Robot formation is one of the significant research directions in humanitarian, tactical, as well as space missions. For a task that requires multiple autonomous robots to work together as a team, coordinating positions each with respect to the other is essential. Therefore, a proper communication mechanism that periodically or aperiodically sends the path information is very important. The communication channel characteristics may impair the accuracy of robot formation. Further, terrain characteristics offer another constraint to have a perfect synchronization of paths between robots of a formation. In this paper, we study path deviations of the follower robot with respect to a leader robot, in an environment that has unpredictable obstacles and communication delays by modeling and simulating the virtual environment. We identified the impact of packet loss and obstacles distribution on the formation accuracy. For accurate formation or reducing the mean path deviation, periodic messaging is preferred in comparison to aperiodic messaging between leader and followers. Our results are useful for designing future robot formations for humanitarian, tactical, and space related applications.
{"title":"The impact of communication and terrain characteristics on the accuracy of robot formation","authors":"Aarathi Muppalla, B. S. Manoj","doi":"10.1145/2185216.2185342","DOIUrl":"https://doi.org/10.1145/2185216.2185342","url":null,"abstract":"Robot formation is one of the significant research directions in humanitarian, tactical, as well as space missions. For a task that requires multiple autonomous robots to work together as a team, coordinating positions each with respect to the other is essential. Therefore, a proper communication mechanism that periodically or aperiodically sends the path information is very important. The communication channel characteristics may impair the accuracy of robot formation. Further, terrain characteristics offer another constraint to have a perfect synchronization of paths between robots of a formation. In this paper, we study path deviations of the follower robot with respect to a leader robot, in an environment that has unpredictable obstacles and communication delays by modeling and simulating the virtual environment. We identified the impact of packet loss and obstacles distribution on the formation accuracy. For accurate formation or reducing the mean path deviation, periodic messaging is preferred in comparison to aperiodic messaging between leader and followers. Our results are useful for designing future robot formations for humanitarian, tactical, and space related applications.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ubiquitous presence and ease of connectivity for mobile devices are the driving force for the popularity of wireless networks. With the widespread usage, provisioning quality and securing wireless communication has become crucial necessities. However, the inherent characteristic of wireless networks, namely, unguided medium, variable link qualities, and interferences, create impositions to the quality and security concerns. In this talk, we will overview two of our recent efforts: quality provisioning for video services over wireless networks, and techniques for securing wireless communications by exploiting wireless physical layer characteristics. We will discuss quality metrics for video over wireless and recent works on bootstrapping secure association between nearby devices, generating shared secret-key from wireless channels, and detecting identity based attacks in wireless networks. Experimental implementations and evaluations will be presented to validate the proposed schemes. We will conclude the talk with an overview of our wireless experimental test-bed: QuRiNet.
{"title":"Security and quality provisioning in wireless networks","authors":"P. Mohapatra","doi":"10.1145/2185216.2185320","DOIUrl":"https://doi.org/10.1145/2185216.2185320","url":null,"abstract":"The ubiquitous presence and ease of connectivity for mobile devices are the driving force for the popularity of wireless networks. With the widespread usage, provisioning quality and securing wireless communication has become crucial necessities. However, the inherent characteristic of wireless networks, namely, unguided medium, variable link qualities, and interferences, create impositions to the quality and security concerns. In this talk, we will overview two of our recent efforts: quality provisioning for video services over wireless networks, and techniques for securing wireless communications by exploiting wireless physical layer characteristics. We will discuss quality metrics for video over wireless and recent works on bootstrapping secure association between nearby devices, generating shared secret-key from wireless channels, and detecting identity based attacks in wireless networks. Experimental implementations and evaluations will be presented to validate the proposed schemes. We will conclude the talk with an overview of our wireless experimental test-bed: QuRiNet.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, it has been a challenge to design and implement remote health care and monitoring services, with an objective to extend instant cost effective treatment and supply of life saving drugs. There are specialized disciplines in medical sciences for consultation, services, and surgery. Tele medicine is one such area of service through which the aged, rural residents and dwellers of remote hilly and highland areas can be benefited. Often, people in these areas suffer from disease like Obstructive Sleep Apnea (OSA), hypertension, cardiovascular problems, obesity, diabetes etc., or respiratory diseases like asthma, pulmonology related to lungs and so on with a high risk of mortality. In this paper, we propose a Petri Net based framework for analysis and integration of tele-health monitoring service systems over wireless and hybrid networks.
{"title":"Distributed framework for tele health monitoring system","authors":"B. Sarkar, S. Sanyal, N. Chaki","doi":"10.1145/2185216.2185318","DOIUrl":"https://doi.org/10.1145/2185216.2185318","url":null,"abstract":"In recent years, it has been a challenge to design and implement remote health care and monitoring services, with an objective to extend instant cost effective treatment and supply of life saving drugs. There are specialized disciplines in medical sciences for consultation, services, and surgery. Tele medicine is one such area of service through which the aged, rural residents and dwellers of remote hilly and highland areas can be benefited. Often, people in these areas suffer from disease like Obstructive Sleep Apnea (OSA), hypertension, cardiovascular problems, obesity, diabetes etc., or respiratory diseases like asthma, pulmonology related to lungs and so on with a high risk of mortality. In this paper, we propose a Petri Net based framework for analysis and integration of tele-health monitoring service systems over wireless and hybrid networks.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Monitoring activities of daily living of senior citizens especially those who live alone as well as those who have certain motion disorders such as Alzheimer's and Parkinson's is increasingly possible and very useful for healthcare purposes. This kind of pervasive and remote monitoring is possible due to availability of "on-body" sensors that combine sophisticated inertial sensing, wireless communication and signal processing technologies. The inertial sensors being electro-mechanical in nature are susceptible to errors and faults. In typical wireless sensor systems, such errors and faults are overcome by deploying large number of sensor nodes and taking a majority of the sensed values. However, in the case of on-body sensors, it may be highly inconvenient for an elderly person to wear a large number of sensors. Similar to on-body sensors, tiny electro-magnetic sensors are beginning to be used for tracking tongue movements during speaking. This breakthrough technology can give insights into how we as humans produce sound and these insights can help better train speech impairments. Considering the inconvenience in using such tongue sensors, it will be important to minimize the number of tongue sensors needed for a particular requirement. In this talk, we address the issue of identifying and isolating faulty sensors as well as minimize the number of needed sensors for remote monitoring of daily living activities and tongue movement tracking. We discuss issues such as: (i) faulty node identification when a small number of body sensors is deployed; (ii) identification of such a faulty node based on sensor node groups that share similar sensor signal patterns; and (iii) minimize the number of sensors needed for a particular application.
{"title":"Sensing health: fault detection, isolation, and minimization of on-body sensors","authors":"B. Prabhakaran, A. Balasubramanian","doi":"10.1145/2185216.2185315","DOIUrl":"https://doi.org/10.1145/2185216.2185315","url":null,"abstract":"Monitoring activities of daily living of senior citizens especially those who live alone as well as those who have certain motion disorders such as Alzheimer's and Parkinson's is increasingly possible and very useful for healthcare purposes. This kind of pervasive and remote monitoring is possible due to availability of \"on-body\" sensors that combine sophisticated inertial sensing, wireless communication and signal processing technologies. The inertial sensors being electro-mechanical in nature are susceptible to errors and faults. In typical wireless sensor systems, such errors and faults are overcome by deploying large number of sensor nodes and taking a majority of the sensed values. However, in the case of on-body sensors, it may be highly inconvenient for an elderly person to wear a large number of sensors. Similar to on-body sensors, tiny electro-magnetic sensors are beginning to be used for tracking tongue movements during speaking. This breakthrough technology can give insights into how we as humans produce sound and these insights can help better train speech impairments. Considering the inconvenience in using such tongue sensors, it will be important to minimize the number of tongue sensors needed for a particular requirement. In this talk, we address the issue of identifying and isolating faulty sensors as well as minimize the number of needed sensors for remote monitoring of daily living activities and tongue movement tracking. We discuss issues such as: (i) faulty node identification when a small number of body sensors is deployed; (ii) identification of such a faulty node based on sensor node groups that share similar sensor signal patterns; and (iii) minimize the number of sensors needed for a particular application.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amateur radio has made significant contributions to science, industry, and the social services. The economic and social benefit derived from amateur radio research has founded new industries, built economies, empowered nations, and saved lives. Amateur radio represents a unique research and development (R&D) environment that cannot be duplicated in the labs or research parks of either industry or the government. Existing at the intersection of the social, economic, cultural and scientific spheres, amateur radio leverages this position to invent and innovate from a unique perspective. Many now-commonplace communication technologies have their genesis in amateur radio.
{"title":"Amateur radio in emergency communications advanced digital communication network","authors":"S. Suri","doi":"10.1145/2185216.2185233","DOIUrl":"https://doi.org/10.1145/2185216.2185233","url":null,"abstract":"Amateur radio has made significant contributions to science, industry, and the social services. The economic and social benefit derived from amateur radio research has founded new industries, built economies, empowered nations, and saved lives. Amateur radio represents a unique research and development (R&D) environment that cannot be duplicated in the labs or research parks of either industry or the government. Existing at the intersection of the social, economic, cultural and scientific spheres, amateur radio leverages this position to invent and innovate from a unique perspective. Many now-commonplace communication technologies have their genesis in amateur radio.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Communication is vital during natural calamities, disasters and military operation. In the past few decades, security in the military operations is exposed to vulnerabilities like sniffing the information and modifying the data causing havoc in military camps. Consequently military applications required a secure way to exchange the data and stay away from enemy intrusion. Recent trends in military operations need a portable way of communicating between the units, quality of service and security to be full-fledged. However, in MANET mobile entities are prone to various security attacks due to dynamic changing topology, open medium and inhibited by limited energy, bandwidth and computational power. The paper addresses the security issues by incorporating the concept of Trust and Certification Authority to combat the misbehaving entities. Certificate Authority employs Fuzzy based analyzer to distinguish between trusted and malicious behavior of nodes by distributing the certificates only to the trusted nodes and detecting the misbehaving node. The proposed scheme is more secure, reliable and aids to improve the security in military operations.
{"title":"An approach for detection of malicious node using fuzzy based trust levels in MANET","authors":"V. Manoj, N. Raghavendiran, M. Aaqib, R. Vijayan","doi":"10.1145/2185216.2185337","DOIUrl":"https://doi.org/10.1145/2185216.2185337","url":null,"abstract":"Wireless Communication is vital during natural calamities, disasters and military operation. In the past few decades, security in the military operations is exposed to vulnerabilities like sniffing the information and modifying the data causing havoc in military camps. Consequently military applications required a secure way to exchange the data and stay away from enemy intrusion. Recent trends in military operations need a portable way of communicating between the units, quality of service and security to be full-fledged. However, in MANET mobile entities are prone to various security attacks due to dynamic changing topology, open medium and inhibited by limited energy, bandwidth and computational power. The paper addresses the security issues by incorporating the concept of Trust and Certification Authority to combat the misbehaving entities. Certificate Authority employs Fuzzy based analyzer to distinguish between trusted and malicious behavior of nodes by distributing the certificates only to the trusted nodes and detecting the misbehaving node. The proposed scheme is more secure, reliable and aids to improve the security in military operations.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132644768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Talat Iqbal, T. V. Vaidyanath, R. Gunasekaran
The emergence of proper reservation techniques to acquire the channel in Mobile Ad hoc Network is main concern when there is a random, unstipulated and insecure communication. The denial of proper channel causes the foe nodes to cause virtual jamming, thereby preventing the legitimate nodes to communicate especially in the real time scenario where the time factor is very critical. To avoid this, a proper architecture along with a specialized medium access method is necessary. The method employed here is to use a hierarchical-like network forming subworkgroups that define clusters of nodes formed randomly. These clusters propose their own way to allocate the channels for the specific nodes at both the intra-level and inter-level. Also a specialized MAC protocol, Dual Tone Multiple Control Channel [DSMCL] protocol has been formulated based on the busy tone protocol. This protocol also ensures the Quality of Service which reduces the overhead of the upper layers. The mobile nodes follow their own routing protocols for forwarding of packets within the domain and redistribute them for interoperability. While the inter-level channel acquisition is by means of allocation/relocation algorithms, at the intra level, they are carried out using the CTSP (Cell/Technology Selection Problem) pattern. This ensures that a genuine node ready to communicate is not trapped by the malicious node communicating with them forever.
在随机、不规范、不安全的移动自组网中,如何采用适当的信道保留技术获取信道是人们关注的问题。对正常信道的拒绝会导致敌方节点产生虚拟干扰,从而阻碍合法节点的通信,特别是在时间因素非常关键的实时场景中。为了避免这种情况,需要适当的体系结构和专门的媒体访问方法。这里采用的方法是使用类似层级的网络来形成子工作组,这些子工作组定义随机形成的节点集群。这些集群在层内和层间提出了自己的方式来为特定节点分配通道。双音多控制通道(Dual Tone Multiple Control Channel, DSMCL)协议是在忙音协议的基础上形成的一种专用的MAC协议。该协议还保证了服务质量,从而减少了上层的开销。移动节点遵循自己的路由协议来转发域内的数据包,并重新分发它们以实现互操作性。虽然层间信道获取是通过分配/重新定位算法实现的,但在层内,它们是使用CTSP(小区/技术选择问题)模式进行的。这确保了准备通信的真实节点不会被永远与它们通信的恶意节点所捕获。
{"title":"Guaranteeing secure transmission in time critical networks through dual sense multiple control channel protocol","authors":"Syed Talat Iqbal, T. V. Vaidyanath, R. Gunasekaran","doi":"10.1145/2185216.2185322","DOIUrl":"https://doi.org/10.1145/2185216.2185322","url":null,"abstract":"The emergence of proper reservation techniques to acquire the channel in Mobile Ad hoc Network is main concern when there is a random, unstipulated and insecure communication. The denial of proper channel causes the foe nodes to cause virtual jamming, thereby preventing the legitimate nodes to communicate especially in the real time scenario where the time factor is very critical. To avoid this, a proper architecture along with a specialized medium access method is necessary. The method employed here is to use a hierarchical-like network forming subworkgroups that define clusters of nodes formed randomly. These clusters propose their own way to allocate the channels for the specific nodes at both the intra-level and inter-level. Also a specialized MAC protocol, Dual Tone Multiple Control Channel [DSMCL] protocol has been formulated based on the busy tone protocol. This protocol also ensures the Quality of Service which reduces the overhead of the upper layers. The mobile nodes follow their own routing protocols for forwarding of packets within the domain and redistribute them for interoperability. While the inter-level channel acquisition is by means of allocation/relocation algorithms, at the intra level, they are carried out using the CTSP (Cell/Technology Selection Problem) pattern. This ensures that a genuine node ready to communicate is not trapped by the malicious node communicating with them forever.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"94 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicular networking is an important emerging area having immense applications, ranging from road-safety to emergency communications in disaster situations. As more applications begin to take advantage of vehicular networks, correctness of the underlying protocols must be subjected to rigorous analysis. The π-calculus is a formal language for specifying mobile systems and has been applied in wide range of settings, from specifying security protocols to modeling biomolecular systems. In this paper, we use π-calculus to construct a formal specification of a cross-layer dual-radio handoff algorithm for vehicular networks. The main challenge in this work was to use the minimal set of highly expressive and powerful constructs of π-calculus to model protocol agents at the right level of abstraction. To give two instances of our approach: (a) the two radios involved in handoff are modelled as concurrent sub-processes of the mobile node process; (b) route to the gateway is modelled as a channel that the access point supplies to both the gateway and the mobile node, both of which are modelled as concurrent processes. We formulate representative properties in a branching-time temporal logic and verify our protocol specification against these properties. Our study shows that π-calculus is a suitable formalism for modeling and verifying vehicular protocols.
{"title":"Formal specification and verification of vehicular handoff using π-calculus","authors":"Jayaraj Poroor, B. Jayaraman","doi":"10.1145/2185216.2185268","DOIUrl":"https://doi.org/10.1145/2185216.2185268","url":null,"abstract":"Vehicular networking is an important emerging area having immense applications, ranging from road-safety to emergency communications in disaster situations. As more applications begin to take advantage of vehicular networks, correctness of the underlying protocols must be subjected to rigorous analysis. The π-calculus is a formal language for specifying mobile systems and has been applied in wide range of settings, from specifying security protocols to modeling biomolecular systems. In this paper, we use π-calculus to construct a formal specification of a cross-layer dual-radio handoff algorithm for vehicular networks. The main challenge in this work was to use the minimal set of highly expressive and powerful constructs of π-calculus to model protocol agents at the right level of abstraction. To give two instances of our approach: (a) the two radios involved in handoff are modelled as concurrent sub-processes of the mobile node process; (b) route to the gateway is modelled as a channel that the access point supplies to both the gateway and the mobile node, both of which are modelled as concurrent processes. We formulate representative properties in a branching-time temporal logic and verify our protocol specification against these properties. Our study shows that π-calculus is a suitable formalism for modeling and verifying vehicular protocols.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Self-Organization properties of the nodes in wireless network play an important role in achieving network wide characteristics. In harsh conditions where network connectivity is less, increasing connectivity with faster data transmission is clearly an area of research. Connectivity of the nodes is dependent on many factors like, energy, position, mobility and environmental changes. Modeling an algorithm that can increase the connectivity despite above mentioned factors is a challenge that we have tried to investigate. Faster data transmissions can be achieved by reducing average path length from source to destination. In real networks, however, increasing connectivity and reducing average path length is a hard task. One way to reduce average path lengths is by the use of Small World phenomenon. Thus here in this work we try to investigate how Small World phenomenon can help us in our goal of achieving higher connectivity and reduced average path length. Our model results show that using Small World connectivity can also be increased with the reduction in the average path length.
{"title":"Design issues in self-organizing wireless sensor networks","authors":"M. Becker","doi":"10.1145/2185216.2185259","DOIUrl":"https://doi.org/10.1145/2185216.2185259","url":null,"abstract":"Self-Organization properties of the nodes in wireless network play an important role in achieving network wide characteristics. In harsh conditions where network connectivity is less, increasing connectivity with faster data transmission is clearly an area of research. Connectivity of the nodes is dependent on many factors like, energy, position, mobility and environmental changes. Modeling an algorithm that can increase the connectivity despite above mentioned factors is a challenge that we have tried to investigate. Faster data transmissions can be achieved by reducing average path length from source to destination. In real networks, however, increasing connectivity and reducing average path length is a hard task. One way to reduce average path lengths is by the use of Small World phenomenon. Thus here in this work we try to investigate how Small World phenomenon can help us in our goal of achieving higher connectivity and reduced average path length. Our model results show that using Small World connectivity can also be increased with the reduction in the average path length.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chinmoy Mukherjee, K. Gupta, R. Nallusamy, S. Kalra
Wireless technologies are evolving in rapid pace and becoming cheaper - this can be used to facilitate providing primary healthcare services in rural India. We have built a decision support system which can provide first level assessment of a patient by taking all the symptoms as well as vital parameters like heart rate, blood pressure, etc. It can also provide some basic treatment suggestions like Oral Rehydration Salts (ORS) for diarrhea, etc. The patient details as well as assessment can be uploaded to a server, which can be assessed by a doctor to provide actual treatment. The patient details can also be used for analytical purpose for drafting plans for future by Government agencies. The system also works as personal assistant for ASHA (Accredited Social Health Activist) health workers to assist them to do their job efficiently. This system mainly has three components: Mobile Client, Server and Database. Mobile clients are used to collect data from patients and provide first level assessment. Server component will process the data for the purpose of analysis and Authorized Doctors can retrieve patient details, ask few more questions to the patient via ASHA worker and can provide treatments over SMS or email. Database system will be used to archive data for analysis purposes.
{"title":"A system to provide primary healthcare services to rural India more efficiently and transparently","authors":"Chinmoy Mukherjee, K. Gupta, R. Nallusamy, S. Kalra","doi":"10.1145/2185216.2185317","DOIUrl":"https://doi.org/10.1145/2185216.2185317","url":null,"abstract":"Wireless technologies are evolving in rapid pace and becoming cheaper - this can be used to facilitate providing primary healthcare services in rural India. We have built a decision support system which can provide first level assessment of a patient by taking all the symptoms as well as vital parameters like heart rate, blood pressure, etc. It can also provide some basic treatment suggestions like Oral Rehydration Salts (ORS) for diarrhea, etc. The patient details as well as assessment can be uploaded to a server, which can be assessed by a doctor to provide actual treatment. The patient details can also be used for analytical purpose for drafting plans for future by Government agencies. The system also works as personal assistant for ASHA (Accredited Social Health Activist) health workers to assist them to do their job efficiently. This system mainly has three components: Mobile Client, Server and Database. Mobile clients are used to collect data from patients and provide first level assessment. Server component will process the data for the purpose of analysis and Authorized Doctors can retrieve patient details, ask few more questions to the patient via ASHA worker and can provide treatments over SMS or email. Database system will be used to archive data for analysis purposes.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}