CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

Medical Heed Sensors

by Aiman J. Albarakati
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 6
Year of Publication: 2015
Authors: Aiman J. Albarakati
10.5120/ijais15-451331

Aiman J. Albarakati . Medical Heed Sensors. International Journal of Applied Information Systems. 8, 6 ( April 2015), 9-12. DOI=10.5120/ijais15-451331

@article{ 10.5120/ijais15-451331,
author = { Aiman J. Albarakati },
title = { Medical Heed Sensors },
journal = { International Journal of Applied Information Systems },
issue_date = { April 2015 },
volume = { 8 },
number = { 6 },
month = { April },
year = { 2015 },
issn = { 2249-0868 },
pages = { 9-12 },
numpages = {9},
url = { https://www.ijais.org/archives/volume8/number6/731-1331/ },
doi = { 10.5120/ijais15-451331 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:59:09.931127+05:30
%A Aiman J. Albarakati
%T Medical Heed Sensors
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 8
%N 6
%P 9-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Up to date progress in embedded computing systems have led to the appearance of wireless sensor networks, consisting of small, battery-powered "motes" with restricted computation and radio communication competences. Sensor networks authorize data congregation and computation to be severely embedded in the physical environment. This technology has the prospective to blow the deliverance and study of resuscitative heed by allowing imperative cryptogram to be routinely collected and completely incorporated into the patient care/heed record and utilized for real-time triage, association with hospital records, and enduring surveillance. Medical Agents (Chemical, Biological, and radiological) can mess about with the activities of medical care suppliers, patient samples/trials, and drug management. This fallouts/leads in a shut down of all medical heed/care, leave-taking patients at a foremost jeopardy. The scientific defy is to build up sensors to identify and keep an eye on any infringements in the medical care environment prior to hazard to life occurs. Wireless devices have to communicate multimedia data such as patient information, laboratory results/trials, prescriptions, and EKG and X-ray reports. The consistency, protection, and truthfulness of these wireless devices and sensors can influence the aptness entrée to information for patient monitoring/supervision. Furthermore, data can be despoiled, computer information systems (I. S's) can be unsuccessful, and communication networks may possibly practice denial of service attacks direct to absolute collapse of an appropriate patient care/heed. In this article, we confer protection and safety concerns in medical environment, and distinctiveness of sensors, the technology/expertise, categories and research issues/agenda's in denial of service, smart antennas, fault tolerant authentication, privacy issues, and energy contemplations. A dialogue of sensors in patient rooms, wards/clinics, hospitals, and dimensions of safety and security is offered. The on hand devices for sensor and wireless communication are also briefly included.

References
  1. Introduction to Wireless and Mobile Systems. Brooks/Cole Thompson Learning, 2002.
  2. Fault Tolerant Authentication in Mobile Computing" , International Conference on Internet Computing, June 2000.
  3. Smart antenna for handsets. DSPS Fest, 2000, ''Security Flaws in 802. 11 Data Link Protocols," CACM. May 2003.
  4. Advances in Distributed Sensor Integration: ''Applications and Theory''. Prentice Hall, New Jersey, 07458, 1995, pp. 273.
  5. Tennenhouse, ''Embedding the Internet: Proactive Computing''. Communications of the ACM. Vol. 43, No. 5, pp. 43-50, 2000.
  6. SPINS: ''Security protocols for sensor networks''. 7th Annual International Conference on Mobile Computing and Networks (MobiCom), pp. 189-199. 2001.
  7. ''Protein Microarray Fabrication for Immunosensing''. 224th American Chemical Society (ACS) National Meeting, Aug. 2002.
  8. Top Down'' Protein Characterization by Tandem Mass Spectrometry. " Journal of Mass Spectrom. 2002, 37, pp. 663-675.
  9. ''Integrated Detection of Hazardous Material'', Proceedings of American Physical Society, 2003.
  10. ''Distributed Sensor Networks. '' CRC Press, Inc. 2003
  11. Estrin, ''Instrumenting the World with Wireless Sensor Networks (WSN)'' (ICASSP 2001) International Conference on Acoustics, Speech, & Signal Processing, Utah, May 2001.
  12. Khan,''Emerging Challenges: Mobile Networking for Smart Dust'', (IJCN) International Journal of Communication Networks, Vol. 2, No. 3, Sept. 2000.
  13. Khan, M, ''Next Century Challenges: Mobile Networking for Smart Dust'', Mobicomm 99, 1999, pp. 271-278.
  14. Kulik, ''Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks,'' Wireless Networks, Vol. 8, 2002, pp. 169-185.
  15. Krishnamachari, ''The Impact of Data Aggregation in Wireless Sensor Networks (WSN's)'' International Workshop on Distributed Event Based Systems (DEBS), Austria, 2002.
  16. Iyenger, ''Computational Aspects of Sensor Networks'', I-SPAN'02, May 2002.
  17. Meguerdichian,''Localized Algorithms in Wireless Ad-hoc Networks: Location Discovery and Sensor Exposure,'' MobiHOC, 2001.
  18. Park, ''Simulating Networks of Wireless Sensor Networks,'' Winter Simulation Conference, 2001.
  19. Schurgers, ''Topology Management for Sensor Networks: Exploiting Latency and Density,'' ACM MobiHOC 2002.
  20. Doherty, ''Energy and Performance Considerations for Smart Dust. '' International Journal of Parallel and Distributed Systems and Networks, Vol. 4, No. 3, 2001.
  21. Warneke, ''Smart Dust: Communicating with a Cubic Millimeter Computer'', 2001.
  22. Housley, ''Security Problem in 802. 11 based networks,'' CACM. May 2003.
  23. Zoltowski, ''Jam-proof Area Deniable Propagation: Anti-jam Protection for GPS via Robust, Computationally Efficient Space-time Adaptive Processing. Technical Report, 2000.
  24. Xu, ''Diversity Assisted Channel Estimation and Multiuser Detection for Downlink CDMA with Long Spreading Codes'', IEEE Transactions on Signal Processing, 2003.
  25. Habib, ''Detecting Service Violations and DoS Attacks'', NDSS '03, San Diego, Feb 2003.
  26. Khan, ''Self-configuring Node Clusters and Data Aggregation in Micro-sensor Networks. '' Technical Report, College of Computing, Purdue University, July 2002.
  27. Zoltowski, M. Recent advances in reduced-rank adaptive filtering with applications to high-speed wireless communications, Conference of the International Society for Optical Engineering, 2001.
  28. Wang, ''Intruder identification in Mobile Ad Hoc Networks. '' Conference on Pervasive Computing, Dallas, IEEE, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Sensors WSN IoT Medical Care Sensors