To see the other types of publications on this topic, follow the link: E-Health pervasive wireless applications.

Journal articles on the topic 'E-Health pervasive wireless applications'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'E-Health pervasive wireless applications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lin, Di, Xuanli Wu, Fabrice Labeau, and Athanasios Vasilakos. "Internet of Vehicles for E-Health Applications in View of EMI on Medical Sensors." Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/315948.

Full text
Abstract:
Wireless technologies are pervasive to support ubiquitous healthcare applications. However, RF transmission in wireless technologies can lead to electromagnetic interference (EMI) on medical sensors under a healthcare scenario, and a high level of EMI may lead to a critical malfunction of medical sensors. In view of EMI to medical sensors, we propose a joint power and rate control algorithm under game theoretic framework to schedule data transmission at each of wireless sensors. The objective of such a game is to maximize the utility of each wireless user subject to the EMI constraints for medical sensors. We show that the proposed game has a unique Nash equilibrium and our joint power and rate control algorithm would converge to the Nash equilibrium. Numerical results illustrate that the proposed algorithm can achieve robust performance against the variations of mobile hospital environments.
APA, Harvard, Vancouver, ISO, and other styles
2

Lemlouma, Tayeb, Sébastien Laborie, Abderrezak Rachedi, António Santos, and Athanasios V. Vasilakos. "Special Issue on Selected Papers from e-Health Pervasive Wireless Applications and Services 2017." Information 10, no. 2 (February 5, 2019): 52. http://dx.doi.org/10.3390/info10020052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Di, Yuanzhe Yao, Fabrice Labeau, Yu Tang, and Athanasios V. Vasilakos. "Optimal Network QoS over the Internet of Vehicles for E-Health Applications." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/5140486.

Full text
Abstract:
Wireless technologies are pervasive to support ubiquitous healthcare applications. However, a critical issue of using wireless communications under a healthcare scenario is the electromagnetic interference (EMI) caused by RF transmission, and a high level of EMI may lead to a critical malfunction of medical sensors. In consideration of EMI on medical sensors, we study the optimization of quality of service (QoS) within the whole Internet of vehicles for E-health and propose a novel model to optimize the QoS by allocating the transmit power of each user. Our results show that the optimal power control policy depends on the objective of optimization problems: a greedy policy is optimal to maximize the summation of QoS of each user, whereas a fair policy is optimal to maximize the product of QoS of each user. Algorithms are taken to derive the optimal policies, and numerical results of optimizing QoS are presented for both objectives and QoS constraints.
APA, Harvard, Vancouver, ISO, and other styles
4

Goumopoulos, Christos. "A High Precision, Wireless Temperature Measurement System for Pervasive Computing Applications." Sensors 18, no. 10 (October 13, 2018): 3445. http://dx.doi.org/10.3390/s18103445.

Full text
Abstract:
This paper describes the design and calibration of a highly accurate temperature measurement system for pervasive computing applications. A negative temperature coefficient (NTC) thermistor with high resistance tolerance is interfaced through a conditioning circuit to a 12-bit digital converter of a wireless microcontroller. The system is calibrated to minimize the effect of component uncertainties and achieves an accuracy of ±0.03 °C on average (±0.05 °C in worst cases) in a 5 °C to 45 °C range. The calibration process is based on a continuous temperature sweep, while calibration data are simultaneously logged to reduce the delays and cost of conventional calibration approaches. An uncertainty analysis is performed to support the validity of the reported performance results. The described approach for interfacing the thermistor to the hardware platform can be straightforwardly adjusted for different thermistors, temperature ranges/accuracy levels/resolutions, and voltage ranges. The low power communication combined with the energy consumption optimization adopted enable an operation to be autonomic for several months to years depending on the application’s measurement frequency requirements. The system cost is approximately $45 USD in components, while its design and compact size allow its integration with extended monitoring systems in various pervasive computing environments. The system has been thoroughly tested and validated in a field trial concerning a precision agriculture application and is currently used in a health monitoring application.
APA, Harvard, Vancouver, ISO, and other styles
5

Wickramasinghe, Nilmini, Suresh Chalasani, Steve Goldberg, and Sridevi Koritala. "The Benefits of Wireless Enabled Applications to Facilitate Superior Healthcare Delivery." International Journal of E-Health and Medical Communications 3, no. 4 (October 2012): 15–30. http://dx.doi.org/10.4018/jehmc.2012100102.

Full text
Abstract:
Globally, both wired and wireless technologies have been used for healthcare delivery. However, in the frenzy to secure the best solutions and applications, few have delved deeper into the key issues of how to successfully assimilate these new technologies into the whole healthcare delivery process. The authors focus on wireless healthcare solutions, specifically examining a single exemplar case study, the diamond solution that describes a pervasive technology solution of a diabetes monitoring device. They contend that a key barrier for preventing the full realization of the true potential of wireless solutions lies in the inability of information and necessary data to pass seamlessly from one platform to another. In addition, the authors suggest ways to integrate data from wireless healthcare solutions with the existing electronic health records (EHR) systems, and discuss the impact of wireless enabled solutions on the meaningful use of EHRS.
APA, Harvard, Vancouver, ISO, and other styles
6

Triantafyllidis, A., V. Koutkias, I. Chouvarda, and N. Maglaveras. "An Open and Reconfigurable Wireless Sensor Network for Pervasive Health Monitoring." Methods of Information in Medicine 47, no. 03 (2008): 229–34. http://dx.doi.org/10.3414/me9115.

Full text
Abstract:
Summary Objectives: Sensor networks constitute the backbone for the construction of personalized monitoring systems. Up to now, several sensor networks have been proposed for diverse pervasive healthcare applications, which are however characterized by a significant lack of open architectures, resulting in closed, non-interoperable and difficult to extend solutions. In this context, we propose an open and reconfigurable wireless sensor network (WSN) for pervasive health monitoring, with particular emphasis in its easy extension with additional sensors and functionality by incorporating embedded intelligence mechanisms. Methods: We consider a generic WSN architecture comprised of diverse sensor nodes (with communication and processing capabilities) and a mobile base unit (MBU) operating as the gateway between the sensors and the medical personnel, formulating this way a body area network (BAN). The primary focus of this work is on the intra-BAN data communication issues, adopting SensorML as the data representation mean, including the encoding of the monitoring patterns and the functionality of the sensor network. Results: In our prototype implementation two sensor nodes are emulated; one for heart rate monitoring and the other for blood glucose observations, while the MBU corresponds to a personal digital assistant (PDA) device. Java 2 Micro Edition (J2ME) is used to implement both the sensor nodes and the MBU components. Intra-BAN wireless communication relies on the Bluetooth protocol. Via an adaptive user interface in the MBU, health professionals may specify the monitoring parameters of the WSN and define the monitoring patterns of interest in terms of rules. Conclusions: This work constitutes an essential step towards the construction of open, extensible, inter - operable and intelligent WSNs for pervasive health monitoring.
APA, Harvard, Vancouver, ISO, and other styles
7

Ros, Montserrat, Joshua Boom, Gavin de Hosson, and Matthew D'Souza. "Indoor Localisation Using a Context-Aware Dynamic Position Tracking Model." International Journal of Navigation and Observation 2012 (February 13, 2012): 1–12. http://dx.doi.org/10.1155/2012/293048.

Full text
Abstract:
Indoor wireless localisation is a widely sought feature for use in logistics, health, and social networking applications. Low-powered localisation will become important for the next generation of pervasive media applications that operate on mobile platforms. We present an inexpensive and robust context-aware tracking system that can track the position of users in an indoor environment, using a wireless smart meter network. Our context-aware tracking system combines wireless trilateration with a dynamic position tracking model and a probability density map to estimate indoor positions. The localisation network consisted of power meter nodes placed at known positions in a building. The power meter nodes are tracked by mobile nodes which are carried by users to localise their position. We conducted an extensive trial of the context-aware tracking system and performed a comparison analysis with existing localisation techniques. The context-aware tracking system was able to localise a person's indoor position with an average error of 1.21 m.
APA, Harvard, Vancouver, ISO, and other styles
8

Tiwari, Vivek, and Basant Tiwari. "A Data Driven Multi-Layer Framework of Pervasive Information Computing System for eHealthcare." International Journal of E-Health and Medical Communications 10, no. 4 (October 2019): 66–85. http://dx.doi.org/10.4018/ijehmc.2019100106.

Full text
Abstract:
In the last decade, significant advancements in telecommunications and informatics have seen which incredibly boost mobile communications, wireless networks, and pervasive computing. It enables healthcare applications to increase human livelihood. Furthermore, it seems feasible to continuous observation of patients and elderly individuals for their wellbeing. Such pervasive arrangements enable medical experts to analyse current patient status, minimise reaction time, increase livelihood, scalability, and availability. There is found plenty of remote patient monitoring model in literature, and most of them are designed with limited scope. Most of them are lacking to give an overall unified, complete model which talk about all state-of-the-art functionalities. In this regard, remote patient monitoring systems (RPMS's) play important roles through wearable devices to monitor the patient's physiological condition. RPMS also enables the capture of related videos, images, and frames. RPMS do not mean to enable only capturing various sorts of patient-related information, but it also must facilitate analytics, transformation, security, alerts, accessibility, etc. In this view, RPMS must ensure some broad issues like, wearability, adaptability, interoperability, integration, security, and network efficiency. This article proposes a data-driven multi-layer architecture for pervasively remote patient monitoring that incorporates these issues. The system has been classified into five fundamental layers: the data acquisition layer, the data pre-processing layer, the network and data transfer layer, the data management layer and the data accessing layer. It enables patient care at real-time using the network infrastructure efficiently. A detailed discussion on various security issues have been carried out. Moreover, standard deviation-based data reduction and a machine-learning-based data access policy is also proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Bangash, Javed Iqbal, Abdul Waheed Khan, Asfandyar Khan, Atif Khan, M. Irfan Uddin, and Qiaozhi Hua. "Multiconstraint-Aware Routing Mechanism for Wireless Body Sensor Networks." Journal of Healthcare Engineering 2021 (March 31, 2021): 1–15. http://dx.doi.org/10.1155/2021/5560809.

Full text
Abstract:
The merger of wireless sensor technologies, pervasive computing, and biomedical engineering has resulted in the emergence of wireless body sensor network (WBSN). WBSNs assist human beings in various monitoring applications such as health-care, entertainment, rehabilitation systems, and sports. Life-critical health-care applications of WBSNs consider both reliability and delay as major Quality of Service (QoS) parameters. In addition to the common limitations and challenges of wireless sensor networks (WSNs), WBSNs pose distinct constraints due to the behavior and chemistry of the human body. The biomedical sensor nodes (BMSNs) adopt multihop communication while reporting the heterogeneous natured physiological parameters to the nearby base station also called local coordinator. Routing in WBSNs becomes a challenging job due to the necessary QoS considerations, overheated in-body BMSNs, and high and dynamic path loss. To the best of our knowledge, none of the existing routing protocols integrate the aforementioned issues in their designs. In this research work, a multiconstraint-aware routing mechanism (modular-based) is proposed which considers the QoS parameters, dynamic and high path loss, and the overheated nodes issue. Two types of network frameworks, with and without relay/forwarder nodes, are being used. The data packets containing physiological parameters of the human body are categorized into delay-constrained, reliability-constrained, critical (both delay- and reliability-constrained), and nonconstrained data packets. NS-2 is being used to carry out the simulations of the proposed mechanism. The simulation results reveal that the proposed mechanism has improved the QoS-aware routing for WBSNs by adopting the proposed multiconstraint-aware strategy.
APA, Harvard, Vancouver, ISO, and other styles
10

Vasanthamani, Saranya. "A Study on Lifetime Enhancement and Reliability in Wearable Wireless Body Area Networks." International Journal of User-Driven Healthcare 8, no. 2 (July 2018): 46–59. http://dx.doi.org/10.4018/ijudh.2018070103.

Full text
Abstract:
The wireless body area network (WBAN) which consists of wearable or implantable sensor nodes, is a technology that enables pervasive observing and delivery of health related information and services. The radio-enabled implantable medical devices offer a revolutionary set of applications among which we can point to precision drug distribution, smart endoscope capsules, glucose level observers and eye pressure detecting systems. Devices with WBAN are generally battery powered due to sensitivity and criticality of the data carried and handled by WBAN, reliability becomes a critical issues. WBAN loads a high degree of reliability as it openly affects the quality of patient observing. Undetected life-threatening circumstances can lead to death. A main requirement is that the health care professionals receive the monitored data correctly in emergency situations. The major objective is to achieve a reliable network with minimum delay and maximum throughput while considering power consumption by reducing unnecessary communication.
APA, Harvard, Vancouver, ISO, and other styles
11

Kharbouch, Abdelhak, Youssef Naitmalek, Hamza Elkhoukhi, Mohamed Bakhouya, Vincenzo De Florio, Moulay Driss El Ouadghiri, Steven Latre, and Chris Blondia. "IoT and Big Data Technologies for Monitoring and Processing Real-Time Healthcare Data." International Journal of Distributed Systems and Technologies 10, no. 4 (October 2019): 17–30. http://dx.doi.org/10.4018/ijdst.2019100102.

Full text
Abstract:
Recent advances in pervasive technologies, such as wireless, ad hoc networks, and wearable sensor devices, allow the connection of everyday things to the Internet, commonly denoted as the Internet of Things (IoT). The IoT is seen as an enabler to the development of intelligent and context-aware services and applications. However, handling dynamic and frequent context changes is a difficult task without a real-time event/data acquisition and processing platform. Big data technologies and data analytics have been recently proposed for timely analyzing information (i.e., data, events) streams. The main aim is to make users' life more comfortable according to their locations, current requirements, and ongoing activities. In this article, combining IoT techniques and Big data technologies into a holistic platform for continuous and real-time health-care data monitoring and processing is introduced. Real-testing experiments have been conducted and results are reported to show the usefulness of this platform in a real-case scenario.
APA, Harvard, Vancouver, ISO, and other styles
12

Alías, Francesc, and Rosa Ma Alsina-Pagès. "Review of Wireless Acoustic Sensor Networks for Environmental Noise Monitoring in Smart Cities." Journal of Sensors 2019 (May 12, 2019): 1–13. http://dx.doi.org/10.1155/2019/7634860.

Full text
Abstract:
Nowadays, more than half of the world’s population lives in urban areas. Since this proportion is expected to keep rising, the sustainable development of cities is of paramount importance to guarantee the quality of life of their inhabitants. Environmental noise is one of the main concerns that has to be addressed, due to its negative impact on the health of people. Different national and international noise directives and legislations have been defined during the past decades, which local authorities must comply with involving noise mapping, action plans, policing, and public awareness, among others. To this aim, a recent change in the paradigm for environmental noise monitoring has been driven by the rise of Internet of Things technology within smart cities through the design and development of wireless acoustic sensor networks (WASNs). This work reviews the most relevant WASN-based approaches developed to date focused on environmental noise monitoring. The proposals have moved from networks composed of high-accuracy commercial devices to the those integrated by ad hoc low-cost acoustic sensors, sometimes designed as hybrid networks with low and high computational capacity nodes. After describing the main characteristics of recent WASN-based projects, the paper also discusses several open challenges, such as the development of acoustic signal processing techniques to identify noise events, to allow the reliable and pervasive deployment of WASNs in urban areas together with some potential future applications.
APA, Harvard, Vancouver, ISO, and other styles
13

Demertzis, Apostolos, and Konstantinos Oikonomou. "Average Load Definition in Random Wireless Sensor Networks: The Traffic Load Case." Technologies 6, no. 4 (November 28, 2018): 112. http://dx.doi.org/10.3390/technologies6040112.

Full text
Abstract:
Load is a key magnitude for studying network performance for large-scale wireless sensor networks that are expected to support pervasive applications like personalized health-care, smart city and smart home, etc., in assistive environments (e.g., those supported by the Internet of Things). In these environments, nodes are usually spread at random, since deliberate positioning is not a practical approach. Due to this randomness it is necessary to use average values for almost all networks’ magnitudes, load being no exception. However, a consistent definition for the average load is not obvious, since both nodal load and position are random variables. Current literature circumvents randomness by computing the average value over nodes that happen to fall within small areas. This approach is insufficient, because the area’s average is still a random variable and also it does not permit us to deal with single points. This paper proposes a definition for the area’s average load, based on the statistical expected value, whereas a point’s average load is seen as the load of an area that has been reduced (or contracted) to that point. These new definitions are applied in the case of traffic load in multi-hop networks. An interesting result shows that traffic load increases in steps. The simplest form of this result is the constant step, which results in an analytical expression for the traffic load case. A comparison with some real-world networks shows that most of them are accurately described by the constant step model.
APA, Harvard, Vancouver, ISO, and other styles
14

Zou, Yongjiu, Alberto Libanori, Jing Xu, Ardo Nashalian, and Jun Chen. "Triboelectric Nanogenerator Enabled Smart Shoes for Wearable Electricity Generation." Research 2020 (November 9, 2020): 1–20. http://dx.doi.org/10.34133/2020/7158953.

Full text
Abstract:
The parallel evolution of wearable electronics, artificial intelligence, and fifth-generation wireless technology has created a technological paradigm with the potential to change our lives profoundly. Despite this, addressing limitations linked to continuous, sustainable, and pervasive powering of wearable electronics remains a bottleneck to overcome in order to maximize the exponential benefit that these technologies can bring once synergized. A recent groundbreaking discovery has demonstrated that by using the coupling effect of contact electrification and electrostatic induction, triboelectric nanogenerators (TENGs) can efficiently convert irregular and low-frequency passive biomechanical energy from body movements into electrical energy, providing an infinite and sustainable power source for wearable electronics. A number of human motions have been exploited to properly and efficiently harness this energy potential, including human ambulation. Shoes are an indispensable component of daily wearing and can be leveraged as an excellent platform to exploit such kinetic energy. In this article, the latest representative achievements of TENG-based smart electricity-generating shoes are comprehensively reviewed. We summarize ways in which not only can biomechanical energy be scavenged via ambulatory motion, but also biomonitoring of health parameters via tracking of rhythm and strength of pace can be implemented to aid in theranostic fields. This work provides a systematical review of the rational structural design, practical applications, scenario analysis, and performance evaluation of TENG-based smart shoes for wearable electricity generation. In addition, the perspective for future development of smart electricity-generation shoes as a sustainable and pervasive energy solution towards the upcoming era of the Internet of Things is discussed.
APA, Harvard, Vancouver, ISO, and other styles
15

Abaza, Haitham, and Michael Marschollek. "mHealth Application Areas and Technology Combinations." Methods of Information in Medicine 56, S 01 (January 2017): e105-e122. http://dx.doi.org/10.3414/me17-05-0003.

Full text
Abstract:
SummaryBackground: With the continuous and enormous spread of mobile technologies, mHealth has evolved as a new subfield of eHealth. While eHealth is broadly focused on information and communication technologies, mHealth seeks to explore more into mobile devices and wireless communication. Since mobile phone penetration has exceeded other infrastructure in low and middle-income countries (LMICs), mHealth is seen as a promising component to provide pervasive and patient-centered care.Objectives: The aim of our research work for this paper is to examine the mHealth literature to identify application areas, target diseases, and mHealth service and technology types that are most appropriate for LMICs.Methods: Based on the 2011 WHO mHealth report, a combination of search terms, all including the word “mHealth”, was identified. A literature review was conducted by searching the PubMed and IEEE Xplore databases. Articles were included if they were published in English, covered an mHealth solution/intervention, involved the use of a mobile communication device, and included a pilot evaluation study. Articles were excluded if they did not provide sufficient detail on the solution covered or did not focus on clinical efficacy/effectiveness. Cross-referencing was also performed on included articles.Results: 842 articles were retrieved and analyzed, 255 of which met the inclusion criteria. North America had the highest number of applications (n=74) followed by Europe (n=50), Asia (n=44), Africa (n=25), and Australia (n=9). The Middle East (n=5) and South America (n=3) had the least number of studies. The majority of solutions addressed diabetes (n=51), obesity (n=25), CVDs (n=24), HIV (n=18), mental health (n=16), health behaviors (n=16), and maternal and child’s health (MCH) (n=11). Fewer solutions addressed asthma (n=7), cancer (n=5), family health planning (n=5), TB (n=3), malaria (n=2), chronic obtrusive pulmonary disease (COPD) (n=2), vision care (n=2), and dermatology (n=2). Other solutions targeted stroke, dental health, hepatitis vaccination, cold and flu, ED prescribed antibiotics, iodine deficiency, and liver transplantation (n=1 each). The remainder of solutions (n=14) did not focus on a certain disease. Most applications fell in the areas of health monitoring and surveillance (n=93) and health promotion and raising awareness (n=88). Fewer solutions addressed the areas of communication and reporting (n=11), data collection (n=6), tele-medicine (n=5), emergency medical care (n=3), point of care support (n=2), and decision support (n=2). The majority of solutions used SMS messaging (n=94) or mobile apps (n=71). Fewer used IVR/phone calls (n=8), mobile website/email (n=5), videoconferencing (n=2), MMS (n=2), or video (n=1) or voice messages (n=1). Studies were mostly RCTs, with the majority suffering from small sample sizes and short study durations. Problems addressed by solutions included travel distance for reporting, self-management and disease monitoring, and treatment/medication adherence.Conclusions: SMS and app solutions are the most common forms of mHealth applications. SMS solutions are prevalent in both high and LMICs while app solutions are mostly used in high income countries. Common application areas include health promotion and raising awareness using SMS and health monitoring and surveillance using mobile apps. Remaining application areas are rarely addressed. Diabetes is the most commonly targeted medical condition, yet remains deficient in LMICs.
APA, Harvard, Vancouver, ISO, and other styles
16

Sharif, Hamid, Michael Hempel, Thomas Bohnert, and Ali Khoynezhad. "Wireless communications for E-health applications [Guest Editorial]." IEEE Wireless Communications 20, no. 4 (August 2013): 10–11. http://dx.doi.org/10.1109/mwc.2013.6590045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

JN, Swaminathan, Gopi Ram, and Sureka Lanka. "Introduction to the Special Issue on Role of Scalable Computing and Data Analytics in Evolution of Internet of Things." Scalable Computing: Practice and Experience 21, no. 1 (March 19, 2020): 1–2. http://dx.doi.org/10.12694/scpe.v21i1.1576.

Full text
Abstract:
The evolution of Internet of Things has given way to a Smart World where there is an improved integration of devices, systems and processes in humans through all pervasive connectivity. Anytime, anywhere connection and transaction is the motto of the Internet of things which brings comfort to the users and sweeps the problem of physical boundary out of the way. Once it has come into the purview of developers, new areas have been identified and new applications have been introduced. Small wearables which can track your health to big automated vehicles which can move from one place to another self navigating without human intervention are the order of the day. This has also brought into existence a new technology called cloud, since with IoT comes a large number of devices connected to the internet continuously pumping data into the cloud for storage and processing. Another area benefited from the evolution of IoT is the wireless and wired connectivity through a wide range of connectivity standards. As with any technology, it has also created a lot of concerns regarding the security, privacy and ethics. Data protection issues created by new technologies are a threat which has been recognized by developers, public and also the governing body long back. The complexity of the system arises because of the various sensors and technologies which clearly tell the pattern of the activities of the individual as well an organization making us threat prone. Moreover, the volume of the data in the cloud makes it too difficult to recognize the privacy requirement of the data or to segregate open data from private data. Data analytics is another technology which supposedly increases the opportunity of increasing business by studying this private data collected from IoT and exploring ways to monetize them. It also helps the individual by recognizing their priorities and narrowing their search. But the data collected are real world data and aggregation of this data in the cloud is an open invitation to the hackers to study about the behaviors of the individuals. The special issues of Scalable Computing has attract related to the Role of Scalable Computing and Data Analytics in Evolution of Internet of Things has attracted 28 submissions from which were selected 12.
APA, Harvard, Vancouver, ISO, and other styles
18

Qian, Yi. "The Future of e-Health and Wireless Technologies." IEEE Wireless Communications 28, no. 3 (June 2021): 2–3. http://dx.doi.org/10.1109/mwc.2021.9490593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Бождай, Александр, Aleksandr Bozhday, Александр Бершадский, Aleksandr Bershadskiy, Вардан Мкртчан, and Vardan Mkrtchan. "Knowledge management methods in next-generation E/U Learning systems." Russian Journal of Management 3, no. 4 (August 31, 2015): 352–60. http://dx.doi.org/10.12737/13099.

Full text
Abstract:
The article discusses the methods of knowledge management for E/U-Learning systems, which will provide the opportunities for the construction of a unified all-pervasive electronic educational environment. Authors analyze the development of a new phase of e-learning (E-Learning 3.0) in which will play an important role distributed computer systems, cloud computing, mobile personal devices and wireless networks, artificial intelligence and virtual reality tools. Today, there is a fundamental scientific problem of creating a unified interstate intellectual environment for e-education services. This environment should include heterogeneous forms of knowledge representation, interstate standards and forms of learning, international faculty and student teams. The article suggests a possible knowledge management methods and the approach to the construction of an all-pervading intellectual environment for e-learning services. The proposed approach is based on the integration of multiple technologies, such as: service-oriented design, engineering of DSPL (Dynamic Software Product Lines), wireless telecommunications, interaction of intelligent e-learning agents. Structural basis of this approach is interconnected pair of intelligent software agents: student’s and teacher’s software agents. These agents are able to adapt itself: to the current level of student’s knowledge; to the available software, hardware and network equipment; to the current demands of the environment (e.g. labor markets); to the modern educational standards. As a basis of software agents self-adaptation is a mathematical variability model, including the three basic features hierarchy: educational content, interface, software and technical support. Application of such variability model does not require recompilation of the source code (to make changes in the agents properties) and allows to organize a continuous process of e-learning and significantly increase the life cycle of the entire system of distance learning. Moreover, the authors propose a service-oriented scheme for knowledge flows management. The article will be useful for experts in e-learning, developers of service-oriented systems and for managers in the field of socio-economic systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Sliwa, Jan. "Do We Need a Global Brain?" tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 11, no. 1 (December 12, 2012): 107–16. http://dx.doi.org/10.31269/triplec.v11i1.321.

Full text
Abstract:
The new trend of Pervasive Computing, based on massively deployed wireless sensor and actor networks, will enable gathering data about the world with an unprecedented accuracy and influencing it. Among many application fields, health support system will permit to measure and transmit the vital health parameters and to exert externally controlled actions on the human body. Such systems provide evident benefits, but also pose great new risks of misuse by totalitarian governments or criminals. Also “good” governments, in their effort to improve the lives of the citizens, may be tempted to rectify their conduct beyond their will and to enforce it with new means of total surveillance. This Global Brain, controlled by authorities advised by experts, too complex to be overseen by the general public, may lead to a revival of the Plato’s Rule of the Philosophers, a Brave New World where democracy is just an empty shell.
APA, Harvard, Vancouver, ISO, and other styles
21

Muka, Romina, Sule Yildrim-Yayilgan, and Kozeta Sevrani. "Security Analysis of Wireless BAN in e-Health." Spring 2017 5, no. 2 (May 1, 2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.

Full text
Abstract:
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a WBAN to safeguard patients from different exploits or malicious attacks, since e-Health technologies are increasingly connected to the Internet via wireless communications. In this paper we outline the most important security requirements for WBANs. Furthermore, we discuss key security threats to avoid. Finally, we conclude with a summary of security mechanisms to follow that address security and privacy concerns of WBANs, and need to be explored in an increasingly connected healthcare world.
APA, Harvard, Vancouver, ISO, and other styles
22

Naranjo-Hernández, David, Javier Reina-Tosina, and Laura M. Roa. "Special Issue “Body Sensors Networks for E-Health Applications”." Sensors 20, no. 14 (July 16, 2020): 3944. http://dx.doi.org/10.3390/s20143944.

Full text
Abstract:
Body Sensor Networks (BSN) have emerged as a particularization of Wireless Sensor Networks (WSN) in the context of body monitoring environments, closely linked to healthcare applications. These networks are made up of smart biomedical sensors that allow the monitoring of physiological parameters and serve as the basis for e-Health applications. This Special Issue collects some of the latest developments in the field of BSN related to new developments in biomedical sensor technologies, the design and experimental characterization of on-body/in-body antennas and new communication protocols for BSN, including some review studies.
APA, Harvard, Vancouver, ISO, and other styles
23

Nayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.

Full text
Abstract:
Internet of Things (IoT) is regarded as a next-generation wave of Information Technology (IT) after the widespread emergence of the Internet and mobile communication technologies. IoT supports information exchange and networked interaction of appliances, vehicles and other objects, making sensing and actuation possible in a low-cost and smart manner. On the other hand, cyber-physical systems (CPS) are described as the engineered systems which are built upon the tight integration of the cyber entities (e.g., computation, communication, and control) and the physical things (natural and man-made systems governed by the laws of physics). The IoT and CPS are not isolated technologies. Rather it can be said that IoT is the base or enabling technology for CPS and CPS is considered as the grownup development of IoT, completing the IoT notion and vision. Both are merged into closed-loop, providing mechanisms for conceptualizing, and realizing all aspects of the networked composed systems that are monitored and controlled by computing algorithms and are tightly coupled among users and the Internet. That is, the hardware and the software entities are intertwined, and they typically function on different time and location-based scales. In fact, the linking between the cyber and the physical world is enabled by IoT (through sensors and actuators). CPS that includes traditional embedded and control systems are supposed to be transformed by the evolving and innovative methodologies and engineering of IoT. Several applications areas of IoT and CPS are smart building, smart transport, automated vehicles, smart cities, smart grid, smart manufacturing, smart agriculture, smart healthcare, smart supply chain and logistics, etc. Though CPS and IoT have significant overlaps, they differ in terms of engineering aspects. Engineering IoT systems revolves around the uniquely identifiable and internet-connected devices and embedded systems; whereas engineering CPS requires a strong emphasis on the relationship between computation aspects (complex software) and the physical entities (hardware). Engineering CPS is challenging because there is no defined and fixed boundary and relationship between the cyber and physical worlds. In CPS, diverse constituent parts are composed and collaborated together to create unified systems with global behaviour. These systems need to be ensured in terms of dependability, safety, security, efficiency, and adherence to real‐time constraints. Hence, designing CPS requires knowledge of multidisciplinary areas such as sensing technologies, distributed systems, pervasive and ubiquitous computing, real-time computing, computer networking, control theory, signal processing, embedded systems, etc. CPS, along with the continuous evolving IoT, has posed several challenges. For example, the enormous amount of data collected from the physical things makes it difficult for Big Data management and analytics that includes data normalization, data aggregation, data mining, pattern extraction and information visualization. Similarly, the future IoT and CPS need standardized abstraction and architecture that will allow modular designing and engineering of IoT and CPS in global and synergetic applications. Another challenging concern of IoT and CPS is the security and reliability of the components and systems. Although IoT and CPS have attracted the attention of the research communities and several ideas and solutions are proposed, there are still huge possibilities for innovative propositions to make IoT and CPS vision successful. The major challenges and research scopes include system design and implementation, computing and communication, system architecture and integration, application-based implementations, fault tolerance, designing efficient algorithms and protocols, availability and reliability, security and privacy, energy-efficiency and sustainability, etc. It is our great privilege to present Volume 21, Issue 3 of Scalable Computing: Practice and Experience. We had received 30 research papers and out of which 14 papers are selected for publication. The objective of this special issue is to explore and report recent advances and disseminate state-of-the-art research related to IoT, CPS and the enabling and associated technologies. The special issue will present new dimensions of research to researchers and industry professionals with regard to IoT and CPS. Vivek Kumar Prasad and Madhuri D Bhavsar in the paper titled "Monitoring and Prediction of SLA for IoT based Cloud described the mechanisms for monitoring by using the concept of reinforcement learning and prediction of the cloud resources, which forms the critical parts of cloud expertise in support of controlling and evolution of the IT resources and has been implemented using LSTM. The proper utilization of the resources will generate revenues to the provider and also increases the trust factor of the provider of cloud services. For experimental analysis, four parameters have been used i.e. CPU utilization, disk read/write throughput and memory utilization. Kasture et al. in the paper titled "Comparative Study of Speaker Recognition Techniques in IoT Devices for Text Independent Negative Recognition" compared the performance of features which are used in state of art speaker recognition models and analyse variants of Mel frequency cepstrum coefficients (MFCC) predominantly used in feature extraction which can be further incorporated and used in various smart devices. Mahesh Kumar Singh and Om Prakash Rishi in the paper titled "Event Driven Recommendation System for E-Commerce using Knowledge based Collaborative Filtering Technique" proposed a novel system that uses a knowledge base generated from knowledge graph to identify the domain knowledge of users, items, and relationships among these, knowledge graph is a labelled multidimensional directed graph that represents the relationship among the users and the items. The proposed approach uses about 100 percent of users' participation in the form of activities during navigation of the web site. Thus, the system expects under the users' interest that is beneficial for both seller and buyer. The proposed system is compared with baseline methods in area of recommendation system using three parameters: precision, recall and NDGA through online and offline evaluation studies with user data and it is observed that proposed system is better as compared to other baseline systems. Benbrahim et al. in the paper titled "Deep Convolutional Neural Network with TensorFlow and Keras to Classify Skin Cancer" proposed a novel classification model to classify skin tumours in images using Deep Learning methodology and the proposed system was tested on HAM10000 dataset comprising of 10,015 dermatoscopic images and the results observed that the proposed system is accurate in order of 94.06\% in validation set and 93.93\% in the test set. Devi B et al. in the paper titled "Deadlock Free Resource Management Technique for IoT-Based Post Disaster Recovery Systems" proposed a new class of techniques that do not perform stringent testing before allocating the resources but still ensure that the system is deadlock-free and the overhead is also minimal. The proposed technique suggests reserving a portion of the resources to ensure no deadlock would occur. The correctness of the technique is proved in the form of theorems. The average turnaround time is approximately 18\% lower for the proposed technique over Banker's algorithm and also an optimal overhead of O(m). Deep et al. in the paper titled "Access Management of User and Cyber-Physical Device in DBAAS According to Indian IT Laws Using Blockchain" proposed a novel blockchain solution to track the activities of employees managing cloud. Employee authentication and authorization are managed through the blockchain server. User authentication related data is stored in blockchain. The proposed work assists cloud companies to have better control over their employee's activities, thus help in preventing insider attack on User and Cyber-Physical Devices. Sumit Kumar and Jaspreet Singh in paper titled "Internet of Vehicles (IoV) over VANETS: Smart and Secure Communication using IoT" highlighted a detailed description of Internet of Vehicles (IoV) with current applications, architectures, communication technologies, routing protocols and different issues. The researchers also elaborated research challenges and trade-off between security and privacy in area of IoV. Deore et al. in the paper titled "A New Approach for Navigation and Traffic Signs Indication Using Map Integrated Augmented Reality for Self-Driving Cars" proposed a new approach to supplement the technology used in self-driving cards for perception. The proposed approach uses Augmented Reality to create and augment artificial objects of navigational signs and traffic signals based on vehicles location to reality. This approach help navigate the vehicle even if the road infrastructure does not have very good sign indications and marking. The approach was tested locally by creating a local navigational system and a smartphone based augmented reality app. The approach performed better than the conventional method as the objects were clearer in the frame which made it each for the object detection to detect them. Bhardwaj et al. in the paper titled "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions" performed literature on IoV and Trust and proposed a Hybrid Trust model that seperates the malicious and trusted nodes to secure the interaction of vehicle in IoV. To test the model, simulation was conducted on varied threshold values. And results observed that PDR of trusted node is 0.63 which is higher as compared to PDR of malicious node which is 0.15. And on the basis of PDR, number of available hops and Trust Dynamics the malicious nodes are identified and discarded. Saniya Zahoor and Roohie Naaz Mir in the paper titled "A Parallelization Based Data Management Framework for Pervasive IoT Applications" highlighted the recent studies and related information in data management for pervasive IoT applications having limited resources. The paper also proposes a parallelization-based data management framework for resource-constrained pervasive applications of IoT. The comparison of the proposed framework is done with the sequential approach through simulations and empirical data analysis. The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach. Patel et al. in the paper titled "Performance Analysis of Video ON-Demand and Live Video Streaming Using Cloud Based Services" presented a review of video analysis over the LVS \& VoDS video application. The researchers compared different messaging brokers which helps to deliver each frame in a distributed pipeline to analyze the impact on two message brokers for video analysis to achieve LVS & VoS using AWS elemental services. In addition, the researchers also analysed the Kafka configuration parameter for reliability on full-service-mode. Saniya Zahoor and Roohie Naaz Mir in the paper titled "Design and Modeling of Resource-Constrained IoT Based Body Area Networks" presented the design and modeling of a resource-constrained BAN System and also discussed the various scenarios of BAN in context of resource constraints. The Researchers also proposed an Advanced Edge Clustering (AEC) approach to manage the resources such as energy, storage, and processing of BAN devices while performing real-time data capture of critical health parameters and detection of abnormal patterns. The comparison of the AEC approach is done with the Stable Election Protocol (SEP) through simulations and empirical data analysis. The results show an improvement in energy, processing time and storage requirements for the processing of data on BAN devices in AEC as compared to SEP. Neelam Saleem Khan and Mohammad Ahsan Chishti in the paper titled "Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review" outlined major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore, this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. In addition, the researchers discussed the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. The researchers also proposed Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area. Bhadwal et al. in the paper titled "A Machine Translation System from Hindi to Sanskrit Language Using Rule Based Approach" proposed a rule-based machine translation system to bridge the language barrier between Hindi and Sanskrit Language by converting any test in Hindi to Sanskrit. The results are produced in the form of two confusion matrices wherein a total of 50 random sentences and 100 tokens (Hindi words or phrases) were taken for system evaluation. The semantic evaluation of 100 tokens produce an accuracy of 94\% while the pragmatic analysis of 50 sentences produce an accuracy of around 86\%. Hence, the proposed system can be used to understand the whole translation process and can further be employed as a tool for learning as well as teaching. Further, this application can be embedded in local communication based assisting Internet of Things (IoT) devices like Alexa or Google Assistant. Anshu Kumar Dwivedi and A.K. Sharma in the paper titled "NEEF: A Novel Energy Efficient Fuzzy Logic Based Clustering Protocol for Wireless Sensor Network" proposed a a deterministic novel energy efficient fuzzy logic-based clustering protocol (NEEF) which considers primary and secondary factors in fuzzy logic system while selecting cluster heads. After selection of cluster heads, non-cluster head nodes use fuzzy logic for prudent selection of their cluster head for cluster formation. NEEF is simulated and compared with two recent state of the art protocols, namely SCHFTL and DFCR under two scenarios. Simulation results unveil better performance by balancing the load and improvement in terms of stability period, packets forwarded to the base station, improved average energy and extended lifetime.
APA, Harvard, Vancouver, ISO, and other styles
24

Trcek, D., and A. Brodnik. "Hard and soft security provisioning for computationally weak pervasive computing systems in E-health." IEEE Wireless Communications 20, no. 4 (August 2013): 22–29. http://dx.doi.org/10.1109/mwc.2013.6590047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Martínez, José F., Miguel S. Familiar, Iván Corredor, Ana B. García, Sury Bravo, and Lourdes López. "Composition and deployment of e-Health services over Wireless Sensor Networks." Mathematical and Computer Modelling 53, no. 3-4 (February 2011): 485–503. http://dx.doi.org/10.1016/j.mcm.2010.03.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Phunchongharn, P., D. Niyato, E. Hossain, and S. Camorlinga. "An EMI-Aware Prioritized Wireless Access Scheme for e-Health Applications in Hospital Environments." IEEE Transactions on Information Technology in Biomedicine 14, no. 5 (September 2010): 1247–58. http://dx.doi.org/10.1109/titb.2010.2047507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Bwalya, Kelvin Joseph, Rensleigh Chris, and Ndlovu Mandla. "Convergence of Wireless Technologies in Consolidating E-Government Applications in Sub-Saharan Africa." International Journal of ICT Research and Development in Africa 1, no. 4 (October 2010): 15–30. http://dx.doi.org/10.4018/978-1-60960-042-6.ch004.

Full text
Abstract:
The convergence of wireless applications presents a greater hope for consolidating e-Government (ICT-enabled or online government) applications even in resource-constrained countries such as those in Africa. This chapter presents an exploratory study that aims at discussing the extent as to how convergence of wireless technologies from different vendors promises to contribute to the consolidation of e-Government applications in Sub-Saharan-Africa (SSA). This is done by reviewing the different adoption stages of ICT and e-Government in SSA. It looks at challenges facing adoption of wireless technologies (GSMs, Wireless Internet Access, satellite transmission, etc.) across all the socio-economic value chains in SSA. The chapter looks at Botswana and South Africa as case studies by bringing out the different interventions that have been done in the realm of facilitating a conducive environment for the convergence of different wireless technologies. Out of the analysis of legal, regulatory, market and spectrum policies affecting the adoption of wireless communications in SSAs, the chapter draws out recommendations on how to consolidate wireless communications to be adopted in different socio-economic setups (e.g. e-government, e-Health, e-Banking, etc.).
APA, Harvard, Vancouver, ISO, and other styles
28

Rotariu, Cristian, Hariton Costin, Ioana Alexa, Gladiola Andruseac, Vasile Manta, and Bogdan Mustata. "E-Health System for Medical Telesurveillance of Chronic Patients." International Journal of Computers Communications & Control 5, no. 5 (December 1, 2010): 900. http://dx.doi.org/10.15837/ijccc.2010.5.2253.

Full text
Abstract:
The current common goal in medical information technology today is the design and implementation of telemedicine solutions, which provide to patients services that enhance their quality of life. Advances in wireless sensor network technology, the overall miniaturization of their associated hardware low-power integrated circuits and wireless communications have enabled the design of low-cost, miniature, and intelligent physiological sensor modules with applications in the medical industry. These modules are capable of measuring, processing, communicating one or more physiological parameters, and can be integrated into a wireless personal area network. This paper is dedicated to the most complex Romanian telemedical pilot project, TELEMON, which has as goals design and implementation of an electronic-informaticstelecommunications system, that allows the automatic and complex telemonitoring, everywhere and every time, in (almost) real time, of the vital signs of persons with chronic illnesses, of elderly people, of those having high medical risk and of those living in isolated regions. The final objective of this pilot project is to enable personalized medical teleservices delivery, and to act as a basis for a public service for telemedical procedures in Romania and abroad.
APA, Harvard, Vancouver, ISO, and other styles
29

Chandrasekaran, N., and A. Indira. "Economic Drivers of Technology Enabled Health Services." European Journal of Multidisciplinary Studies 6, no. 2 (June 10, 2017): 150. http://dx.doi.org/10.26417/ejms.v6i2.p150-157.

Full text
Abstract:
Technology is all pervasive today. Advancements in technology has been welcomed and applauded in the health care sector. Healthcare technologies involve both clinical as well as well as non clinical processes. The applications involve patient safety, disease surveillance, E-health records, and patient empowerment. There are now various firms which are building health applications to further help the patients, care-givers and doctors. The global economy has however seen a change in the aftermath of 2008. The downturn experienced seemed to continue well into 2017. There however seems to be a spirited feeling that the economy is on the up and better prospects are forecasted for 2018. In this background, this paper looks at the various economic factors that impact technology enabled health services.
APA, Harvard, Vancouver, ISO, and other styles
30

Algaet, Mustafa Almahdi, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah, Ali Ahmad Milad, and Aouache Mustapha. "Provisioning Quality of Service of Wireless Telemedicine for E-Health Services: A Review." Wireless Personal Communications 78, no. 1 (April 10, 2014): 375–406. http://dx.doi.org/10.1007/s11277-014-1758-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Castillejo, P., J.-F. Martinez, J. Rodriguez-Molina, and A. Cuerva. "Integration of wearable devices in a wireless sensor network for an E-health application." IEEE Wireless Communications 20, no. 4 (August 2013): 38–49. http://dx.doi.org/10.1109/mwc.2013.6590049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Benharref, Abdelghani, and Mohamed Adel Serhani. "Novel Cloud and SOA-Based Framework for E-Health Monitoring Using Wireless Biosensors." IEEE Journal of Biomedical and Health Informatics 18, no. 1 (January 2014): 46–55. http://dx.doi.org/10.1109/jbhi.2013.2262659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, Youngbum, and Myoungho Lee. "Accelerometer Sensor Module and Fall Detection Monitoring System Based on Wireless Sensor Network for e-Health Applications." Telemedicine and e-Health 14, no. 6 (August 2008): 587–92. http://dx.doi.org/10.1089/tmj.2007.0097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lv, Yunxin, Maluge Pubuduni Imali Dias, Lihua Ruan, Elaine Wong, Ye Feng, Ning Jiang, and Kun Qiu. "Request-Based Polling Access: Investigation of Novel Wireless LAN MAC Scheme for Low-Latency E-Health Applications." IEEE Communications Letters 23, no. 5 (May 2019): 896–99. http://dx.doi.org/10.1109/lcomm.2019.2903801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Khosravi, Mohammad R. "Signals and Network Applications for Medical Informatics, Wireless Body Area Systems and Remotely-Sensed E-Health Monitoring." Current Signal Transduction Therapy 16, no. 1 (June 10, 2021): 2. http://dx.doi.org/10.2174/157436241601210505090706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Niyato, D., E. Hossain, and J. Diamond. "IEEE 802.16/WiMAX-based broadband wireless access and its application for telemedicine/e-health services." IEEE Wireless Communications 14, no. 1 (February 2007): 72–83. http://dx.doi.org/10.1109/mwc.2007.314553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Rezaei, Fahimeh, Michael Hempel, and Hamid Sharif. "A Survey of Recent Trends in Wireless Communication Standards, Routing Protocols, and Energy Harvesting Techniques in E-Health Applications." International Journal of E-Health and Medical Communications 6, no. 1 (January 2015): 1–21. http://dx.doi.org/10.4018/ijehmc.2015010101.

Full text
Abstract:
One of the most rapidly growing technology areas is the advances in sensing, networking, and miniaturization in medical domain, which enables innovative new applications. This is especially apparent in e-Health and telemedicine. There is an enormous demand for innovation in wireless sensor networking, body area networks, network security and routing, and many other areas, attracting the attention of numerous researchers. With all the advances it can be challenging to identify trends and areas with opportunities for research engagement. In this paper, the authors therefore review the state-of-the-art in wireless communication used in telemedicine and e-Health applications – ranging from the Wide Area Networks to Body Area Networks – and discuss the studies and literature that employ these technologies for e-Health applications. Moreover, recent routing protocols and techniques that are used for Body Area Networks are investigated. One key challenge for e-Health applications, particularly for mobile or patient-worn devices, is energy consumption and supply. One possible solution is found in energy harvesting, and our survey encompasses current challenges and accomplishments in its application to e-Health and discuss various promising techniques.
APA, Harvard, Vancouver, ISO, and other styles
38

Jones, Valerie M., Hermie J. Hermens, and Nick L. S. Fung. "The MADE Reference Information Model for Interoperable Pervasive Telemedicine Systems." Methods of Information in Medicine 56, no. 02 (2017): 180–87. http://dx.doi.org/10.3414/me15-02-0013.

Full text
Abstract:
SummaryObjectives: The main objective is to develop and validate a reference information model (RIM) to support semantic interoperability of pervasive telemedicine systems. The RIM is one component within a larger, computer-interpretable "MADE language" developed by the authors in the context of the MobiGuide project. To validate our RIM, we applied it to a clinical guideline for patients with gestational diabetes mellitus (GDM).Methods: The RIM is derived from a generic data flow model of disease management which comprises a network of four types of concurrent processes: Monitoring (M), Analysis (A), Decision (D) and Effectuation (E). This resulting MADE RIM, which was specified using the formal Vienna Development Method (VDM), includes six main, high-level data types representing measurements, observations, abstractions, action plans, action instructions and control instructions.Results: The authors applied the MADE RIM to the complete GDM guideline and derived from it a domain information model (DIM) comprising 61 archetypes, specifically 1 measurement, 8 observation, 10 abstraction, 18 action plan, 3 action instruction and 21 control instruction archetypes. It was observed that there are six generic patterns for transforming different guideline elements into MADE archetypes, although a direct mapping does not exist in some cases. Most notable examples are notifications to the patient and/or clinician as well as decision conditions which pertain to specific stages in the therapy.Conclusions: The results provide evidence that the MADE RIM is suitable for modelling clinical data in the design of pervasive tele-medicine systems. Together with the other components of the MADE language, the MADE RIM supports development of pervasive telemedicine systems that are interoperable and independent of particular clinical applications.
APA, Harvard, Vancouver, ISO, and other styles
39

Suriyakrishnaan, K., and D. Sridharan. "Reliable Packet Delivery in Wireless Body Area Networks Using TCDMA Algorithm for e-Health Monitoring system." Wireless Personal Communications 103, no. 4 (September 26, 2018): 3127–44. http://dx.doi.org/10.1007/s11277-018-5998-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bin Liu, Zhisheng Yan, and Chang Wen Chen. "MAC protocol in wireless body area networks for E-health: challenges and a context-aware design." IEEE Wireless Communications 20, no. 4 (August 2013): 64–72. http://dx.doi.org/10.1109/mwc.2013.6590052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Tan, Joseph, H. Joseph Wen, and Tibor Gyires. "M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions." International Journal of Mobile Communications 1, no. 4 (2003): 409. http://dx.doi.org/10.1504/ijmc.2003.003994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bradai, Nourchene, Lamia Chaari, and Lotfi Kamoun. "A Comprehensive Overview of Wireless Body Area Networks (WBAN)." International Journal of E-Health and Medical Communications 2, no. 3 (July 2011): 1–30. http://dx.doi.org/10.4018/jehmc.2011070101.

Full text
Abstract:
In recent years, the wireless body area network (WBAN) has emerged as a new technology for e-healthcare applications. The WBANs promise to revolutionize health monitoring. However, this technology remains in the first stages and much research is underway. Designers of such systems face a number of challenging tasks, as they need to address conflicting requirements. This includes managing the network, the data, while maximizing the autonomy of each network node. Reducing the consumption of a node, the management of network resources and security insurance are therefore major challenges. This paper presents a survey of body area networks including the WBANs challenges and -architecture, the most important body sensor devices, as well as sensor board hardware and platforms. Further, various applications of WBANs in the medical field are discussed, as well as wireless communications standards and technologies. The newest researches related to WBANs at physical and MAC layers are presented. Finally the paper identifies data security and privacy in WBANs as well as open research issues.
APA, Harvard, Vancouver, ISO, and other styles
43

Bjelica, Daniel, Artur Bjelica, Marijana Despotović-Zrakić, Božidar Radenković, Dušan Barać, and Marko Đogatović. "Designing an IT Ecosystem for Pregnancy Care Management Based on Pervasive Technologies." Healthcare 9, no. 1 (December 24, 2020): 12. http://dx.doi.org/10.3390/healthcare9010012.

Full text
Abstract:
Pregnancy care is a topic of interest for both academia and practitioners. Novel pervasive technologies and applications, such as mobile technologies, wearables and IoT, open a wide corpus of possibilities for fostering pregnancy care management, and reducing risks and problems, improving communication among stakeholders and society development. This article introduces a model of a pregnancy care IT ecosystem based on the integration of various services in a semantically enriched e-health ecosystem. As proof of concept, both the web and mobile applications that aim to help pregnant women and gynaecologists were designed and employed in a real environment. An evaluation of the developed ecosystem was performed on a sample of 500 pregnant women and 100 doctors. After pilot usage, a survey was used to collect the data from participants, and assess the acceptance of the developed system. Results show that quality, usability and usefulness are on a high level, and that both pregnant women and doctors are ready for more extensive use of the system. In addition, research findings imply that employing pervasive technologies could bring significant benefits to all the parties in pregnancy care systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Bommasani, Lahari Vyshnavi, Erukala Suresh Babu, and Sasank Aluri. "A novel semantic medical access monitoring system for e-health applications using internet of medical things." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 265. http://dx.doi.org/10.14419/ijet.v7i1.1.9483.

Full text
Abstract:
Internet of things can connect various smart devices together by using Internet. It also provides data interoperability methods for application purpose. We have proposed an IOT -based framework for emergency medical services to show how to collect, integrate, and interoperate IOT data flexibly and also to support medical emergency services. By the development of IOT technologies, we can use medical sensors to monitor patient’s health even without the presence of doctor. We came up with a outline of Semantic Medical Monitoring Framework with the help of cloud based IOT techniques. IOT health sensors will accept the massive data from the patient for every 6sec. All these data will be stored in the cloud and medical data will be connected to a medical rule engine through a web service called “THINK SPEAK”. It also permits supervision of patient by remote centers and personal platforms such as mobiles, tablets. Regarding Hardware it provides a gateway and personal clinical devices used for continuous wireless transmission of monitored data of the patient.
APA, Harvard, Vancouver, ISO, and other styles
45

Nayyar, Anand, Rudra Rameshwar, and Piyush Kanti Dutta. "Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies." Scalable Computing: Practice and Experience 20, no. 2 (May 2, 2019): iii—vi. http://dx.doi.org/10.12694/scpe.v20i2.1558.

Full text
Abstract:
Recent Trends and Future of Fog and Edge Computing, Services, and Enabling Technologies Cloud computing has been established as the most popular as well as suitable computing infrastructure providing on-demand, scalable and pay-as-you-go computing resources and services for the state-of-the-art ICT applications which generate a massive amount of data. Though Cloud is certainly the most fitting solution for most of the applications with respect to processing capability and storage, it may not be so for the real-time applications. The main problem with Cloud is the latency as the Cloud data centres typically are very far from the data sources as well as the data consumers. This latency is ok with the application domains such as enterprise or web applications, but not for the modern Internet of Things (IoT)-based pervasive and ubiquitous application domains such as autonomous vehicle, smart and pervasive healthcare, real-time traffic monitoring, unmanned aerial vehicles, smart building, smart city, smart manufacturing, cognitive IoT, and so on. The prerequisite for these types of application is that the latency between the data generation and consumption should be minimal. For that, the generated data need to be processed locally, instead of sending to the Cloud. This approach is known as Edge computing where the data processing is done at the network edge in the edge devices such as set-top boxes, access points, routers, switches, base stations etc. which are typically located at the edge of the network. These devices are increasingly being incorporated with significant computing and storage capacity to cater to the need for local Big Data processing. The enabling of Edge computing can be attributed to the Emerging network technologies, such as 4G and cognitive radios, high-speed wireless networks, and energy-efficient sophisticated sensors. Different Edge computing architectures are proposed (e.g., Fog computing, mobile edge computing (MEC), cloudlets, etc.). All of these enable the IoT and sensor data to be processed closer to the data sources. But, among them, Fog computing, a Cisco initiative, has attracted the most attention of people from both academia and corporate and has been emerged as a new computing-infrastructural paradigm in recent years. Though Fog computing has been proposed as a different computing architecture than Cloud, it is not meant to replace the Cloud. Rather, Fog computing extends the Cloud services to network edges for providing computation, networking, and storage services between end devices and data centres. Ideally, Fog nodes (edge devices) are supposed to pre-process the data, serve the need of the associated applications preliminarily, and forward the data to the Cloud if the data are needed to be stored and analysed further. Fog computing enhances the benefits from smart devices operational not only in network perimeter but also under cloud servers. Fog-enabled services can be deployed anywhere in the network, and with these services provisioning and management, huge potential can be visualized to enhance intelligence within computing networks to realize context-awareness, high response time, and network traffic offloading. Several possibilities of Fog computing are already established. For example, sustainable smart cities, smart grid, smart logistics, environment monitoring, video surveillance, etc. To design and implementation of Fog computing systems, various challenges concerning system design and implementation, computing and communication, system architecture and integration, application-based implementations, fault tolerance, designing efficient algorithms and protocols, availability and reliability, security and privacy, energy-efficiency and sustainability, etc. are needed to be addressed. Also, to make Fog compatible with Cloud several factors such as Fog and Cloud system integration, service collaboration between Fog and Cloud, workload balance between Fog and Cloud, and so on need to be taken care of. It is our great privilege to present before you Volume 20, Issue 2 of the Scalable Computing: Practice and Experience. We had received 20 Research Papers and out of which 14 Papers are selected for Publication. The aim of this special issue is to highlight Recent Trends and Future of Fog and Edge Computing, Services and Enabling technologies. The special issue will present new dimensions of research to researchers and industry professionals with regard to Fog Computing, Cloud Computing and Edge Computing. Sujata Dash et al. contributed a paper titled “Edge and Fog Computing in Healthcare- A Review” in which an in-depth review of fog and mist computing in the area of health care informatics is analysed, classified and discussed. The review presented in this paper is primarily focussed on three main aspects: The requirements of IoT based healthcare model and the description of services provided by fog computing to address then. The architecture of an IoT based health care system embedding fog computing layer and implementation of fog computing layer services along with performance and advantages. In addition to this, the researchers have highlighted the trade-off when allocating computational task to the level of network and also elaborated various challenges and security issues of fog and edge computing related to healthcare applications. Parminder Singh et al. in the paper titled “Triangulation Resource Provisioning for Web Applications in Cloud Computing: A Profit-Aware” proposed a novel triangulation resource provisioning (TRP) technique with a profit-aware surplus VM selection policy to ensure fair resource utilization in hourly billing cycle while giving the quality of service to end-users. The proposed technique use time series workload forecasting, CPU utilization and response time in the analysis phase. The proposed technique is tested using CloudSim simulator and R language is used to implement prediction model on ClarkNet weblog. The proposed approach is compared with two baseline approaches i.e. Cost-aware (LRM) and (ARMA). The response time, CPU utilization and predicted request are applied in the analysis and planning phase for scaling decisions. The profit-aware surplus VM selection policy used in the execution phase for select the appropriate VM for scale-down. The result shows that the proposed model for web applications provides fair utilization of resources with minimum cost, thus provides maximum profit to application provider and QoE to the end users. Akshi kumar and Abhilasha Sharma in the paper titled “Ontology driven Social Big Data Analytics for Fog enabled Sentic-Social Governance” utilized a semantic knowledge model for investigating public opinion towards adaption of fog enabled services for governance and comprehending the significance of two s-components (sentic and social) in aforesaid structure that specifically visualize fog enabled Sentic-Social Governance. The results using conventional TF-IDF (Term Frequency-Inverse Document Frequency) feature extraction are empirically compared with ontology driven TF-IDF feature extraction to find the best opinion mining model with optimal accuracy. The results concluded that implementation of ontology driven opinion mining for feature extraction in polarity classification outperforms the traditional TF-IDF method validated over baseline supervised learning algorithms with an average of 7.3% improvement in accuracy and approximately 38% reduction in features has been reported. Avinash Kaur and Pooja Gupta in the paper titled “Hybrid Balanced Task Clustering Algorithm for Scientific workflows in Cloud Computing” proposed novel hybrid balanced task clustering algorithm using the parameter of impact factor of workflows along with the structure of workflow and using this technique, tasks can be considered for clustering either vertically or horizontally based on value of impact factor. The testing of the algorithm proposed is done on Workflowsim- an extension of CloudSim and DAG model of workflow was executed. The Algorithm was tested on variables- Execution time of workflow and Performance Gain and compared with four clustering methods: Horizontal Runtime Balancing (HRB), Horizontal Clustering (HC), Horizontal Distance Balancing (HDB) and Horizontal Impact Factor Balancing (HIFB) and results stated that proposed algorithm is almost 5-10% better in makespan time of workflow depending on the workflow used. Pijush Kanti Dutta Pramanik et al. in the paper titled “Green and Sustainable High-Performance Computing with Smartphone Crowd Computing: Benefits, Enablers and Challenges” presented a comprehensive statistical survey of the various commercial CPUs, GPUs, SoCs for smartphones confirming the capability of the SCC as an alternative to HPC. An exhaustive survey is presented on the present and optimistic future of the continuous improvement and research on different aspects of smartphone battery and other alternative power sources which will allow users to use their smartphones for SCC without worrying about the battery running out. Dhanapal and P. Nithyanandam in the paper titled “The Slow HTTP Distributed Denial of Service (DDOS) Attack Detection in Cloud” proposed a novel method to detect slow HTTP DDoS attacks in cloud to overcome the issue of consuming all available server resources and making it unavailable to the real users. The proposed method is implemented using OpenStack cloud platform with slowHTTPTest tool. The results stated that proposed technique detects the attack in efficient manner. Mandeep Kaur and Rajni Mohana in the paper titled “Static Load Balancing Technique for Geographically partitioned Public Cloud” proposed a novel approach focused upon load balancing in the partitioned public cloud by combining centralized and decentralized approaches, assuming the presence of fog layer. A load balancer entity is used for decentralized load balancing at partitions and a controller entity is used for centralized level to balance the overall load at various partitions. Results are compared with First Come First Serve (FCFS) and Shortest Job First (SJF) algorithms. In this work, the researchers compared the Waiting Time, Finish Time and Actual Run Time of tasks using these algorithms. To reduce the number of unhandled jobs, a new load state is introduced which checks load beyond conventional load states. Major objective of this approach is to reduce the need of runtime virtual machine migration and to reduce the wastage of resources, which may be occurring due to predefined values of threshold. Mukta and Neeraj Gupta in the paper titled “Analytical Available Bandwidth Estimation in Wireless Ad-Hoc Networks considering Mobility in 3-Dimensional Space” proposes an analytical approach named Analytical Available Bandwidth Estimation Including Mobility (AABWM) to estimate ABW on a link. The major contributions of the proposed work are: i) it uses mathematical models based on renewal theory to calculate the collision probability of data packets which makes the process simple and accurate, ii) consideration of mobility under 3-D space to predict the link failure and provides an accurate admission control. To test the proposed technique, the researcher used NS-2 simulator to compare the proposed technique i.e. AABWM with AODV, ABE, IAB and IBEM on throughput, Packet loss ratio and Data delivery. Results stated that AABWM performs better as compared to other approaches. R.Sridharan and S. Domnic in the paper titled “Placement Strategy for Intercommunicating Tasks of an Elastic Request in Fog-Cloud Environment” proposed a novel heuristic IcAPER,(Inter-communication Aware Placement for Elastic Requests) algorithm. The proposed algorithm uses the network neighborhood machine for placement, once current resource is fully utilized by the application. The performance IcAPER algorithm is compared with First Come First Serve (FCFS), Random and First Fit Decreasing (FFD) algorithms for the parameters (a) resource utilization (b) resource fragmentation and (c) Number of requests having intercommunicating tasks placed on to same PM using CloudSim simulator. Simulation results shows IcAPER maps 34% more tasks on to the same PM and also increase the resource utilization by 13% while decreasing the resource fragmentation by 37.8% when compared to other algorithms. Velliangiri S. et al. in the paper titled “Trust factor based key distribution protocol in Hybrid Cloud Environment” proposed a novel security protocol comprising of two stages: first stage, Group Creation using the trust factor and develop key distribution security protocol. It performs the communication process among the virtual machine communication nodes. Creating several groups based on the cluster and trust factors methods. The second stage, the ECC (Elliptic Curve Cryptography) based distribution security protocol is developed. The performance of the Trust Factor Based Key Distribution protocol is compared with the existing ECC and Diffie Hellman key exchange technique. The results state that the proposed security protocol has more secure communication and better resource utilization than the ECC and Diffie Hellman key exchange technique in the Hybrid cloud. Vivek kumar prasad et al. in the paper titled “Influence of Monitoring: Fog and Edge Computing” discussed various techniques involved for monitoring for edge and fog computing and its advantages in addition to a case study based on Healthcare monitoring system. Avinash Kaur et al. elaborated a comprehensive view of existing data placement schemes proposed in literature for cloud computing. Further, it classified data placement schemes based on their assess capabilities and objectives and in addition to this comparison of data placement schemes. Parminder Singh et al. presented a comprehensive review of Auto-Scaling techniques of web applications in cloud computing. The complete taxonomy of the reviewed articles is done on varied parameters like auto-scaling, approach, resources, monitoring tool, experiment, workload and metric, etc. Simar Preet Singh et al. in the paper titled “Dynamic Task Scheduling using Balanced VM Allocation Policy for Fog Computing Platform” proposed a novel scheme to improve the user contentment by improving the cost to operation length ratio, reducing the customer churn, and boosting the operational revenue. The proposed scheme is learnt to reduce the queue size by effectively allocating the resources, which resulted in the form of quicker completion of user workflows. The proposed method results are evaluated against the state-of-the-art scene with non-power aware based task scheduling mechanism. The results were analyzed using parameters-- energy, SLA infringement and workflow execution delay. The performance of the proposed schema was analyzed in various experiments particularly designed to analyze various aspects for workflow processing on given fog resources. The LRR (35.85 kWh) model has been found most efficient on the basis of average energy consumption in comparison to the LR (34.86 kWh), THR (41.97 kWh), MAD (45.73 kWh) and IQR (47.87 kWh). The LRR model has been also observed as the leader when compared on the basis of number of VM migrations. The LRR (2520 VMs) has been observed as best contender on the basis of mean of number of VM migrations in comparison with LR (2555 VMs), THR (4769 VMs), MAD (5138 VMs) and IQR (5352 VMs).
APA, Harvard, Vancouver, ISO, and other styles
46

Hussain, Aamir, Tariq Ali, Faisal Althobiani, Umar Draz, Muhammad Irfan, Sana Yasin, Saher Shafiq, et al. "Security Framework for IoT Based Real-Time Health Applications." Electronics 10, no. 6 (March 18, 2021): 719. http://dx.doi.org/10.3390/electronics10060719.

Full text
Abstract:
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
APA, Harvard, Vancouver, ISO, and other styles
47

Zaman, Sojib Bin, Naznin Hossain, Shad Ahammed, and Zubair Ahmed. "Contexts and Opportunities of e-Health Technology in Medical Care." Journal of Medical Research and Innovation 1, no. 2 (May 1, 2017): AV1—AV4. http://dx.doi.org/10.15419/jmri.62.

Full text
Abstract:
Keeping up with a sound health is a fundamental right for the human beings. It also acts as an indicator of the socio-economic development of a country. However, nowadays keeping sound health is challenging because of rapidly increasing non-communicable diseases. Concurrently, we are on the edge of very fast technological advancement which includes usage of cellular technology, high-speed internet and wireless communications. These technologies and their unique applications are creating lots of new dimensions in health care system which is known as e-Health. The medical call centers, emergency toll-free telephone services are being used in all over the world. The newly developed electronic health system can play a vital role in the remote regions of emerging and developing countries although sometimes it seems difficult due to the lack of communication infrastructure. E-Health can be a promising aspect for providing public health benefits if it integrates with the conventional medical system. More strategic approaches are necessary for the planning, development, and evaluation of e-Health. This article is written to depict the existing and future opportunities of e-Health in health support system.
APA, Harvard, Vancouver, ISO, and other styles
48

S. Rubí, Jesús N., and Paulo R. L. Gondim. "IoMT Platform for Pervasive Healthcare Data Aggregation, Processing, and Sharing Based on OneM2M and OpenEHR." Sensors 19, no. 19 (October 3, 2019): 4283. http://dx.doi.org/10.3390/s19194283.

Full text
Abstract:
Pervasive healthcare services have undergone a great evolution in recent years. The technological development of communication networks, including the Internet, sensor networks, and M2M (Machine-to-Machine) have given rise to new architectures, applications, and standards related to addressing almost all current e-health challenges. Among the standards, the importance of OpenEHR has been recognized, since it enables the separation of medical semantics from data representation of electronic health records. However, it does not meet the requirements related to interoperability of e-health devices in M2M networks, or in the Internet of Things (IoT) scenarios. Moreover, the lack of interoperability hampers the application of new data-processing techniques, such as data mining and online analytical processing, due to the heterogeneity of the data and the sources. This article proposes an Internet of Medical Things (IoMT) platform for pervasive healthcare that ensures interoperability, quality of the detection process, and scalability in an M2M-based architecture, and provides functionalities for the processing of high volumes of data, knowledge extraction, and common healthcare services. The platform uses the semantics described in OpenEHR for both data quality evaluation and standardization of healthcare data stored by the association of IoMT devices and observations defined in OpenEHR. Moreover, it enables the application of big data techniques and online analytic processing (OLAP) through Hadoop Map/Reduce and content-sharing through fast healthcare interoperability resource (FHIR) application programming interfaces (APIs).
APA, Harvard, Vancouver, ISO, and other styles
49

G. Lopes, Ana Paula, and Paulo R. L. Gondim. "Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System." Sensors 20, no. 7 (April 7, 2020): 2072. http://dx.doi.org/10.3390/s20072072.

Full text
Abstract:
The development of the Internet of Things (IoT) predicts several new applications, some of which are designed to be incorporated into e-health systems, and some technologies, like cloud computing and device-to-device communication (D2D), are promising for use in the support of resource-constrained devices employed in Mobile-health (m-health) and Telecare Medicine Information Systems (TMIS). In a scenario with billions of devices predicted for the IoT, it is essential to avoid performance and security problems, among others. Security is fundamental for the achievement of optimal performance regarding the sensibility of e-health shared data and, especially, the anonymity of patients and other entities, while it is also essential to consider the scarcity of bandwidth in wireless networks. This paper proposes a new mutual authentication protocol for m-health systems, which supports D2D communication, ensuring security and surpassing the performance and security of other authentication procedures reported in the literature.
APA, Harvard, Vancouver, ISO, and other styles
50

Sapci, A. Hasan, and H. Aylin Sapci. "Digital continuous healthcare and disruptive medical technologies: m-Health and telemedicine skills training for data-driven healthcare." Journal of Telemedicine and Telecare 25, no. 10 (August 22, 2018): 623–35. http://dx.doi.org/10.1177/1357633x18793293.

Full text
Abstract:
Introduction Disruptive medical technologies, wearable devices and new diagnostic solutions have been shaping the future of healthcare, and the health informatics skills gap has become a major problem for technology-centric healthcare applications. This study evaluated the relationships between a specific practical skills training method and students' confidence in using wireless monitoring devices along with the attitude towards technology adoption. Methods Six practical exercises were developed to provide health informatics technical skills to transfer medical information and display multi-channel biological signals. Two hundred and six undergraduate nursing students received a telemedicine and homecare training course. Their familiarity with various data formats and likelihood to recommend telemedicine and remote monitoring applications were measured. Results The skills training session changed students' attitudes towards remote patient monitoring, and the majority of students provided positive feedback about their confidence in using wireless monitoring devices after the training session. Students stated their plans to use the technology when they start practising and to educate their patients to promote the use of telemedicine. Conclusion We propose a skills training framework that covers (a) telemedicine, (b) m-Health and connected health, (c) health informatics application development, (d) health informatics device innovation, and (e) data science.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography