1,788 research outputs found

    DATA MINING CLUSTERING: A HEALTHCARE APPLICATION

    Get PDF

    Survey of Android based Healthcare Application

    Get PDF
    Nowadays, the usage of mobile technology and application is escalating as it providing different services in various fields. This paper defines how the mobile phone with Android OS is very useful in medical field because Android OS phone can retrieve the medical images which are in .dcm format where .dcm is known as DICOM format image and DICOM is abbreviated as Digital Imaging and Communication in Medicine. @HealthCloud, Ubiquitous Healthcare system and “D’s Viewer” application are the some applications which are developed on Android OS to access the medical image and to see the patient’s information. Ubiquitous Healthcare System and “D’s Viewer application provides even security while accessing medical image and @HealthCloud and “D’s Viewer” access the medical image with the help of cloud computing

    Challenges of Mobile Healthcare Application Security

    Get PDF
    Healthcare information technology has overcome many of the Web application security challenges in the past decade. We can now access information more securely and incidents of unintentional data loss are on the decline. However, more must be done to ensure the confidentiality, integrity, and availability of mobile applications in the healthcare field. Whether it is physicians using iPads to access treatment histories or patients managing healthcare options via smart phones, the proposed CAP framework (checks, assurances, protection) adds additional security and privacy layers to our modern mobile medical needs

    2.4 GHZ HETERODYNE RECEIVER FOR HEALTHCARE APPLICATION

    Get PDF
    Objective: The objective of this research was to design a basic 2.4 GHz heterodyne receiver for healthcare on a 130 um CMOS process. The ultimate goal for the wireless industry is to minimize the trade-offs between performance and cost, and between performance and low power consumption design.Methods: In the first part, a low noise amplifier (LNA), which is commonly used as the first stage of a receiver, is introduced and simulated. LNA performance greatly affects the overall receiver performance. The LNA was designed at the 2.4 GHz ISM band, using the cascode with an inductive degeneration topology. The second part of this proposal presents a low power 2.4 GHz down conversion Gilbert Cell mixer. In the third part, a high-performance LC-tank CMOS VCO was designed at 2.4 GHz. The design uses using PMOS cross-coupled topology with the varactor for wider tuning range topology.Results: In the first part, a low noise amplifier (LNA) design reached the NF of 2 dB, had power consumption of 2.2 mW, and had a gain of 20dB. The second part of this proposal presented a low power 2.4 GHz down conversion Gilbert Cell mixer. The obtained result showed a conversion gain of 14.6 dB and power consumption of 8.2 mW at a 1.3V supply voltage. In the third part, a high-performance LC-tank CMOS VCO was designed at 2.4 GHz. The final simulation of the phase noise was-128 dBc/Hz, and the tuning range was 2.3 GHz-2.5 GHz while the total power consumption was 3.25 mW. Conclusion: The performance of the receiver meets the specification requirements of the desired standard.Keywords: LNA, healthcare, VCO, mixer, Heterodyne receive

    A Digital Healthcare Application for Patient Monitoring and Assessment

    Get PDF
    The COVID-19 pandemic strained our healthcare resources and exacerbated the existing issues of primary care shortages and burnout rates for healthcare professionals. Due in part to these factors, telehealth has seen more wide-spread use during this time. However, current asynchronous telehealth applications require stable Internet to function fully. Since many medically underserved populations in the United States lack Internet access in their homes, an application that offers patient monitoring and assessment could extend their access to medical resources. This work proposes such a digital healthcare application for iOS devices and evaluates it based on the system requirements of availability, data security and privacy, and scalability. The functionality of the application is achieved by using two interacting backends to complete the task of interviewing patients for monitoring and assessment purposes. The Interview Backend is composed of four modules that control the interview process and utilize a rule-set as well as previous patient responses to determine how to progress through an assessment interview. The UI Backend functions as the display for the interview and communicates with the Interview Backend to collect the patient response to a question and present new questions to be answered. The application\u27s availability is ensured using Kubernetes and the local storage techniques of Apple\u27s iOS sandbox environment. Kubernetes provides built-in functionality for the replica pods and load balancing to ensure stable pods are maintained and available for patients when needed in addition to balancing incoming requests between the available pods to provide similar workloads to each. These pods maintain the web pages for a provider dashboard and process requests from instances of the application. The iOS sandbox environment offers a method for storing patient data locally on a device\u27s Documents Directory while protecting it from unauthorized access from other applications or malicious parties without file-share permissions. To provide for data security and privacy requirements, federal HIPAA regulations relevant to this application are met through patient authentication, role-based provider access to data, and data separation between patients\u27 electronic Protected Health Information (e-PHI) and Personally Identifiable Information (PII). Patient authentication was implemented to help prevent unauthorized accounts from being created without a provider\u27s permission and to associate patient accounts to their devices, adding an extra layer of security to address potential breaches. Providers are granted the ability to enroll patients in the application by a system administrator, creating roll-based access separating the ability to grant provider permissions from the ability to interact with patient data. This helps prevent data misuse and improper disclosure by requiring healthcare providers to be enrolled in the app by a system administrator similar to the patient authorization process. Further, patient data separation is implemented between the application\u27s Cloud database and the provider\u27s database to protect the privacy of patient data. All data stored on the application database are de-identified e-PHI and associated with a generated patient ID, thus preventing malicious parties from re-identifying a patient with data collected from the proposed app without also breaching the provider\u27s database containing PII or otherwise already collecting sensitive data on the patient. By encrypting the data while on the application database and in transit, data are further secured as decryption would be required before re-identification can be attempted. To ensure that the scalability of the application\u27s network to real-world population sizes, three of the largest underserved populations of Oconee County, South Carolina, were used as a basis for three sets of network tests using two of the most common request types from the application. These tests used two of the most common request types for the application, the login and last interview retrieval requests, and included a stress test and two load tests, one of which was a simulated 24-hour test. More specifically, they included 1,000 to 5,000 concurrent requests for the stress test, 1,000 to 5,000 total requests in smaller batches of up to 500 for the first load test, and 10,000 requests normally distributed over a 24 minute period representing 24-hours for the the second load test, or simulation test. For these tests, the average response time, longest response time, and error rate were recorded for the two types of requests, and the response times were compared against the three-second timeout threshold for requests set by the application. The results of these studies showed that the application is able to process both request types with similar response times while producing no errors. The stress tests exhibited a linear trend that increased as the number of concurrent users increased for the average response times and a less linear trend that also increased for the longest response times. The longest response time was under 2 seconds for these tests, which is below the three-second threshold for a timeout. The first load tests displayed more erratic trends for both the longest and average response times than the stress tests, with response times increasing overall as the batch size of concurrent requests increased. The reason for this variability in response times is attributed to the sustained batch sizes increasing CPU usage on the Kubernetes cluster more than the stress tests. With a peak longest response time of over 2.5 seconds, this set of load tests neared the three-second threshold and surpassed the longest response times found for the stress tests\u27 data. The second load tests exhibited trends resembling a normal distribution as expected due to the data being distributed normally over the simulated hours. The request types exhibited similar response times for both the average and longest response times, with the times increasing toward the center of the distributed data. The longest response time for these data was less than 0.7 seconds, much shorter than the peak values for the other two sets of tests and well below the three-second threshold. Based on the data collected, the request types seemed to have a limited effect on the response type for the population sizes tested. It was also demonstrated that the application can process requests for population sizes similar to those of Oconee County\u27s underserved populations; however the network would likely need more resources to support larger populations due to the risk of timeouts occurring. In addition to the limitation of the population capacity of the network, this study also was unable to conduct network tests on interview insertions to the database due to the expense, and being constrained to iOS devices. Future research will be conducted to address these limitations, including developing future iterations of this application in React Native to allow for development in iOS and Android simultaneously. In addition, future studies will also explore implementing an authentication server to enhance security, performing tests on SQL query times, and adding additional backend monitoring and assessment features to the provider dashboard. The digital healthcare application proposed here builds on existing telehealth options by focusing on populations that are currently underserved. The results from this study indicate that the proposed application ensures availability in areas with limited Internet access while at the same time maintaining the level of security and privacy required by HIPAA, and exhibiting scalability to population sizes similar to those explored in this study. By extending our robust telehealth and digital healthcare options, we can better prepare for future situations like the COVID-19 pandemic as well as further improve the effectiveness of our current healthcare system

    LOW POWER SI-BASED POWER AMPLIFIER FOR HEALTHCARE APPLICATION

    Get PDF
    Objective: The objective of this research was to design a 2.4 GHz class B Power Amplifier (PA), with 0.18um Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence software, for health care applications. The ultimate goal for such application is to minimize the trade-offs between performance and cost, and between performance and low power consumption design.Methods: This paper introduces the design of a 2.4GHz class B power amplifier designed as dual gate topology. This class B power amplifier could transmit 26dBm output power to a 50Ω load. The power added efficiency was 60% minimum and the power gain was 90dB, the total power consumption was 6.9 mW.Results: Besides, accurate device modeling, is needed, due to the leakage and process variations.Conclusion: The performance of the power amplifier meets the specification requirements of the desired

    Identifying Factors Affecting Doctors to Adopt Internet-Based Healthcare Application Using Extended TAM

    Get PDF
    Technology Acceptance Model (TAM) has been developed to explain user acceptance of new information technologies. The objective of this study is to identify factors that affect doctors' adoption of and the reasons of not adopting the internet-based healthcare applications. A survey was carried out that involved 300 doctors in the Alor Setar General Hospital (ASGH) in Malaysia, in order to see whether TAM fits in the health field. In addition, they survey was done to identifying factors affecting doctors in adopting the internet-based healthcare application. The core perception variables are perceived ease of use, perceived usefulness, and perceived behavior include, which include a strong determinant of intention to use. The factors identified in this research are (job relevance, output quality, result demonstrability, image, experience, subject norm, learn ability, screen design, self efficacy, support, training, and availability). From the survey, it were found that all factors have influence on doctors in adopting the internet-based healthcare application. This proved that extended TAM is important. In summary, the findings presented in the study suggest various reasons of why doctors do not adopt the internet based healthcare application in their work. Finally, some recommendations are made for the government in improving the internet-based application in the health field

    On Possible Cryptographic Optimization of Mobile Healthcare Application

    Get PDF
    The paper deals with a possible SOA based m-healthcare online system with secure mobile communication between patients and medical professionals with medical and insurance organizations. An example of an Android-based secure mobile client application is presented which can be used in the described secure m-healthcare model and it is experimentally evaluated. In the paper, we focus on possible optimization of cryptographic algorithms implemented in the secure Android mobile client application. The presented experimental results justify that security operations related to X.509v3 digital certificate generation and XML/WSS digital signature creation/verification are feasible on some current smart phones and justify the use of the proposed optimization techniques for implemented cryptographic algorithms
    corecore