be used in different cells by ensuring sufficient distance between those cells. The document also provides equations to calculate frequency reuse distance based on cell radius and reuse factor.
Wireless power transmission for implantable medical devicesDILSHAD AHMAD
The document discusses wireless power transmission for implantable medical devices. It provides historical background on wireless power transmission dating back to Nikola Tesla's proposals in 1899. The document then discusses the motivation and challenges for wirelessly powering implantable medical devices to avoid battery replacement surgery. It reviews various technologies and commercial alliances for wireless power transfer including Qi, A4WP, and PMA. Finally, it provides diagrams of the system block for an A4WP wireless power transfer system including the power transmitter and receiver units.
This document summarizes the evolution of mobile networks from 2G to 4G. It describes the key technologies and capabilities of 2G (9.6 Kbps speed), 2.5G/GPRS (up to 115 Kbps), 3G (2 Mbps, increased bandwidth to 2GHz, supports video/GPS), LTE (200 active clients per 5MHz cell, up to 2Gbps speed), and 4G (formally approved in 2009 as IMT-Advanced, 2Gbps speed, improved coverage and capacity). Each generation brought increased speeds and bandwidth as well as new multimedia capabilities.
The key characteristic of a cellular network is the ability to reuse frequencies to increase both coverage and capacity. Cellular networks divide geographic areas into smaller cells and assign different frequency groups to neighboring cells to minimize interference and allow for frequency reuse. This allows the same frequencies to be reused in different cells separated by a sufficient distance.
DESIGNING PHASE FREQUENCY DETECTOR USING DIFFERENT DESIGN TECHNOLOGIESIAEME Publication
This paper presents the designs of phase frequency detector. The simulation results are focused on accounting the frequency operation, power dissipation and noise. The various PFDs are designed using 0.35 m CMOS technology on SPICE simulator with 3.3V supply voltage. The transfer curve of the different logic designed PFDs shows that the mentioned designs are dead zone free. In the first section, a basic introduction ab out phase locked loop and the importance of PFD is discussed. In the second section, a brief description about the different logic designs used in this paper is given. Subsequently, in the third section, simulation results of various models optimized are observed, explained and finally based on these observations results have been concluded at the end.
This document provides an overview of Narrow Band Internet of Things (NB IoT) technology. It begins with introductions to IoT and the key elements that make up IoT systems. It then describes NB IoT, including its objectives to enable low cost, long battery life connections for a large number of devices. The document outlines the NB IoT standards development and provides details on its deployment scenarios, operation modes, architecture and characteristics. It also summarizes the different layers of the NB IoT protocol stack, including the radio resource control layer.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
This document describes the Hamming code system. It introduces Hamming codes, which can detect up to two-bit errors or correct one-bit errors. It discusses different types of errors, the Hamming bound condition, and how to implement Hamming codes by calculating parity bits using a generator matrix and decoding received codewords using a parity check matrix to detect and correct errors through syndrome decoding. The document also includes a MATLAB source code example to simulate the encoding, transmission over an AWGN channel, and decoding of Hamming codes to calculate the bit error rate.
The document discusses reduced ordered binary decision diagrams (ROBDDs), which are a compact data structure for representing Boolean functions. It explains that ROBDDs are derived from binary decision diagrams (BDDs) and Shannon's expansion. An ROBDD is constructed by first building an ordered binary decision tree (OBDT) and then applying reduction rules to remove redundant tests and merge isomorphic subgraphs, resulting in a reduced, acyclic graph. The document provides examples of constructing ROBDDs from truth tables and discusses properties like canonical representation and efficient manipulation.
The document summarizes the evolution of mobile telephony technology from 1G to 5G. 1G introduced analog voice calls with speeds up to 2.4 kbps. 2G launched digital networks and added SMS. 2.5G combined 2G with GPRS and EDGE, enabling email and basic web browsing. 3G increased speeds to 2 Mbps, powering smartphones and multimedia. 4G provided speeds from 100 Mbps to 1 Gbps using LTE and WiMAX standards. 5G is still in development and aims to further increase speeds for applications like video calling.
This document discusses multi mode multi corner (MMMC) analysis for chip design. It defines that a mode is a set of design parameters like clocks and timing constraints, and a corner captures process, voltage, and temperature variations. It provides examples of multiple modes like normal, sleep, and test modes and corners for temperature, voltage, process variations, and parasitic interconnects. The document gives an example of analyzing a chip with 4 modes under 3 process-voltage-temperature corners and 3 parasitic interconnect corners, showing 9 analysis cases.
The document discusses VLSI (Very Large Scale Integration) systems and the VLSI design flow. VLSI systems integrate millions of electronic components into a small chip area. The objectives of VLSI design are high circuit speed, low power consumption, and minimizing design area. The VLSI design flow involves idea conception, specifying requirements, designing architecture, register transfer level coding in VHDL, RTL verification through simulation, synthesis into logic gates, sending to a foundry for fabrication, and producing the final integrated circuit chip.
This document discusses Wimax security. It begins by providing background on Wimax and describing its architecture, which includes the physical layer, MAC layer with its convergence, common part, and security sublayers, and the security steps of authentication and authorization, key exchange, and traffic encryption. It then outlines some security issues in Wimax, including physical layer attacks like jamming, man-in-the-middle attacks during authentication and key exchange, and replay and denial of service attacks against subscriber stations. It concludes by listing several references on Wimax security.
The document provides an overview of Synchronous Optical Networking (SONET). It discusses the history and objectives of SONET, which was developed in the 1980s as a standard for fiber optic networks. SONET protocols allow for multiplexing of data streams at different rates and transport of services like ATM. SONET uses ring and linear network topologies that provide redundancy and automatic protection switching. It compares SONET to other technologies like ATM, frame relay, and SDH. Benefits of SONET include grooming, multi-point connectivity, and enhanced operation, maintenance and provisioning. The document also outlines SONET protocol layers, operations, and its role in wide area networks.
The document describes CS fallback procedures for LTE networks, including an immediate-return (IR) scheme and a proposed delayed-return (DR) scheme. The IR scheme has the UE immediately return to LTE after a call is completed, while DR delays the return to avoid unnecessary CS fallbacks if another call is likely. Analytic models are developed to study the performance of IR and DR based on real network measurements. The study finds DR can reduce CS fallback costs by up to 60% compared to IR.
An IoT gateway bridges communication between devices, sensors, systems and the cloud. It offers local processing and storage, and can autonomously control devices based on sensor data. IoT gateways aggregate, process and filter data for secure transmission from the edge to the cloud. They bridge different sensing domain protocols with network domain protocols through protocol conversion and multi-interface connectivity to various wireless standards. Common features of IoT gateways include supporting multiple interfaces, protocol conversion, manageability, and acting as a bridge between sensing and network domains.
The IEEE 802 standards describe networking protocols for the physical and data link layers of the OSI model. The IEEE 802 committee develops these standards, with subcommittees focusing on specific technologies. The 802.5 standard defines Token Ring networks that use a logical ring topology and token passing to control access and prevent collisions. The 802.3 standard defines Ethernet networks that typically use a bus or star topology and Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for network access.
This document discusses low power VLSI designs. It covers VLSI design flows, RTL modeling using HDLs, synthesis, and power estimation and reduction techniques like clock gating. Clock gating is a major dynamic power reduction technique that gates the clock signal to avoid unnecessary toggling. New trends in clock gating leverage multi-level Boolean logic to derive enables based on stability conditions and observability don't cares. Enable strengthening aims to find a new enable that more efficiently gates the clock than existing enables.
These are the slides of the talk "Putting the citizens at the center of the network: Cell-free architectures" that I delivered at the IEEE 5G Summit held in Montreal today!
The document discusses techniques for reducing power consumption in integrated circuits and systems. It covers optimization opportunities at various levels of design from system to transistor level. Key techniques discussed include multi-voltage/multi-threshold designs, clock gating, power gating, dynamic voltage and frequency scaling, and reducing switching activity through logic restructuring. The document emphasizes that low power design requires a holistic approach across all levels of the design hierarchy.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkARVIND SARDAR
The document provides an introduction to 3G mobile networks including GSM, GPRS and EDGE. It discusses the evolution from 1G to 2G to 3G networks, with 2G introducing GSM and 2.5G being GPRS. 3G aimed to support higher data speeds. GPRS offered speeds up to 114kbps, EDGE up to 384kbps, and UMTS/HSDPA up to 14Mbps. It then describes the key components and architecture of GSM and GPRS networks.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. .
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
This document describes the Hamming code system. It introduces Hamming codes, which can detect up to two-bit errors or correct one-bit errors. It discusses different types of errors, the Hamming bound condition, and how to implement Hamming codes by calculating parity bits using a generator matrix and decoding received codewords using a parity check matrix to detect and correct errors through syndrome decoding. The document also includes a MATLAB source code example to simulate the encoding, transmission over an AWGN channel, and decoding of Hamming codes to calculate the bit error rate.
The document discusses reduced ordered binary decision diagrams (ROBDDs), which are a compact data structure for representing Boolean functions. It explains that ROBDDs are derived from binary decision diagrams (BDDs) and Shannon's expansion. An ROBDD is constructed by first building an ordered binary decision tree (OBDT) and then applying reduction rules to remove redundant tests and merge isomorphic subgraphs, resulting in a reduced, acyclic graph. The document provides examples of constructing ROBDDs from truth tables and discusses properties like canonical representation and efficient manipulation.
The document summarizes the evolution of mobile telephony technology from 1G to 5G. 1G introduced analog voice calls with speeds up to 2.4 kbps. 2G launched digital networks and added SMS. 2.5G combined 2G with GPRS and EDGE, enabling email and basic web browsing. 3G increased speeds to 2 Mbps, powering smartphones and multimedia. 4G provided speeds from 100 Mbps to 1 Gbps using LTE and WiMAX standards. 5G is still in development and aims to further increase speeds for applications like video calling.
This document discusses multi mode multi corner (MMMC) analysis for chip design. It defines that a mode is a set of design parameters like clocks and timing constraints, and a corner captures process, voltage, and temperature variations. It provides examples of multiple modes like normal, sleep, and test modes and corners for temperature, voltage, process variations, and parasitic interconnects. The document gives an example of analyzing a chip with 4 modes under 3 process-voltage-temperature corners and 3 parasitic interconnect corners, showing 9 analysis cases.
The document discusses VLSI (Very Large Scale Integration) systems and the VLSI design flow. VLSI systems integrate millions of electronic components into a small chip area. The objectives of VLSI design are high circuit speed, low power consumption, and minimizing design area. The VLSI design flow involves idea conception, specifying requirements, designing architecture, register transfer level coding in VHDL, RTL verification through simulation, synthesis into logic gates, sending to a foundry for fabrication, and producing the final integrated circuit chip.
This document discusses Wimax security. It begins by providing background on Wimax and describing its architecture, which includes the physical layer, MAC layer with its convergence, common part, and security sublayers, and the security steps of authentication and authorization, key exchange, and traffic encryption. It then outlines some security issues in Wimax, including physical layer attacks like jamming, man-in-the-middle attacks during authentication and key exchange, and replay and denial of service attacks against subscriber stations. It concludes by listing several references on Wimax security.
The document provides an overview of Synchronous Optical Networking (SONET). It discusses the history and objectives of SONET, which was developed in the 1980s as a standard for fiber optic networks. SONET protocols allow for multiplexing of data streams at different rates and transport of services like ATM. SONET uses ring and linear network topologies that provide redundancy and automatic protection switching. It compares SONET to other technologies like ATM, frame relay, and SDH. Benefits of SONET include grooming, multi-point connectivity, and enhanced operation, maintenance and provisioning. The document also outlines SONET protocol layers, operations, and its role in wide area networks.
The document describes CS fallback procedures for LTE networks, including an immediate-return (IR) scheme and a proposed delayed-return (DR) scheme. The IR scheme has the UE immediately return to LTE after a call is completed, while DR delays the return to avoid unnecessary CS fallbacks if another call is likely. Analytic models are developed to study the performance of IR and DR based on real network measurements. The study finds DR can reduce CS fallback costs by up to 60% compared to IR.
An IoT gateway bridges communication between devices, sensors, systems and the cloud. It offers local processing and storage, and can autonomously control devices based on sensor data. IoT gateways aggregate, process and filter data for secure transmission from the edge to the cloud. They bridge different sensing domain protocols with network domain protocols through protocol conversion and multi-interface connectivity to various wireless standards. Common features of IoT gateways include supporting multiple interfaces, protocol conversion, manageability, and acting as a bridge between sensing and network domains.
The IEEE 802 standards describe networking protocols for the physical and data link layers of the OSI model. The IEEE 802 committee develops these standards, with subcommittees focusing on specific technologies. The 802.5 standard defines Token Ring networks that use a logical ring topology and token passing to control access and prevent collisions. The 802.3 standard defines Ethernet networks that typically use a bus or star topology and Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for network access.
This document discusses low power VLSI designs. It covers VLSI design flows, RTL modeling using HDLs, synthesis, and power estimation and reduction techniques like clock gating. Clock gating is a major dynamic power reduction technique that gates the clock signal to avoid unnecessary toggling. New trends in clock gating leverage multi-level Boolean logic to derive enables based on stability conditions and observability don't cares. Enable strengthening aims to find a new enable that more efficiently gates the clock than existing enables.
These are the slides of the talk "Putting the citizens at the center of the network: Cell-free architectures" that I delivered at the IEEE 5G Summit held in Montreal today!
The document discusses techniques for reducing power consumption in integrated circuits and systems. It covers optimization opportunities at various levels of design from system to transistor level. Key techniques discussed include multi-voltage/multi-threshold designs, clock gating, power gating, dynamic voltage and frequency scaling, and reducing switching activity through logic restructuring. The document emphasizes that low power design requires a holistic approach across all levels of the design hierarchy.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkARVIND SARDAR
The document provides an introduction to 3G mobile networks including GSM, GPRS and EDGE. It discusses the evolution from 1G to 2G to 3G networks, with 2G introducing GSM and 2.5G being GPRS. 3G aimed to support higher data speeds. GPRS offered speeds up to 114kbps, EDGE up to 384kbps, and UMTS/HSDPA up to 14Mbps. It then describes the key components and architecture of GSM and GPRS networks.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
Similar to Wireless Sensor Networks for the Determination Wellness of Elderly People by Designing of a Multi-Sensor Based System by Experimental Studies
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. .
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
A FRAMEWORK FOR SMART HOMES FOR ELDERLY PEOPLE USING LABVIEW®IJCI JOURNAL
This paper deals with home automation systems that are essential for safe and independent living of elderly
people. These individuals must be able to perform their Activities of Daily Living (ADLs) without help from
caretakers. They must be confident enough that help is just a few minutes with the systems in place. The
focus will be on the medical and emergency systems, which are most essential for independent living. Zigbee based Wireless Sensor Networks (WSN) are used to collect the data throughout the home. Smart
shirts and smart phones monitor different parameters of the individual and transmit the data to the home network. A PC running LabVIEW is used as the central control unit for the entire house. The house must
have a fail proof communication framework for connecting with emergency services, doctors, helpers and relatives. The home network is connected to the Public Switched Telephone Network (PSTN) and internet.
SMS, email, prerecorded voice-based telephone calls are appropriately used to report emergencies. A GUI
(Graphical User Interface) was built in LabVIEW in order to control and simulate an entire home. Ambient Intelligence is built into the system to make it adaptive and dynamic as far as possible.
Design, development and testing of a wireless sensor network for medical appl...sudhakar5472
This document describes the design and development of a wireless sensor network for medical monitoring applications. The system uses ECG sensors interfaced with microcontrollers to transmit patient data via Zigbee wireless communication to a monitoring center consisting of a PC and GSM modem. If abnormal readings are detected, an alert message is sent to caregivers. The system allows for multiple patients to be monitored remotely in real-time, increasing independence for elderly patients while still providing medical assistance when needed.
This document describes an IoT-based patient health monitoring system. The system collects patient vital signs like ECG, temperature, and heart rate using sensors. The sensor data is transmitted to a microcontroller and then sent to the cloud using WiFi. If any abnormal readings are detected, the system alerts caregivers. The system allows for remote monitoring of elderly or chronically ill patients to avoid long hospital stays. It records health data over time which can be useful for future analysis and review of a patient's condition. The system could be improved in the future by adding sensors to monitor additional vitals like blood pressure.
Data Analytics Project proposal: Smart home based ambient assisted living - D...Tarun Swarup
In Ambient Assisted Living environments, monitoring the elderly population can detect a wide range of environmental and user-specific parameters such as daily activities, a regular period of inactivity, usual behavioural patterns and other basic routines. The prime goal of this proposal is to experiment the anomaly detection methods and clustering techniques such as K-means, local outlier factor, K-nearest, DBSCAN and CURE on data and determine the most efficient and accurate method among all.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
This document proposes using wearable devices and Bluetooth beacons to track the location of dementia patients within senior living facilities. By creating a handshake between the wearable devices and strategically placed beacons, caregivers could monitor patients' real-time locations and receive alerts if a patient leaves a restricted area or removes their device. This system could reduce costly search operations when patients wander by 55-65%, saving an estimated $48 million for the company over three years. In addition to financial benefits, the system would provide peace of mind to caregivers and patients' families by allowing constant monitoring and faster emergency response.
Smart clothing is on tremendous high demand for the various safety purposes, for heath in hazardous environment, for improvising business performance, appearance and in entertainment. With the wearable devices like smart jackets and other accessories it is possible to collect and detect the signals for the organizations to respond the incidents in many different ways.Smart Clothing joins in materials and remote sensor and organizes with regards to human body observing with measurable strategies for the information and treatment. Thejashwini. K. S | Sayeeqa Anjum | Sowmya K. N | C R Manjunath"IoT Based Smart Clothing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd13055.pdf http://www.ijtsrd.com/engineering/computer-engineering/13055/iot-based-smart-clothing/thejashwini-k-s
IRJET- Review Paper on IoT Driven Smart Pill BoxIRJET Journal
This document describes a proposed smart pill box that uses IoT technology to help patients take their medications on time and as prescribed. The smart pill box would contain different compartments for different medications, and use a real-time clock and push buttons to remind patients when to take each medication based on the prescribed schedule. Relatives and doctors would be able to monitor medication usage remotely using an Android app. The document reviews several previous studies on smart pill boxes and sensor-based medication reminders, and proposes adding remote monitoring capabilities using IoT to help ensure patients properly take their medications.
Internet of Things (IoT) has wide applications in the healthcare sector. It allows for real-time patient monitoring and analysis from remote locations using sensors and devices. IoT improves various areas of hospital operations like patient tracking, hygiene maintenance, record keeping, smart equipment, billing and procurement. However, IoT also faces challenges like privacy concerns, high costs, lack of standards and need for regulations. If these challenges are addressed, IoT has potential to transform healthcare delivery and outcomes in the future.
Locating and securing an Alzheimers patient who is outdoors and in wandering is crucial to an Alzheimer patient safety. Although advances in geo tracking and mobile technology have made locating patients instantly possible, reaching them while in wandering state may take time. However, a social network of caregivers may help shorten the time that it takes to reach and secure a wandering AD patient. This study proposes a new type of intervention based on novel mobile application architecture to form and direct a social support network of caregivers for locating and securing wandering patients as soon as possible. System employs, aside from the conventional tracking mechanism, a wandering detection mechanism, both of which operates through a tracking device installed a Subscriber Identity Module for Global System for Mobile Communications Network (GSM). Keywords: Alzheimer Disease (AD), Global System for Mobile Communication (GSM), Global Positioning System (GPS), Mild Cognitive Impairment (MCI), Electronic Geo- Tracking (EGT), Short Message Service (SMS), Radio Frequency Identification (RFID), Secure Digital Card (SD Card), Digital-to-Analog Converter (DAC), Active-Radio Frequency Identification Localization System (ARFIDLS), General Packet Radio Service (GPRS), Real-time Locating Systems (RTLS). Haroon Dar | Shreyansh Jain | Jyoti Shukla | V. M. Sardeshmukh"Alzheimer Patient Tracking and Alert System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11218.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11218/alzheimer-patient-tracking-and-alert-system/haroon-dar
Principles of research article 23 july 2021JOENEMUKWEVHO
This document summarizes a student project that aims to design an IoT home automation system using wireless sensor networks based on machine learning. The system would connect household appliances to a wireless network and allow them to be remotely monitored and controlled using a smartphone or computer. This would help automate household tasks, reduce costs by preventing appliance overuse, and improve security. The students conducted a literature review on existing IoT and wireless sensor network technologies for home automation. They will simulate their proposed network design using eNSP software. The goal is to achieve self-awareness in appliances to automate homes while increasing security and reducing expenses.
The term Internet of Things (Often abbreviated IOT) was coined more than ten years ago by industry researchers but has emerged into mainstream public view only more recently. Some claim the Internet of Things will completely transform how computer networks are used for the next 10 or 100 years, while others believe Internet Of Things is hype that won't much impact the daily lives of most people.
e poster on AI jai jai MLA YSRCP RAJs.pptxGANGOLUYOHAN
Wearable sensors have potential applications in disease diagnosis and treatment through remote patient monitoring. They can monitor physiological and biochemical signals to detect emergency situations and send alerts. Integration of wearable technologies with communication and data analysis allows remote monitoring of individuals in home and community settings. Wearable sensors are being developed and tested to monitor various vital signs unobtrusively like heart rate, respiration rate, blood pressure, and blood oxygen levels.
The average age of world population is increasing exponentially. It is predicted that by 2050, life expectancy is going increase by ten years. The growth of aging population places higher demands on public healthcare systems which increases the cost associated with healthcare services. Due to this demographic shift, service provided for elders has become an integral part of the service industry of Internet of Things. This paper aims to discuss existing IoT-based technologies (smart devices) for elders and propose a framework which incorporates different components from IoT architectures proposed in the literature, to efficiently develop cloud-centric IoT based smart devices for seniors.
The document discusses the internet of things (IoT). It defines IoT as a system of interrelated computing devices, objects, animals, or people that are provided with unique identifiers and can transfer data over a network without requiring human-to-human or human-to-computer interaction. Things in IoT can be devices with sensors like fitness trackers or cars with sensors that alert drivers of low tire pressure. The document then covers components, working, applications, characteristics, advantages, and disadvantages of IoT.
The document describes a smart sensory furniture system that aims to monitor elderly individuals living alone. The system integrates sensors and actuators into furniture to capture interactions between people and their environment. Sensors can be placed in different parts of furniture or across multiple pieces. A communication structure allows sensors to send data wirelessly. Middleware is developed to manage the furniture and provide monitoring, control and autonomous capabilities. The system monitors factors like temperature, heartbeat and respiration rates to detect any changes from normal daily activities that could indicate issues with well-being or emergencies. If abnormalities are detected, alert messages are sent to caregivers. The goal is to provide virtual supervision for elderly safety and well-being without needing full-time care.
This document discusses Internet of Things (IoT). It provides biographical information about the author, Vinay Babani, and defines IoT as connecting physical things to the internet so that they can be accessed remotely. Examples provided include connecting a couch with sensors to determine if it is occupied. Potential applications discussed are health monitoring, smart cities, tracking objects and people, and security. The author expresses interest in developing applications for home and family security and monitoring as well as cyber security. In conclusion, the author notes that while IoT makes information highly accessible, it also raises security and privacy concerns that companies and technology will need to address.
Similar to Wireless Sensor Networks for the Determination Wellness of Elderly People by Designing of a Multi-Sensor Based System by Experimental Studies (20)
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Wireless Sensor Networks for the Determination Wellness of Elderly People by Designing of a Multi-Sensor Based System by Experimental Studies
1. International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333
www.ijtrd.com
IJTRD | Sep - Oct 2015
Available Online@www.ijtrd.com 251
Wireless Sensor Networks for the Determination Wellness of Elderly
People by Designing of a Multi-Sensor Based System by
Experimental Studies
K.Srinivasa Reddy,
Research Scholar ,Bharath University,Chennai, India,
Associate Professor, Department of Electronics and Communication Engineering,
Nagole Institute Of Technology And Science, Hyderabad, Telangana, India.
Abstract— The proportion of elderly people in any
population is growing rapidly creating the need to increase
geriatric care and this trend isn’t going to change in the near
future. This will put tremendous strain on national resources
and the cost of elder care is only going to escalate. More and
more elderly people are choosing to stay alone,
independently, rather than in a retirement village or old
people’s home. Such people, often frail and infirm, do
however require constant monitoring so that medical help can
be provided immediately in times of dire needs. Considerable
research efforts have been focused towards in-home
monitoring of elderly people, often using wireless personal
area networks. As wireless sensing technology continues to
evolve, it is playing an important role in improving the
quality of life for elderly people and their families. Wireless
sensors based smart home monitoring system provides a safe,
sound and secure living environment for the elderly people.
A wireless sensors based smart home consists of number of
wireless sensors that provide information. The information
from the sensors can be used for monitoring elderly people
by detecting their abnormal patterns in their daily activities
and picking up any unforeseen abnormal condition when
occurs. The project is focused on research and developmental
issues of an intelligent wireless sensors based smart home
and determination of person’s daily activities based on the
usage of different appliances. The daily pattern can then be
compared to determine the early signs of behavioral pattern
change of elderly, which can potentially allow for early
medical intervention. While several sensors are readily
available off the shelf, making them ―intelligent‖ in the
context of a specific application (such as monitoring of the
elderly) is always a challenging task. We have developed a
framework, dealing with the design intricacies and
implementation issues of novel sensors, targeted to achieve a
Digital Home specifically for the elderly. The developed
monitoring system is used to recognize activities of daily
living and life style of elderly person living alone. Even
though the monitoring system uses a limited number of
sensors, it determines the daily behavior of the person. The
system was installed in residential environments with ease.
Moreover, the proposed sensing system presents an
alternative to sensors that are perceived by most people as
invasive such as cameras and microphones, making the
sensors are almost invisible to the user thereby increasing the
acceptance level to use the system in a household
environment.
Keywords: Wsn, Zigbee, Sensor, Hearbeat Sensor.
I. OVERVIEW OF THE SYSTEM
Wireless sensor network for wellness determination
of elderly involves functional assessment of daily activities
and health monitoring of elderly in this A smart sensor
coordinator collects data from the sensing units and forward
to the computer system for data processing. Collected sensor
data are of low level information containing only status of the
sensor as active or inactive and identity of the sensor. To
sense the activity behavior of elderly in real time, the next
level software module will analyze the collected data by
following an intelligent mechanism at various level of data
abstraction based on time and sequence behavior of sensor
usage.
II. EXISTING SYSTEM
Home Monitoring Activities through camera lacks a huge
acceptability among elder persons. Other than camera,
infrared small motion detectors, passing sensors, operation
detectors and IR motion sensors have been incorporated in
the house for monitoring human activity behavior and the
interpretation of human activity is limited only to a few
human activities.
There are many existing systems on personal wellness
monitoring and safety like RFID Communication technology
and wearable health devices integrated with sensors to
provide continuous monitoring of person’s health related
issues and activity monitoring.
RFID (Radio Frequency Identification) is the abbreviation for
individual identification by radio waves. The system is able
to collect positional information when a radio wave
transmitted by an RFID reader strikes an RFID tag with
embedded information, which is then included in the radio
wave reflected to and captured by the reader.
Though these devices are for specific purposes they have
severe concerns related to security, privacy and legal aspects.
Usually people are reluctant to wear a system continuously
2. International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333
www.ijtrd.com
IJTRD | Sep - Oct 2015
Available Online@www.ijtrd.com 252
on their body. So it may not be viable option for a healthy
elderly people. This situation may be acceptable for a patient
under rehabilitation.
Wireless sensor networks offer a number of advantages over
traditional RFID implementations, First of all, the ability to
rapidly deploy a multi-hop network (RFID is single hop only)
allows WSNs to be used in a number of ad hoc/temporary.
WSN is ability to locally store data when the tag/node is 'out
of network' and then download that data when the tag or node
comes back into a network provides an audit trail with time
line, environmental conditions and location.
Using wireless sensor network it is possible to monitor elder
person who is alone at home, using Zigbee module.
III. PROPOSED SYSTEM
In the present work, an intelligent home monitoring system
based on ZIGBEE wireless sensors networks has been
designed and developed to monitor the and evaluate the well
being of the elderly living alone in a home environment.
Wellness of elderly can be evaluated for forecasting the
unsafe situations during monitoring of regular activities
At the low level module wireless sensor network integrated
with ZIGBEE modules of mesh structure exists capturing the
sensor data based on the usage of electrical appliances and
stores data in the computer system for further data processing
Collected sensor data are of low level information containing
only status of the sensor as active or inactive and identity of
the sensor
The low level module consists of a number of sensors
interconnected to detect usage of electrical devices, bed
usage and chairs etc. ZIGBEE transceiver which
communicates at 2.4 GHz (ISM) through radio frequency
protocols and provides sensor information that can be used to
monitor the daily activities of an elderly person
Using wireless sensor network it is possible to monitor elder
person who is alone at home, using Zigbee module and GSM
module.
IV. NEED FOR EARLY DETECTION OF
AGEING CHANGES/PROBLEMS OF
ELDERLY PEOPLE
The increase ageing of population in the world is
associated with the increase of suffering with many
disabilities. So there is a need for an in-home pervasive
network which assists and helps the residents by
controlling home appliances, medical data look back and
also communicating in case of an emergency. Too often are
headlines such as these seen in the paper: ―Elderly man lay
dead for days‖, and ―Woman found starved in flat‖.
It is shocking to know that no one was looking after these
people and imagine they must have an uncaring family.
At the same time however, as a society we value our
rights to live independently and keep control of our own
lives. Many dread the thought of being forced to live with
their adult children, or in a rest home or other sheltered
living arrangement yet at the same time they know there is
a high risk of death because of a collapse, a fall, or stroke.
There are many people in our community who because of
age or some infirmity, or perhaps because their memory
and judgment can no longer be totally relied upon, are having
pressure put on them by loving relatives to leave their home
and give up their precious independence. Any abnormal
events which can occur to an old person in a home often
leads to more serious illnesses or even death. But in a
case of reduced mobility or other factors which leads to
this kind of situation should also be considered for
effective monitoring, which will make a significant impact
on the health of the elderly people. Surely, with the
technology of today, there is a better way for these people to
resolve this problem. This technological assistance or
monitoring of a person in the home is achieved using few
but effective wireless sensors, which are centralized in
structure and distributed around the house. The smart
home concept is a promising way to improve the living
standards of elderly by improving the home care for the
elderly. The smart home monitoring can circumvent
institutionalizing the older persons and can help them live
at home in safety and provide independence. The smart
homes target to improve comfort, quality of life, safety,
monitoring, monitoring mobility and physiological
parameters. Modern sensor not only assists and monitors
people with reduced physical functions but helps to resolve
the social isolation they face. They are capable of providing
assistance without limiting or disturbing the resident’s
daily routine, giving him or her greater comfort, pleasure,
and well-being. A number of smart homes have now
been developed around the world by many institutes and
researchers. The smart home is based on smart and
intelligent sensors, which are developed, fabricated and
configured around a wireless network. It is expected that
these smart homes can reduce escalating medical costs.
V. OUR APPROACH AND SOLUTION
Recent advances in sensor technology, communication
systems, and information technologies have created ample
opportunities to develop novel tools enabling remote
monitoring in-case of emergency conditions, and to
care the elderly. In-home monitoring has the added
benefit of evaluating individualized health status and
reporting it to care providers, and caregivers alike; allowing
timelier and individually targeted preventive interventions
[13]. The smart homes equipped with the wireless sensor
networks will benefit both health care providers and
their patients. By monitoring the patient continuously and
reporting any abnormal situation, the system frees human
labour and thus reducing labour costs and increasing
efficiency by notifying doctors or health care provider
quickly. The data collected from various sensors over
the network in a smart home can be stored and
integrated into comprehensive health record. Other issues
3. International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333
www.ijtrd.com
IJTRD | Sep - Oct 2015
Available Online@www.ijtrd.com 253
like quality of life for elder people, such as privacy,
independence, dignity and convenience are supported and
enhanced by the ability to provide services in the patient’s
own home. It is a known fact that the use and the way of
implementation of wireless sensor networks drastically
change from one application to other application; the
need for in-depth study on performance parameters is
vital. While several sensors are readily available off the
shelf, making them ―intelligent‖ in the context of a specific
application (such as monitoring of the elderly) is always a
challenging task. For example, an intelligent wireless
sensor system will not only detect the usage pattern of
the daily appliances, it will have capabilities to collate the
data and analyse them. Depending on the data analysis it can
detect any abnormality. To achieve this I have developed
and implemented a SMART component-based system by
integrating various sensors and communicating via
standard radio frequency protocols. The system depends
on a set of selected number of wireless sensors and
controller which relies on inputs from sensors. This system
will consist of a proof-of-concept that what I have
developed is feasible, reliable, practical and scalable.
VI. RESULTLS
Below figure shows Integration of all sensors with
ARM7 this is connected to the Zigbee and GSM modules, for
monitoring the person and controlling.
Figure 1: Integration of all sensors with ARM7
These sensors are connected to the ARM7 board by
using GSM and ZIGBEE modules we can monitor the person
who is alone at home, we can also control some operations
such as if the temperature is high we will be getting message
to our mobiles through GSM module then we can on fan, and
if the light intensity is less then we can switch on light, if the
heart beat rate is more then we will be getting message to the
mobile then we can admit that person into hospital.
Figure 2: code execution using visual basic
Figure 3: Entering the port number for execution of code
Below screenshot shows display of temperature and heart
beat rate of elder person who is alone at home
Figure 4: Temperature And Heart Beat Rate Display
Conclusion
In the present work, an intelligent home monitoring
system based on ZIGBEE wireless sensors networks has been
designed and developed to monitor the and evaluate the well
being of the elderly living alone in a home environment. To
sense the activity behavior of elderly in real time, connect all
4. International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333
www.ijtrd.com
IJTRD | Sep - Oct 2015
Available Online@www.ijtrd.com 254
the sensors to particular person then these sensors collect the
data and the next level software module will analyze the
collected data by following an intelligent mechanism at
various level of data abstraction Based on time and sequence
behavior of sensor usage and pass it through the network to a
main location. For knowing wellness of the person up to date,
here we are using Zigbee and GSM modules for passing
information about the elder person to the monitoring person,
if the temperature or heartbeat rate of the elder person is
exceeds particular value then it will send a message to the
monitoring person so that he can act further.
This thesis has undertaken a fundamental study to
develop an in-house sensing system based on wireless sensor
networks to monitor elderly. The wireless elderly monitoring
system demonstrates that smart, simple sensor devices
can be used to recognize activities of daily living and
life style of elderly person living alone. The system is
becoming more complete as more intelligent features are
added to detect the daily activity patterns efficiently. Even
though it uses a limited number of sensors, it can capture
the abnormality in a person’s daily routine by
recognizing the use of appliances necessary for daily
living, thus determining the life style of elderly person living
alone. The system can be installed/ maintained in
residential environments without any complexity.
Moreover, the proposed sensing system presents an
alternative to sensors that are perceived by most people as
invasive such as use of cameras and microphones, making
the sensors are almost invisible to the user thereby increasing
the acceptance level to use the system in a house hold
environment. The system can be easily installed in an
existing home environment with no major modifications
or damage.The developed system continuously monitor the
activity of the elderly person staying alone and generate the
sensor activity pattern to analyze and foresee the changes
in daily activities of the elderly person. In the near future,
the generated activity pattern related to weekdays and
weekends will be used to predict the unusual behavior of the
elderly person based on the classification model of
regular and irregular sensor activity. Results of Real-time
activity behavior recognition of the inhabitant were
encouraging. Classification of abnormal situation based on
multi-level check method was validated with machine
learning methods.
Integration of wellness function in the developed software
system was effectively able to determine the abnormal
situation of the inhabitant.
A. GSM Modem:
A GSM modem is a wireless modem that works with a
GSM wireless network. A wireless modem behaves like a
dial-up modem. The main difference between them is that a
dial-up modem sends and receives data through a fixed
telephone line while a wireless modem sends and receives
data through radio waves.
A GSM modem can be an external device or a PC Card /
PCMCIA Card. Typically, an external GSM modem is
connected to a computer through a serial cable or a USB
cable. A GSM modem in the form of a PC Card / PCMCIA
Card is designed for use with a laptop computer. It should be
inserted into one of the PC Card / PCMCIA Card slots of a
laptop computer. Like a GSM mobile phone, a GSM modem
requires a SIM card from a wireless carrier in order to
operate.
As mentioned in earlier sections of this SMS tutorial,
computers use AT commands to control modems. Both GSM
modems and dial-up modems support a common set of
standard AT commands. You can use a GSM modem just
like a dial-up modem
Figure 5: GSM
In addition to the standard AT commands, GSM modems
support an extended set of AT commands. These extended
AT commands are defined in the GSM standards. With the
extended AT commands, you can do things like:
• Reading, writing and deleting SMS messages.
• Sending SMS messages.
• Monitoring the signal strength.
• Monitoring the charging status and charge level of
the battery.
• Reading, writing and searching phone book entries.
The number of SMS messages that can be processed by a
GSM modem per minute is very low, only about six to ten
SMS messages per minute.
B. Operation And Results
Wireless sensor network for wellness determination
of elderly is working with sensors includes heart beat sensor,
temperature sensor, LDR sensor, MEMS sensor, and Driver
unit which is connected to two external devices such as fan
and light. Sensors sense the respected values and send it to
the ARM7 processor, that will be processed and send it to the
Zigbee module and GSM module, while coding we will set
particular value to the temperature sensor, heart beat sensor,
LDR sensor, MEMS sensor, when it exceeds that particular
value then we will be getting message to our mobile through
GSM module.
5. International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394-9333
www.ijtrd.com
IJTRD | Sep - Oct 2015
Available Online@www.ijtrd.com 255
Figure 6: Integration of all sensors with ARM7
CONCLUSION
In this system, the required number of sensors for
monitoring the daily activities of the elderly have been used.
A smart sensor coordinator collects data from the sensing
units and forward to the computer system for data processing.
Collected sensor data are of low level information containing
only status of the sensor as active or inactive and identity of
the sensor. To sense the activity behavior of elderly in real
time, the next level software module will analyze the
collected data by following an intelligent mechanism at
various level of data abstraction based on time and sequence
behavior of sensor usage.
Acknowledgment
The author would like to thank Mr.K.Srinivasa
Reddy, Associate Professor, for providing necessary facilities
to carry out this work. A special gratitude to my parents for
their constant encouragement without which this assignment
would not be possible.
References
[1] A. H. Nasution and S. Emmanuel, ―Intelligent video
surveillance for monitoring elderly in home environments,‖
in Proc. IEEE 9th Workshop
Multimedia Signal Process., Oct. 2007, pp. 203–206.
[2] Z. Zhongna, D. Wenqing, J. Eggert, J. T. Giger, J. Keller,
M. Rantz,and H. Zhihai, ―A real-time system for in-home
activity monitoring of elders,‖ in Proc. Annu. Int. Conf. IEEE
Eng. Med. Biol. Soc., Sep. 2009,pp. 6115–6118.
1972 IEEE SENSORS JOURNAL, VOL. 12, NO. 6, JUNE
2012[3] S. J. Hyuk, L. Boreom, and S. P. Kwang, ―Detection
of abnormal living patterns for elderly living alone using
support vector data description,‖ IEEE Trans. Inf. Technol.
Biomed., vol. 15, no. 3, pp. 438–448, May
2011.
[4] A. Wood, J. Stankovic, G. Virone, L. Selavo, H. Zhimin,
C. Qiuhua,D. Thao, W. Yafeng, F. Lei, and R. Stoleru,
―Context-aware wireless sensor networks for assisted living
and residential monitoring,‖ IEEE
Netw., vol. 22, no. 4, pp. 26–33, Jul.–Aug. 2008.
[5] J. K. Wu, L. Dong, and W. Xiao, ―Real-time physical
activity classification and tracking using wearble sensors,‖ in
Proc. 6th Int. Conf. Inf.,Commun. Signal Process., Dec.
2007, pp. 1–6.
[6] Z. Bing, ―Health care applications based on ZigBee
standard,‖ in Proc.Int. Conf. Comput. Design Appl., vol. 1.
Jun. 2010, pp. V1-605– V1-608.
[7] K. P. Hung, G. Tao, X. Wenwei, P. P. Palmes, Z. Jian, W.
L. Ng, W.T. Chee, and H. C. Nguyen, ―Context-aware
middleware for pervasive elderly homecare,‖ IEEE J. Sel.
Areas Commun., vol. 27, no. 4, pp.510–524, May 2009.
[8] H. Yu-Jin, K. Ig-Jae, C. A. Sang, and K. Hyoung-Gon,
―Activity recognition using wearable sensors for elder care,‖
in Proc. 2nd
Int. Conf. Future Generat. Commun. Netw., vol.
2. Dec. 2008, pp. 302–305.
[9] A. A. Moshaddique and K. Kyung-Sup, ―Social issues in
wireless sensor networks with healthcare perspective,‖ Int.
Arab J. Inf. Technol., vol. 8,no. 1, pp. 34–39, Jan. 2011.
[10] K. Hara, T. Omori, and R. Ueno, ―Detection of unusual
human behaviour in intelligent house,‖ in Proc. 12th IEEE
Workshop Neural Netw. Signal Process., Nov. 2002, pp.
697–706.
[11] S.-W. Lee, Y.-J. Kim, G.-S. Lee, B.-O. Cho, and N.-H.
Lee, ―A remote behavioral monitoring system for elders
living alone,‖ in Proc. Int. Conf.Control, Autom. Syst., Oct.
2007, pp. 2725–2730.
Authors:
Mr.K. Srinivasa Reddy is research scholar from
bharath university,chennai and also Associate Professor of
the Electronics and Communication Engineering, Nagole
Institute of Technology and Science, Hyderabad .He received
his B.Tech degree in Electronics and Communication
Engineering from JNT University, Hyderabad, and M.Tech
degree in Embedded Systems from JNT University,
Hyderabad.. He is a member of The International Association
of Engineers (IAENG). He had twelve publications in
National and International Journals. He has written three text
books in the field of wireless communications.