10 research outputs found

    Sensors data collection framework using mobile identification with secure data sharing model

    Get PDF
    Sensors are the modules or electronic devices that are used to measure and get environmental events and send the captured data to other devices, usually computer processors allocated on the cloud. One of the most recent challenges is to protect and save the privacy issues of those sensors data on the cloud sharing. In this paper, sensors data collection framework is proposed using mobile identification and proxy re-encryption model for data sharing. The proposed framework includes: identity broker server, sensors managing and monitoring applications, messages queuing sever and data repository server. Finally, the experimental results show that the proposed proxy re-encryption model can work in real time

    Wireless body area network mobility-aware task offloading scheme

    Get PDF
    The increasing amount of user equipment (UE) and the rapid advances in wireless body area networks bring revolutionary changes in healthcare systems. However, due to the strict requirements on size, reliability and battery lifetime of UE devices, it is difficult for them to execute latency sensitive or computation intensive tasks effectively. In this paper, we aim to enhance the UE computation capacity by utilizing small size coordinator-based mobile edge computing (C-MEC) servers. In this way, the system complexity, computation resources, and energy consumption are considerably transferred from the UE to the C-MEC, which is a practical approach since C-MEC is power charged, in contrast to the UE. First, the system architecture and the mobility model are presented. Second, several transmission mechanisms are analyzed along with the proposed mobility-aware cooperative task offloading scheme. Numerous selected performance metrics are investigated regarding the number of executed tasks, the percentage of failed tasks, average service time, and the energy consumption of each MEC. The results validate the advantage of task offloading schemes compared with the traditional relay-based technique regarding the number of executed tasks. Moreover, one can obtain that the proposed scheme archives noteworthy benefits, such as low latency and efficiently balance the energy consumption of C-MECs

    SOFTWARE LIBRE APLICADO A LA TELEMEDICINA PARA ACTUALIZACIÓN DE INFORMACIÓN MEDICA EN UNA PLATAFORMA DE ALMACENAMIENTO DE DATOS EN LÍNEA

    Get PDF
    Los rápidos avances de la medicina y sus tecnologías generan gran cantidad de información necesaria que requiere ser almacenada y procesada, en conjunto con acceso interactivo de estos datos para facilitarle al personal médico poder hacer una valoración acertada a sus pacientes. Por consiguiente, se ha desarrollado una plataforma virtual en donde se lleve de forma interactiva el historial clínico de los pacientes de cada profesional de la salud en conjunto con una actualización y es que dicho sistema puede cargar señales unidimensionales e imágenes de mediana y baja resolución, almacenando esta información en una base de datos de tipo noSQL. En donde se establece una conexión bidireccional conocida como cliente-servidor en tiempo real mediante los Frameworks de NODE.js, en el cual se establece un servidor web que controla todas las peticiones que se realicen desde el Frontend al Backend y viceversa con un enlace a la base de datos. En vista del sistema presentado ejercerá una visualización interactiva de la información con el fin de facilitar y mejorar la atención sanitaria del personal médico con el paciente, obteniendo como resultado la implementación de un software que presente toda la información que se ha generado y que es necesaria a la hora de tratar un caso clínico

    Facial Expression Recognition Utilizing Local Direction-Based Robust Features and Deep Belief Network

    Get PDF
    Emotional health plays very vital role to improve people's quality of lives, especially for the elderly. Negative emotional states can lead to social or mental health problems. To cope with emotional health problems caused by negative emotions in daily life, we propose efficient facial expression recognition system to contribute in emotional healthcare system. Thus, facial expressions play a key role in our daily communications, and recent years have witnessed a great amount of research works for reliable facial expressions recognition (FER) systems. Therefore, facial expression evaluation or analysis from video information is very challenging and its accuracy depends on the extraction of robust features. In this paper, a unique feature extraction method is presented to extract distinguished features from the human face. For person independent expression recognition, depth video data is used as input to the system where in each frame, pixel intensities are distributed based on the distances to the camera. A novel robust feature extraction process is applied in this work which is named as local directional position pattern (LDPP). In LDPP, after extracting local directional strengths for each pixel such as applied in typical local directional pattern (LDP), top directional strength positions are considered in binary along with their strength sign bits. Considering top directional strength positions with strength signs in LDPP can differentiate edge pixels with bright as well as dark regions on their opposite sides by generating different patterns whereas typical LDP only considers directions representing the top strengths irrespective of their signs as well as position orders (i.e., directions with top strengths represent 1 and rest of them 0), which can generate the same patterns in this regard sometimes. Hence, LDP fails to distinguish edge pixels with opposite bright and dark regions in some cases which can be overcome by LDPP. Moreover, the LDPP capabilities are extended through principal component analysis (PCA) and generalized discriminant analysis (GDA) for better face characteristic illustration in expression. The proposed features are finally applied with deep belief network (DBN) for expression training and recognition

    Розробка моделі FOG-мережі з інтелектуалізованою системою управління

    Get PDF
    Метою роботи є дослідження FOG мереж на основі створення імітаційної моделі та порівняння аналогічних схем з рішенням в CLOUD. В даній роботі розглянуто технології FOG-мереж та CLOUD-мереж, порівняння їхніх характеристик. У практичній частині показано створення моделі, яка проводить обчислення даних отриманих з сенсорів, потім передає їх на пристрої обробки даних в інформацію, та передає в інтелектуалізовану систему управління, що в свою чергу обробляє отриману інформацію з шаблонами дій і у випадках спрацювання тригерів змушує виконуватися певні дії.The purpose of the work is to study FOG networks based on the creation of a simulation model and compare similar schemes with the solution in CLOUD. In this paper the technologies of FOG-networks and CLOUD-networks, comparison of their characteristics is considered. The practical part shows the creation of a model that calculates data obtained from sensors, then transmits them to data processing devices in information, and transmits to an intelligent control system, which in turn processes the information with templates and in cases of triggers triggers certain actions

    Rethinking the Meaning of Cloud Computing for Healthcare: A Taxonomic Perspective and Future Research Directions

    Get PDF
    Background: Cloud computing is an innovative paradigm that provides users with on-demand access to a shared pool of configurable computing resources such as servers, storage, and applications. Researchers claim that information technology (IT) services delivered via the cloud computing paradigm (ie, cloud computing services) provide major benefits for health care. However, due to a mismatch between our conceptual understanding of cloud computing for health care and the actual phenomenon in practice, the meaningful use of it for the health care industry cannot always be ensured. Although some studies have tried to conceptualize cloud computing or interpret this phenomenon for health care settings, they have mainly relied on its interpretation in a common context or have been heavily based on a general understanding of traditional health IT artifacts, leading to an insufficient or unspecific conceptual understanding of cloud computing for health care. Objective: We aim to generate insights into the concept of cloud computing for health IT research. We propose a taxonomy that can serve as a fundamental mechanism for organizing knowledge about cloud computing services in health care organizations to gain a deepened, specific understanding of cloud computing in health care. With the taxonomy, we focus on conceptualizing the relevant properties of cloud computing for service delivery to health care organizations and highlighting their specific meanings for health care. Methods: We employed a 2-stage approach in developing a taxonomy of cloud computing services for health care organizations. We conducted a structured literature review and 24 semistructured expert interviews in stage 1, drawing on data from theory and practice. In stage 2, we applied a systematic approach and relied on data from stage 1 to develop and evaluate the taxonomy using 14 iterations. Results: Our taxonomy is composed of 8 dimensions and 28 characteristics that are relevant for cloud computing services in health care organizations. By applying the taxonomy to classify existing cloud computing services identified from the literature and expert interviews, which also serves as a part of the taxonomy, we identified 7 specificities of cloud computing in health care. These specificities challenge what we have learned about cloud computing in general contexts or in traditional health IT from the previous literature. The summarized specificities suggest research opportunities and exemplary research questions for future health IT research on cloud computing. Conclusions: By relying on perspectives from a taxonomy for cloud computing services for health care organizations, this study provides a solid conceptual cornerstone for cloud computing in health care. Moreover, the identified specificities of cloud computing and the related future research opportunities will serve as a valuable roadmap to facilitate more research into cloud computing in health care

    An IoT based Virtual Coaching System (VSC) for Assisting Activities of Daily Life

    Get PDF
    Nowadays aging of the population is becoming one of the main concerns of theworld. It is estimated that the number of people aged over 65 will increase from 461million to 2 billion in 2050. This substantial increment in the elderly population willhave significant consequences in the social and health care system. Therefore, in thecontext of Ambient Intelligence (AmI), the Ambient Assisted Living (AAL) has beenemerging as a new research area to address problems related to the aging of the population. AAL technologies based on embedded devices have demonstrated to be effectivein alleviating the social- and health-care issues related to the continuous growing of theaverage age of the population. Many smart applications, devices and systems have beendeveloped to monitor the health status of elderly, substitute them in the accomplishment of activities of the daily life (especially in presence of some impairment or disability),alert their caregivers in case of necessity and help them in recognizing risky situations.Such assistive technologies basically rely on the communication and interaction be-tween body sensors, smart environments and smart devices. However, in such contextless effort has been spent in designing smart solutions for empowering and supportingthe self-efficacy of people with neurodegenerative diseases and elderly in general. Thisthesis fills in the gap by presenting a low-cost, non intrusive, and ubiquitous VirtualCoaching System (VCS) to support people in the acquisition of new behaviors (e.g.,taking pills, drinking water, finding the right key, avoiding motor blocks) necessary tocope with needs derived from a change in their health status and a degradation of theircognitive capabilities as they age. VCS is based on the concept of extended mind intro-duced by Clark and Chalmers in 1998. They proposed the idea that objects within theenvironment function as a part of the mind. In my revisiting of the concept of extendedmind, the VCS is composed of a set of smart objects that exploit the Internet of Things(IoT) technology and machine learning-based algorithms, in order to identify the needsof the users and react accordingly. In particular, the system exploits smart tags to trans-form objects commonly used by people (e.g., pillbox, bottle of water, keys) into smartobjects, it monitors their usage according to their needs, and it incrementally guidesthem in the acquisition of new behaviors related to their needs. To implement VCS, thisthesis explores different research directions and challenges. First of all, it addresses thedefinition of a ubiquitous, non-invasive and low-cost indoor monitoring architecture byexploiting the IoT paradigm. Secondly, it deals with the necessity of developing solu-tions for implementing coaching actions and consequently monitoring human activitiesby analyzing the interaction between people and smart objects. Finally, it focuses on the design of low-cost localization systems for indoor environment, since knowing theposition of a person provides VCS with essential information to acquire information onperformed activities and to prevent risky situations. In the end, the outcomes of theseresearch directions have been integrated into a healthcare application scenario to imple-ment a wearable system that prevents freezing of gait in people affected by Parkinson\u2019sDisease

    Personalized ambient parameters monitoring: design and implementing of a wrist-worn prototype for hazardous gases and sound level detection

    Get PDF
    The concentration is on “3D space utilization” as the concept and infrastructure of designing of a wearable in ambient parameters monitoring. This strategy is implemented according to “multi-layer” approach. In this approach, each group of parameters from the same category is monitored by a modular physical layer enriched with the respected sensors. Depending on the number of parameters and layers, each physical layer is located on top of another. The intention is to implement a device for “everyone in everywhere for everything”

    The Meaningful Use of Cloud Computing in Healthcare

    Get PDF
    This dissertation focuses on the meaning of cloud computing for healthcare and its meaningful use in the healthcare industry. If used in a meaningful way, cloud computing is argued to be able to provide major benefits to the healthcare industry. Surprisingly, the benefits promised by using cloud computing often do not hold in practice, and the deployment of cloud computing services in healthcare organizations could lead to countereffects for healthcare. Although existing research studies cover a wide range of domains in healthcare, they often do not explain the way in which cloud computing could support healthcare in a systematic manner. In reply to that insufficiency in the research, this dissertation aims to investigate the phenomenon of cloud computing in healthcare organizations and to answer the following overarching research question: How can cloud computing support healthcare organizations in a meaningful way (i.e., meaningful use)? This dissertation conducted four research studies by employing established explorative research methods. The dissertation begins with a study (study 1) that investigates the basic properties of cloud computing services and their specific meanings for the healthcare industry, and suggests concrete directions for studies related to the meaningful use of cloud computing in healthcare. Study 2 focuses on the identification of industry-specific factors for the adoption of cloud computing services in healthcare, and studies 3 and 4 on an investigation of the way in which cloud computing supports collaborative activities in healthcare, respectively. Both focuses belong to research directions suggested by study 1. By addressing the overarching research question, this dissertation could deepen our understanding of the use of information technology (IT) artefacts that advances information systems theories, not only regarding cloud computing itself but also in terms of more general health IT levels

    Strategies Administrators Use to Mitigate Cloud Computing Data Threats and Breaches

    Get PDF
    Cloud computing has changed the information technology (IT) infrastructure of U. S. organizations, generating new threats and breaches in data security. Organization leaders estimated the costs from data breaches at approximately $8.5 billion annually, so reducing data breaches can potentially save organizations billions annually. Grounded in the integrated enterprise risk management framework, the purpose of this qualitative multiple case study was to explore strategies 4 IT administrators in central North Carolina use to mitigate data security threats and breaches. Data collection included archival documents (e.g., data security plans and organization newsletters), journal notes, and semistructured face-to-face interviews. Using thematic analysis and Yin’s 5 phases of analysis led to three core themes: reliance on third-party risk management services, employee education, and best practices. A key recommendation is that IT administrators and organization leaders collaborate to align IT functions with organizational objectives to sustain competitive advantage. Applying the findings in this study may help IT administrators develop best practices to mitigate data security threats and breaches in cloud computing environments. The implications for positive social change include the potential to reduce occurrences of data and identity theft, the financial risk for organizations, and financial loss for individuals and community members
    corecore