373 research outputs found

    Wireless remote patient monitoring on general hospital wards.

    Get PDF
    A novel approach which has potential to improve quality of patient care on general hospital wards is proposed. Patient care is a labour-intensive task that requires high input of human resources. A Remote Patient Monitoring (RPM) system is proposed which can go some way towards improving patient monitoring on general hospital wards. In this system vital signs are gathered from patients and sent to a control unit for centralized monitoring. The RPM system can complement the role of nurses in monitoring patients’ vital signs. They will be able to focus on holistic needs of patients thereby providing better personal care. Wireless network technologies, ZigBee and Wi-Fi, are utilized for transmission of vital signs in the proposed RPM system. They provide flexibility and mobility to patients. A prototype system for RPM is designed and simulated. The results illustrated the capability, suitability and limitation of the chosen technology

    Non-repudiation Service Implementation Using Host Identity Protocol

    Get PDF
    New types of service usages emerge every day in the Internet. Service usage could be Wireless Local Area Network (WLAN) usage or watching a streamed movie. Many of these services are commercial, so payment is often involved in the service usage, which increases the risk of fraud or other misbehaviour in the interaction. To enhance the secu-rity of both service providers and service users, improvements are needed to the existing procedures. The non-repudiable service usage procedure was developed as part of the TIVIT Future Internet SHOK -project. In this model, the service user and the service provider are bound to the actual service usage with certificates. The charging of the service usage is done using hash chains which are bound to the certificates. Now the service user pays only for the service he or she gets. Time or traffic based charging scheme can be used in the service usage. Evidence is gathered from the service usage to help solve possible conflicts afterwards. An actual implementation based on this model was made using Host Identity Protocol for Linux and RADIUS protocol. RADIUS protocol was used to gather the created evidence of the service usage. The implementation was developed for Linux using C-language. The goal of the implementation was to evaluate the concept in actual use. Performance of the implementation was measured with various real use scenarios to evaluate the feasibility of the implementation. Results indicated that the performance of the model is sufficient to serve several simultaneous users. However, the architecture of Host Identity Protocol for Linux caused some performance issues in the implementation

    Mobile Library

    Get PDF
    Wireless application system and application has large potential due to the very personal and intimate nature of the device and high targeting possibilities. Due to rapid advancement of advertising and informing technologies recent years, the concepts and such applications have been significantly extended. This research will look deeply into the acceptance level of implementing the wireless system at the defined area. In this project the application and the function of advertising on mobile device has been modified to another alternatives that can enhance the environment surrounding us. This project is basically will be functioning as a reminder system. This system will establish the connection between the server and the Personal Digital Assistants (PDAs). The system will deliver location-aware of information that allows the transition info from the server to the PDAs using WiFi pull-based technology. The objective of this system being developed is to enhance the idea and the technologies of wireless nowadays which definitely can be implemented in various ways later on. In this project, several techniques have been used starting with ideas and information research and gathering that have been done through journals, existing paper work, and previous systems that create by previous students. This report covers the background study, literature review and theory based on research, and also methodology used in research and design phase. In research, questionnaire is used to gather information pertaining to user preferences. Meanwhile, in design phase, the methodologies will be explained more in chapter three (3). The lasttwo part of this report covers result and discussion from the research and testing phase, and also recommendation for future work. I

    Non-repudiation Service Implementation Using Host Identity Protocol

    Get PDF
    New types of service usages emerge every day in the Internet. Service usage could be Wireless Local Area Network (WLAN) usage or watching a streamed movie. Many of these services are commercial, so payment is often involved in the service usage, which increases the risk of fraud or other misbehaviour in the interaction. To enhance the secu-rity of both service providers and service users, improvements are needed to the existing procedures. The non-repudiable service usage procedure was developed as part of the TIVIT Future Internet SHOK -project. In this model, the service user and the service provider are bound to the actual service usage with certificates. The charging of the service usage is done using hash chains which are bound to the certificates. Now the service user pays only for the service he or she gets. Time or traffic based charging scheme can be used in the service usage. Evidence is gathered from the service usage to help solve possible conflicts afterwards. An actual implementation based on this model was made using Host Identity Protocol for Linux and RADIUS protocol. RADIUS protocol was used to gather the created evidence of the service usage. The implementation was developed for Linux using C-language. The goal of the implementation was to evaluate the concept in actual use. Performance of the implementation was measured with various real use scenarios to evaluate the feasibility of the implementation. Results indicated that the performance of the model is sufficient to serve several simultaneous users. However, the architecture of Host Identity Protocol for Linux caused some performance issues in the implementation
    corecore