International Workshop on Pervasive Wireless Healthcare最新文献

筛选
英文 中文
Safer virtual pillbox: assuring medication adherence to elderly patients 更安全的虚拟药盒:确保老年患者的服药依从性
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491155
Federico Botella, F. Borrás, J. Mira
{"title":"Safer virtual pillbox: assuring medication adherence to elderly patients","authors":"Federico Botella, F. Borrás, J. Mira","doi":"10.1145/2491148.2491155","DOIUrl":"https://doi.org/10.1145/2491148.2491155","url":null,"abstract":"In this paper, we describe a new mobile application for assisting to elderly patients and their caregivers (familiars, physicians, pharmacist) in the medication management at their homes. This mobile application will help patients to maintain medication adherence in a reliable and correctly intake of their drugs. The main target users of this application are polymedicated, polypathology and over 65 years old patients. The application was designed using User Centered Design (UCD) methods, taking always into account the characteristics of these target users, so usability and accessibility principles were applied in the design of interfaces. The design has been tested with a pre-test group of selected patients and we have confirmed that patients using this mobile application have increased their medication adherence and have reduced the frequency of adverse drug events.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secured wireless medical data transmission using modified elliptic curve cryptography 使用改进的椭圆曲线加密技术的安全无线医疗数据传输
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491153
Saibal K. Ghosh, Anagha Jamthe, Suryadip Chakraborty, D. Agrawal
{"title":"Secured wireless medical data transmission using modified elliptic curve cryptography","authors":"Saibal K. Ghosh, Anagha Jamthe, Suryadip Chakraborty, D. Agrawal","doi":"10.1145/2491148.2491153","DOIUrl":"https://doi.org/10.1145/2491148.2491153","url":null,"abstract":"With the widespread availability of cost effective wireless devices, the usage of such devices for the monitoring a patient's vital parameters have become ubiquitous. The use of such devices has given rise to Wireless Body Area Sensor Networks (WBASNs) that can enable a healthcare professional to remotely monitor an individual, thereby eliminating costly trips to the hospital. However, since WBASNs carry sensitive patient information, maintaining security is paramount. Public Key Cryptography (PKC) provides robust security than other cryptographic systems. However, PKC requires a substantial computational overhead to be effective which renders them unsuitable for low powered devices used in WBASNs. Elliptic Curve Cryptography (ECC) provides a computationally low overhead for achieving robust security. In this paper we define and propose a Modified Elliptic Curve Cryptography (MECC) technique for use in WBASNs. We also propose to use this method for the secure transmission of data to be used for the wireless monitoring of patients suffering from Parkinson's disease in an indoor environment such as the patient's residence or a hospice. Our system would continuously monitor a patient in real time and detect events that generally precede a fall or a Freezing of Gait (FoG).","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A robust heart rate detection using smart-phone video 使用智能手机视频的稳健心率检测
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491156
A. Pal, Aniruddha Sinha, A. Choudhury, T. Chattopadhyay, A. Visvanathan
{"title":"A robust heart rate detection using smart-phone video","authors":"A. Pal, Aniruddha Sinha, A. Choudhury, T. Chattopadhyay, A. Visvanathan","doi":"10.1145/2491148.2491156","DOIUrl":"https://doi.org/10.1145/2491148.2491156","url":null,"abstract":"In this paper, the authors have presented a smartphone based robust heart rate measurement system. The system requires the user to place the tip of his/her index finger on the lens of a smart phone camera, while the flash is on. The captured video signal often contains noise generated due to (i) improper finger placement, (ii) imparting excessive pressure, which subsequently blocks normal blood circulation and (iii) movement of the fingertip. To mitigate the above issues, a two stage approach has been proposed. Firstly, the onset of good video signal is detected by formulating a finite state machine, which employs multiple window short time fast fourier transform. Only upon receiving sufficient acceptable video signal, the heart rate is computed. Results indicate that the proposed method has successfully identified and rejected noisy video signal, resulting in avoidance of erroneous output.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
A conceptual framework for designing mHealth solutions for developing countries 为发展中国家设计移动医疗解决方案的概念框架
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491154
Stephen Mburu, Elke Franz, T. Springer
{"title":"A conceptual framework for designing mHealth solutions for developing countries","authors":"Stephen Mburu, Elke Franz, T. Springer","doi":"10.1145/2491148.2491154","DOIUrl":"https://doi.org/10.1145/2491148.2491154","url":null,"abstract":"Though mHealth is still at its formative stages, it is undeniably the next big thing in addressing healthcare challenges being experienced in developing countries. However, the complexity of implementing mHealth to address numerous health challenges is evident in many failed attempts to integrate it within healthcare system. We argue that this is due to complexity of migrating to virtual environment most healthcare processes; such as diagnosis and treatment that require more of physical interactions between patients and caregivers. To provide a concrete model to scale-up deployment of mHealth, this paper presents a conceptual framework combining constructs from Process Virtualization Theory, Theory of Planned Behaviour and Task-Technology Fit. The framework is a flexible schema for deriving concrete models that would be used as a blueprint for effective deployment and evaluation of mHealth applications' suitability to the intended use. To demonstrate the adaptability of the framework, we discuss its use regarding an mHealth application for maternal and child care in underserved rural and urban areas in Kenya.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131180392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An improved data security using DNA sequencing 利用DNA测序提高数据安全性
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491152
Dr. Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, M. Pal
{"title":"An improved data security using DNA sequencing","authors":"Dr. Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, M. Pal","doi":"10.1145/2491148.2491152","DOIUrl":"https://doi.org/10.1145/2491148.2491152","url":null,"abstract":"Data security is one of the most significant concerned areas of communications and data transmission. The concept of making secure data is to transform a plain message that is understandable by everyone into a human unreadable format or difficult to make out by encoding message using some cryptographic algorithms. Now a day, security is one of the most significant and fundamental issues of data transmission, researchers are working on the evolvement of new cryptographic algorithms. Cryptography is the process of providing security in data while transmitting over public networks by encrypting the original data or message. Data security is concerned with the areas of communication and data transmission. An efficient direction of achieving data security can be termed as DNA based Cryptography. The encryption and decryption process proposed in this paper will use the DNA sequencing string of the DNA strands. We have proposed here how the DNA sequencing can be utilized in cryptographic algorithms and how the message can be made more secure and reliable for transmitting effectively through networks. The algorithm we have proposed here is a new algorithm which has three keys for encrypting the message along with a new method of key generation and key sharing for better security aspects. The cipher text generated by the algorithm is looks similar with the bio-logical structure of the DNA strands. Unnecessary bits are padded with the cipher text in order to make it more complex to the intruders. The encryption algorithm is designed here by using the property of DNA sequencing.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
ESTHER: a portable sensor toolkit to collect and monitor total hip replacement patient data ESTHER:一种便携式传感器工具包,用于收集和监测全髋关节置换术患者的数据
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491151
Juan Jimenez Garcia, N. R. Herrera, Simone T. Boerema, D. Keyson, P. Havinga
{"title":"ESTHER: a portable sensor toolkit to collect and monitor total hip replacement patient data","authors":"Juan Jimenez Garcia, N. R. Herrera, Simone T. Boerema, D. Keyson, P. Havinga","doi":"10.1145/2491148.2491151","DOIUrl":"https://doi.org/10.1145/2491148.2491151","url":null,"abstract":"Due to the increasing cost of medical care, hospitals are looking at post surgery patients' home as the primary place for recovery. Unfortunately, this paradigm shift involves difficulties for patients and physiotherapists to manage the expected outcomes. While patients face physical and emotional problems related to the new hip, clinical teams have limited resources to follow patients' health experiences during their recovery. Mobile technologies for home care provide opportunities to remotely support patients in their rehabilitation process. They are designed to become part of patients' daily activities, which requires a holistic understanding of the dynamics of post-surgery treatment. Therefore, it is foreseen that requirements to design home care technologies should address clinicians' needs related to the functional aspects as well as patients' experiences of home recovery. ESTHER (Experience Sampling for Total Hip Replacement) is a research and design toolkit developed to study Total Hip Replacement (THR) patients' experiences after surgery and to evaluate design interventions to support patients in the complexity of home recovery. The tool is based on the Experience Sampling Method (ESM) to capture patients' self report on their recovery process. In an iterative approach the tool gradually added to patients' psychological reports physical activity using wireless sensor nodes. The first three iterations of ESTHER are described to illustrate the value of situated self-reports and the richness of combining both self-report and sensing techniques as a holistic approach to understand both behavioral and experiential aspects of home recovery. The experience in conducting situated design research has shown to be valuable in understanding the technical as well as social challenges and opportunities for the research and design community of home health technologies.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New priority MAC protocol for wireless body area networks 无线体域网络新的优先MAC协议
International Workshop on Pervasive Wireless Healthcare Pub Date : 2013-07-29 DOI: 10.1145/2491148.2491149
N. Bradai, L. Chaari, S. Boudjit, L. Kamoun
{"title":"New priority MAC protocol for wireless body area networks","authors":"N. Bradai, L. Chaari, S. Boudjit, L. Kamoun","doi":"10.1145/2491148.2491149","DOIUrl":"https://doi.org/10.1145/2491148.2491149","url":null,"abstract":"The rapid advancements in wireless communication technologies and micro-electronics systems have fostered the development of small and intelligent micro-components that incorporate sensing devices and wireless communications into a single miniature circuit that are wearable or implementable inside the human body for the purpose of medical and healthcare applications. These components when deployed are mainly known as WBANs for Wireless Body Area Networks. One of the main issues in such networks is the medium access techniques mainly for those data which could be urgent. The design of a medium access control protocol for a WBAN is a challenge due to the characteristics of wireless channel, the diversity of traffic, access latency and the need for minimization of energy consumption. Based on the integrated super frame structure of IEEE 802.15.4 and IEEE 802.15.6, an hybrid medium access control protocol named Priority MAC (PMAC) is proposed in this paper. In PMAC protocol, data channels are separated from control channels and the priority is given to the life critical traffic (emergency traffic). Furthermore, a sleep mode is used in order to save energy of the wearable wireless sensors and hence increase their lifetime.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Efficient delivery of frequent small data for U-healthcare applications over LTE-advanced networks 通过LTE-advanced网络为U-healthcare应用程序高效地交付频繁的小数据
International Workshop on Pervasive Wireless Healthcare Pub Date : 2012-06-11 DOI: 10.1145/2248341.2248354
Revak R. Tyagi, Ki-Dong Lee, F. Aurzada, Sang G. Kim, M. Reisslein
{"title":"Efficient delivery of frequent small data for U-healthcare applications over LTE-advanced networks","authors":"Revak R. Tyagi, Ki-Dong Lee, F. Aurzada, Sang G. Kim, M. Reisslein","doi":"10.1145/2248341.2248354","DOIUrl":"https://doi.org/10.1145/2248341.2248354","url":null,"abstract":"Ubiquitous healthcare (u-healthcare) applications typically require the frequent transmission of small data sets, e.g., from patient monitors, over wireless networks. We consider the transmissions of such u-healthcare data over an LTE-Advanced network, where each small data set must complete the standardized random access (RA) procedure. We mathematically analyze the delay of the RA procedure and verify our analysis with simulations. We find that our delay analysis, which is the first of its kind, gives reasonably accurate delay characterization. Thus, the presented delay characterization may form the basis for network management mechanisms that ensure reliable delivery of small frequent u-health-care data sets within small delays.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Ultraviolet guardian - real time ultraviolet monitoring: estimating the pedestrians ultraviolet exposure before stepping outdoors 紫外线卫士——实时紫外线监测:在行人踏出户外前预估紫外线暴露
International Workshop on Pervasive Wireless Healthcare Pub Date : 2012-06-11 DOI: 10.1145/2248341.2248350
Jerrid E. Matthews, Farnoosh Javadi, G. Rane, J. Zheng, G. Pau, M. Gerla
{"title":"Ultraviolet guardian - real time ultraviolet monitoring: estimating the pedestrians ultraviolet exposure before stepping outdoors","authors":"Jerrid E. Matthews, Farnoosh Javadi, G. Rane, J. Zheng, G. Pau, M. Gerla","doi":"10.1145/2248341.2248350","DOIUrl":"https://doi.org/10.1145/2248341.2248350","url":null,"abstract":"Geographic location, environmental properties, and altitude are factors that contribute to the increase or decrease of the pedestrians ultraviolet (UV) exposure. Over-exposure can cause severe skin damage, possibly leading to skin cancer. This work proposes an algorithm for estimating the pedestrians UVA and UVB exposure along a path in an urban environment before stepping outdoors. The algorithm is incorporated into our UV Guardian (UVG) system. For all pedestrian path walk experiments conducted, results show that the proposed algorithm estimates the pedestrians UVB exposure with 94% accuracy. For UVA exposure estimation, the accuracy is 71%.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The challenges and opportunities in wireless health 无线医疗的挑战与机遇
International Workshop on Pervasive Wireless Healthcare Pub Date : 2012-06-11 DOI: 10.1145/2248341.2248343
R. Jafari
{"title":"The challenges and opportunities in wireless health","authors":"R. Jafari","doi":"10.1145/2248341.2248343","DOIUrl":"https://doi.org/10.1145/2248341.2248343","url":null,"abstract":"Wireless Health brings to fruition many opportunities to continuously monitor the human body with sensors placed on body or implanted in the body. These platforms will revolutionize many application domains including health care and wellness. They provide new avenues to continuously monitor individuals, whether it is intended to detect an early onset of a disease or to assess the effectiveness of the treatment. In the past few years, new wearable applications have evolved and proved to be effective. The community has observed a large number of wireless health applications that have been developed using wearable computers. Yet, not many have been deployed in a large scale. There are still several challenges that need to be addressed before realizing the ubiquitous use of wireless health systems.\u0000 In this talk, we will highlight several applications of the wireless health and wearable computers. We will describe several components of the wireless health computing systems and will outline challenges associated with their ubiquitous deployment. We will highlight current research directions and will discuss future directions.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信