In this paper, we describe a new mobile application for assisting to elderly patients and their caregivers (familiars, physicians, pharmacist) in the medication management at their homes. This mobile application will help patients to maintain medication adherence in a reliable and correctly intake of their drugs. The main target users of this application are polymedicated, polypathology and over 65 years old patients. The application was designed using User Centered Design (UCD) methods, taking always into account the characteristics of these target users, so usability and accessibility principles were applied in the design of interfaces. The design has been tested with a pre-test group of selected patients and we have confirmed that patients using this mobile application have increased their medication adherence and have reduced the frequency of adverse drug events.
{"title":"Safer virtual pillbox: assuring medication adherence to elderly patients","authors":"Federico Botella, F. Borrás, J. Mira","doi":"10.1145/2491148.2491155","DOIUrl":"https://doi.org/10.1145/2491148.2491155","url":null,"abstract":"In this paper, we describe a new mobile application for assisting to elderly patients and their caregivers (familiars, physicians, pharmacist) in the medication management at their homes. This mobile application will help patients to maintain medication adherence in a reliable and correctly intake of their drugs. The main target users of this application are polymedicated, polypathology and over 65 years old patients. The application was designed using User Centered Design (UCD) methods, taking always into account the characteristics of these target users, so usability and accessibility principles were applied in the design of interfaces. The design has been tested with a pre-test group of selected patients and we have confirmed that patients using this mobile application have increased their medication adherence and have reduced the frequency of adverse drug events.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saibal K. Ghosh, Anagha Jamthe, Suryadip Chakraborty, D. Agrawal
With the widespread availability of cost effective wireless devices, the usage of such devices for the monitoring a patient's vital parameters have become ubiquitous. The use of such devices has given rise to Wireless Body Area Sensor Networks (WBASNs) that can enable a healthcare professional to remotely monitor an individual, thereby eliminating costly trips to the hospital. However, since WBASNs carry sensitive patient information, maintaining security is paramount. Public Key Cryptography (PKC) provides robust security than other cryptographic systems. However, PKC requires a substantial computational overhead to be effective which renders them unsuitable for low powered devices used in WBASNs. Elliptic Curve Cryptography (ECC) provides a computationally low overhead for achieving robust security. In this paper we define and propose a Modified Elliptic Curve Cryptography (MECC) technique for use in WBASNs. We also propose to use this method for the secure transmission of data to be used for the wireless monitoring of patients suffering from Parkinson's disease in an indoor environment such as the patient's residence or a hospice. Our system would continuously monitor a patient in real time and detect events that generally precede a fall or a Freezing of Gait (FoG).
{"title":"Secured wireless medical data transmission using modified elliptic curve cryptography","authors":"Saibal K. Ghosh, Anagha Jamthe, Suryadip Chakraborty, D. Agrawal","doi":"10.1145/2491148.2491153","DOIUrl":"https://doi.org/10.1145/2491148.2491153","url":null,"abstract":"With the widespread availability of cost effective wireless devices, the usage of such devices for the monitoring a patient's vital parameters have become ubiquitous. The use of such devices has given rise to Wireless Body Area Sensor Networks (WBASNs) that can enable a healthcare professional to remotely monitor an individual, thereby eliminating costly trips to the hospital. However, since WBASNs carry sensitive patient information, maintaining security is paramount. Public Key Cryptography (PKC) provides robust security than other cryptographic systems. However, PKC requires a substantial computational overhead to be effective which renders them unsuitable for low powered devices used in WBASNs. Elliptic Curve Cryptography (ECC) provides a computationally low overhead for achieving robust security. In this paper we define and propose a Modified Elliptic Curve Cryptography (MECC) technique for use in WBASNs. We also propose to use this method for the secure transmission of data to be used for the wireless monitoring of patients suffering from Parkinson's disease in an indoor environment such as the patient's residence or a hospice. Our system would continuously monitor a patient in real time and detect events that generally precede a fall or a Freezing of Gait (FoG).","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Pal, Aniruddha Sinha, A. Choudhury, T. Chattopadhyay, A. Visvanathan
In this paper, the authors have presented a smartphone based robust heart rate measurement system. The system requires the user to place the tip of his/her index finger on the lens of a smart phone camera, while the flash is on. The captured video signal often contains noise generated due to (i) improper finger placement, (ii) imparting excessive pressure, which subsequently blocks normal blood circulation and (iii) movement of the fingertip. To mitigate the above issues, a two stage approach has been proposed. Firstly, the onset of good video signal is detected by formulating a finite state machine, which employs multiple window short time fast fourier transform. Only upon receiving sufficient acceptable video signal, the heart rate is computed. Results indicate that the proposed method has successfully identified and rejected noisy video signal, resulting in avoidance of erroneous output.
{"title":"A robust heart rate detection using smart-phone video","authors":"A. Pal, Aniruddha Sinha, A. Choudhury, T. Chattopadhyay, A. Visvanathan","doi":"10.1145/2491148.2491156","DOIUrl":"https://doi.org/10.1145/2491148.2491156","url":null,"abstract":"In this paper, the authors have presented a smartphone based robust heart rate measurement system. The system requires the user to place the tip of his/her index finger on the lens of a smart phone camera, while the flash is on. The captured video signal often contains noise generated due to (i) improper finger placement, (ii) imparting excessive pressure, which subsequently blocks normal blood circulation and (iii) movement of the fingertip. To mitigate the above issues, a two stage approach has been proposed. Firstly, the onset of good video signal is detected by formulating a finite state machine, which employs multiple window short time fast fourier transform. Only upon receiving sufficient acceptable video signal, the heart rate is computed. Results indicate that the proposed method has successfully identified and rejected noisy video signal, resulting in avoidance of erroneous output.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Though mHealth is still at its formative stages, it is undeniably the next big thing in addressing healthcare challenges being experienced in developing countries. However, the complexity of implementing mHealth to address numerous health challenges is evident in many failed attempts to integrate it within healthcare system. We argue that this is due to complexity of migrating to virtual environment most healthcare processes; such as diagnosis and treatment that require more of physical interactions between patients and caregivers. To provide a concrete model to scale-up deployment of mHealth, this paper presents a conceptual framework combining constructs from Process Virtualization Theory, Theory of Planned Behaviour and Task-Technology Fit. The framework is a flexible schema for deriving concrete models that would be used as a blueprint for effective deployment and evaluation of mHealth applications' suitability to the intended use. To demonstrate the adaptability of the framework, we discuss its use regarding an mHealth application for maternal and child care in underserved rural and urban areas in Kenya.
{"title":"A conceptual framework for designing mHealth solutions for developing countries","authors":"Stephen Mburu, Elke Franz, T. Springer","doi":"10.1145/2491148.2491154","DOIUrl":"https://doi.org/10.1145/2491148.2491154","url":null,"abstract":"Though mHealth is still at its formative stages, it is undeniably the next big thing in addressing healthcare challenges being experienced in developing countries. However, the complexity of implementing mHealth to address numerous health challenges is evident in many failed attempts to integrate it within healthcare system. We argue that this is due to complexity of migrating to virtual environment most healthcare processes; such as diagnosis and treatment that require more of physical interactions between patients and caregivers. To provide a concrete model to scale-up deployment of mHealth, this paper presents a conceptual framework combining constructs from Process Virtualization Theory, Theory of Planned Behaviour and Task-Technology Fit. The framework is a flexible schema for deriving concrete models that would be used as a blueprint for effective deployment and evaluation of mHealth applications' suitability to the intended use. To demonstrate the adaptability of the framework, we discuss its use regarding an mHealth application for maternal and child care in underserved rural and urban areas in Kenya.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131180392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, M. Pal
Data security is one of the most significant concerned areas of communications and data transmission. The concept of making secure data is to transform a plain message that is understandable by everyone into a human unreadable format or difficult to make out by encoding message using some cryptographic algorithms. Now a day, security is one of the most significant and fundamental issues of data transmission, researchers are working on the evolvement of new cryptographic algorithms. Cryptography is the process of providing security in data while transmitting over public networks by encrypting the original data or message. Data security is concerned with the areas of communication and data transmission. An efficient direction of achieving data security can be termed as DNA based Cryptography. The encryption and decryption process proposed in this paper will use the DNA sequencing string of the DNA strands. We have proposed here how the DNA sequencing can be utilized in cryptographic algorithms and how the message can be made more secure and reliable for transmitting effectively through networks. The algorithm we have proposed here is a new algorithm which has three keys for encrypting the message along with a new method of key generation and key sharing for better security aspects. The cipher text generated by the algorithm is looks similar with the bio-logical structure of the DNA strands. Unnecessary bits are padded with the cipher text in order to make it more complex to the intruders. The encryption algorithm is designed here by using the property of DNA sequencing.
{"title":"An improved data security using DNA sequencing","authors":"Dr. Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, M. Pal","doi":"10.1145/2491148.2491152","DOIUrl":"https://doi.org/10.1145/2491148.2491152","url":null,"abstract":"Data security is one of the most significant concerned areas of communications and data transmission. The concept of making secure data is to transform a plain message that is understandable by everyone into a human unreadable format or difficult to make out by encoding message using some cryptographic algorithms. Now a day, security is one of the most significant and fundamental issues of data transmission, researchers are working on the evolvement of new cryptographic algorithms. Cryptography is the process of providing security in data while transmitting over public networks by encrypting the original data or message. Data security is concerned with the areas of communication and data transmission. An efficient direction of achieving data security can be termed as DNA based Cryptography. The encryption and decryption process proposed in this paper will use the DNA sequencing string of the DNA strands. We have proposed here how the DNA sequencing can be utilized in cryptographic algorithms and how the message can be made more secure and reliable for transmitting effectively through networks. The algorithm we have proposed here is a new algorithm which has three keys for encrypting the message along with a new method of key generation and key sharing for better security aspects. The cipher text generated by the algorithm is looks similar with the bio-logical structure of the DNA strands. Unnecessary bits are padded with the cipher text in order to make it more complex to the intruders. The encryption algorithm is designed here by using the property of DNA sequencing.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Jimenez Garcia, N. R. Herrera, Simone T. Boerema, D. Keyson, P. Havinga
Due to the increasing cost of medical care, hospitals are looking at post surgery patients' home as the primary place for recovery. Unfortunately, this paradigm shift involves difficulties for patients and physiotherapists to manage the expected outcomes. While patients face physical and emotional problems related to the new hip, clinical teams have limited resources to follow patients' health experiences during their recovery. Mobile technologies for home care provide opportunities to remotely support patients in their rehabilitation process. They are designed to become part of patients' daily activities, which requires a holistic understanding of the dynamics of post-surgery treatment. Therefore, it is foreseen that requirements to design home care technologies should address clinicians' needs related to the functional aspects as well as patients' experiences of home recovery. ESTHER (Experience Sampling for Total Hip Replacement) is a research and design toolkit developed to study Total Hip Replacement (THR) patients' experiences after surgery and to evaluate design interventions to support patients in the complexity of home recovery. The tool is based on the Experience Sampling Method (ESM) to capture patients' self report on their recovery process. In an iterative approach the tool gradually added to patients' psychological reports physical activity using wireless sensor nodes. The first three iterations of ESTHER are described to illustrate the value of situated self-reports and the richness of combining both self-report and sensing techniques as a holistic approach to understand both behavioral and experiential aspects of home recovery. The experience in conducting situated design research has shown to be valuable in understanding the technical as well as social challenges and opportunities for the research and design community of home health technologies.
由于医疗费用的增加,医院正在把术后病人的家作为恢复的主要场所。不幸的是,这种模式的转变给患者和理疗师带来了管理预期结果的困难。虽然患者面临着与新髋关节相关的身体和情绪问题,但临床团队在康复期间追踪患者健康经历的资源有限。家庭护理的移动技术提供了远程支持患者康复过程的机会。它们被设计成患者日常活动的一部分,这需要对术后治疗动态的整体理解。因此,可以预见的是,设计居家护理技术的要求应该满足临床医生在功能方面的需求以及患者在家康复的体验。ESTHER (Experience Sampling for Total Hip Replacement)是一个研究和设计工具包,用于研究全髋关节置换术(THR)患者手术后的体验,并评估设计干预措施,以支持患者在复杂的家庭康复中。该工具基于经验抽样法(ESM)来获取患者关于其康复过程的自我报告。在迭代的方法中,该工具逐渐添加到患者的心理报告中,使用无线传感器节点进行身体活动。ESTHER的前三次迭代描述了情境自我报告的价值,以及将自我报告和感知技术结合起来作为一种整体方法来理解家庭康复的行为和经验方面的丰富性。在进行现场设计研究方面的经验表明,对于了解家庭健康技术的研究和设计界的技术和社会挑战和机遇是有价值的。
{"title":"ESTHER: a portable sensor toolkit to collect and monitor total hip replacement patient data","authors":"Juan Jimenez Garcia, N. R. Herrera, Simone T. Boerema, D. Keyson, P. Havinga","doi":"10.1145/2491148.2491151","DOIUrl":"https://doi.org/10.1145/2491148.2491151","url":null,"abstract":"Due to the increasing cost of medical care, hospitals are looking at post surgery patients' home as the primary place for recovery. Unfortunately, this paradigm shift involves difficulties for patients and physiotherapists to manage the expected outcomes. While patients face physical and emotional problems related to the new hip, clinical teams have limited resources to follow patients' health experiences during their recovery. Mobile technologies for home care provide opportunities to remotely support patients in their rehabilitation process. They are designed to become part of patients' daily activities, which requires a holistic understanding of the dynamics of post-surgery treatment. Therefore, it is foreseen that requirements to design home care technologies should address clinicians' needs related to the functional aspects as well as patients' experiences of home recovery. ESTHER (Experience Sampling for Total Hip Replacement) is a research and design toolkit developed to study Total Hip Replacement (THR) patients' experiences after surgery and to evaluate design interventions to support patients in the complexity of home recovery. The tool is based on the Experience Sampling Method (ESM) to capture patients' self report on their recovery process. In an iterative approach the tool gradually added to patients' psychological reports physical activity using wireless sensor nodes. The first three iterations of ESTHER are described to illustrate the value of situated self-reports and the richness of combining both self-report and sensing techniques as a holistic approach to understand both behavioral and experiential aspects of home recovery. The experience in conducting situated design research has shown to be valuable in understanding the technical as well as social challenges and opportunities for the research and design community of home health technologies.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid advancements in wireless communication technologies and micro-electronics systems have fostered the development of small and intelligent micro-components that incorporate sensing devices and wireless communications into a single miniature circuit that are wearable or implementable inside the human body for the purpose of medical and healthcare applications. These components when deployed are mainly known as WBANs for Wireless Body Area Networks. One of the main issues in such networks is the medium access techniques mainly for those data which could be urgent. The design of a medium access control protocol for a WBAN is a challenge due to the characteristics of wireless channel, the diversity of traffic, access latency and the need for minimization of energy consumption. Based on the integrated super frame structure of IEEE 802.15.4 and IEEE 802.15.6, an hybrid medium access control protocol named Priority MAC (PMAC) is proposed in this paper. In PMAC protocol, data channels are separated from control channels and the priority is given to the life critical traffic (emergency traffic). Furthermore, a sleep mode is used in order to save energy of the wearable wireless sensors and hence increase their lifetime.
{"title":"New priority MAC protocol for wireless body area networks","authors":"N. Bradai, L. Chaari, S. Boudjit, L. Kamoun","doi":"10.1145/2491148.2491149","DOIUrl":"https://doi.org/10.1145/2491148.2491149","url":null,"abstract":"The rapid advancements in wireless communication technologies and micro-electronics systems have fostered the development of small and intelligent micro-components that incorporate sensing devices and wireless communications into a single miniature circuit that are wearable or implementable inside the human body for the purpose of medical and healthcare applications. These components when deployed are mainly known as WBANs for Wireless Body Area Networks. One of the main issues in such networks is the medium access techniques mainly for those data which could be urgent. The design of a medium access control protocol for a WBAN is a challenge due to the characteristics of wireless channel, the diversity of traffic, access latency and the need for minimization of energy consumption. Based on the integrated super frame structure of IEEE 802.15.4 and IEEE 802.15.6, an hybrid medium access control protocol named Priority MAC (PMAC) is proposed in this paper. In PMAC protocol, data channels are separated from control channels and the priority is given to the life critical traffic (emergency traffic). Furthermore, a sleep mode is used in order to save energy of the wearable wireless sensors and hence increase their lifetime.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Revak R. Tyagi, Ki-Dong Lee, F. Aurzada, Sang G. Kim, M. Reisslein
Ubiquitous healthcare (u-healthcare) applications typically require the frequent transmission of small data sets, e.g., from patient monitors, over wireless networks. We consider the transmissions of such u-healthcare data over an LTE-Advanced network, where each small data set must complete the standardized random access (RA) procedure. We mathematically analyze the delay of the RA procedure and verify our analysis with simulations. We find that our delay analysis, which is the first of its kind, gives reasonably accurate delay characterization. Thus, the presented delay characterization may form the basis for network management mechanisms that ensure reliable delivery of small frequent u-health-care data sets within small delays.
{"title":"Efficient delivery of frequent small data for U-healthcare applications over LTE-advanced networks","authors":"Revak R. Tyagi, Ki-Dong Lee, F. Aurzada, Sang G. Kim, M. Reisslein","doi":"10.1145/2248341.2248354","DOIUrl":"https://doi.org/10.1145/2248341.2248354","url":null,"abstract":"Ubiquitous healthcare (u-healthcare) applications typically require the frequent transmission of small data sets, e.g., from patient monitors, over wireless networks. We consider the transmissions of such u-healthcare data over an LTE-Advanced network, where each small data set must complete the standardized random access (RA) procedure. We mathematically analyze the delay of the RA procedure and verify our analysis with simulations. We find that our delay analysis, which is the first of its kind, gives reasonably accurate delay characterization. Thus, the presented delay characterization may form the basis for network management mechanisms that ensure reliable delivery of small frequent u-health-care data sets within small delays.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jerrid E. Matthews, Farnoosh Javadi, G. Rane, J. Zheng, G. Pau, M. Gerla
Geographic location, environmental properties, and altitude are factors that contribute to the increase or decrease of the pedestrians ultraviolet (UV) exposure. Over-exposure can cause severe skin damage, possibly leading to skin cancer. This work proposes an algorithm for estimating the pedestrians UVA and UVB exposure along a path in an urban environment before stepping outdoors. The algorithm is incorporated into our UV Guardian (UVG) system. For all pedestrian path walk experiments conducted, results show that the proposed algorithm estimates the pedestrians UVB exposure with 94% accuracy. For UVA exposure estimation, the accuracy is 71%.
{"title":"Ultraviolet guardian - real time ultraviolet monitoring: estimating the pedestrians ultraviolet exposure before stepping outdoors","authors":"Jerrid E. Matthews, Farnoosh Javadi, G. Rane, J. Zheng, G. Pau, M. Gerla","doi":"10.1145/2248341.2248350","DOIUrl":"https://doi.org/10.1145/2248341.2248350","url":null,"abstract":"Geographic location, environmental properties, and altitude are factors that contribute to the increase or decrease of the pedestrians ultraviolet (UV) exposure. Over-exposure can cause severe skin damage, possibly leading to skin cancer. This work proposes an algorithm for estimating the pedestrians UVA and UVB exposure along a path in an urban environment before stepping outdoors. The algorithm is incorporated into our UV Guardian (UVG) system. For all pedestrian path walk experiments conducted, results show that the proposed algorithm estimates the pedestrians UVB exposure with 94% accuracy. For UVA exposure estimation, the accuracy is 71%.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Health brings to fruition many opportunities to continuously monitor the human body with sensors placed on body or implanted in the body. These platforms will revolutionize many application domains including health care and wellness. They provide new avenues to continuously monitor individuals, whether it is intended to detect an early onset of a disease or to assess the effectiveness of the treatment. In the past few years, new wearable applications have evolved and proved to be effective. The community has observed a large number of wireless health applications that have been developed using wearable computers. Yet, not many have been deployed in a large scale. There are still several challenges that need to be addressed before realizing the ubiquitous use of wireless health systems. In this talk, we will highlight several applications of the wireless health and wearable computers. We will describe several components of the wireless health computing systems and will outline challenges associated with their ubiquitous deployment. We will highlight current research directions and will discuss future directions.
{"title":"The challenges and opportunities in wireless health","authors":"R. Jafari","doi":"10.1145/2248341.2248343","DOIUrl":"https://doi.org/10.1145/2248341.2248343","url":null,"abstract":"Wireless Health brings to fruition many opportunities to continuously monitor the human body with sensors placed on body or implanted in the body. These platforms will revolutionize many application domains including health care and wellness. They provide new avenues to continuously monitor individuals, whether it is intended to detect an early onset of a disease or to assess the effectiveness of the treatment. In the past few years, new wearable applications have evolved and proved to be effective. The community has observed a large number of wireless health applications that have been developed using wearable computers. Yet, not many have been deployed in a large scale. There are still several challenges that need to be addressed before realizing the ubiquitous use of wireless health systems.\u0000 In this talk, we will highlight several applications of the wireless health and wearable computers. We will describe several components of the wireless health computing systems and will outline challenges associated with their ubiquitous deployment. We will highlight current research directions and will discuss future directions.","PeriodicalId":150900,"journal":{"name":"International Workshop on Pervasive Wireless Healthcare","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}