Pub Date : 2021-04-01DOI: 10.11591/IJICT.V10I1.PP46-53
Rahman Atiqur
The use of smart cities rises quickly with the fast progress of the Internet of Things (IoT) advances. The smart city idea essentially getting city life; as well raises the capability of municipal jobs and facilities plus form viable economic progress of the city. The point of convergence of this paper is to introduce an automated smart automobile parking system for smart cities demand employs internet of things (IoT) technology. The offered automobile parking system covers an IoT entity sent nearby for getting sorted out the existing parking spots which are quicker contrasted with different frameworks. It is a viewpoint gave as an iOS application for reservation, entrance, supervision, and leaving the car park places.
{"title":"Automated smart car parking system for smart cities demand employs internet of things technology","authors":"Rahman Atiqur","doi":"10.11591/IJICT.V10I1.PP46-53","DOIUrl":"https://doi.org/10.11591/IJICT.V10I1.PP46-53","url":null,"abstract":"The use of smart cities rises quickly with the fast progress of the Internet of Things (IoT) advances. The smart city idea essentially getting city life; as well raises the capability of municipal jobs and facilities plus form viable economic progress of the city. The point of convergence of this paper is to introduce an automated smart automobile parking system for smart cities demand employs internet of things (IoT) technology. The offered automobile parking system covers an IoT entity sent nearby for getting sorted out the existing parking spots which are quicker contrasted with different frameworks. It is a viewpoint gave as an iOS application for reservation, entrance, supervision, and leaving the car park places.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127277092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.11591/IJICT.V10I1.PP1-8
Ahmadizadeh Hassan, ayuba john tabakwot
Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.
{"title":"Comparative analysis on different software piracy prevention techniques","authors":"Ahmadizadeh Hassan, ayuba john tabakwot","doi":"10.11591/IJICT.V10I1.PP1-8","DOIUrl":"https://doi.org/10.11591/IJICT.V10I1.PP1-8","url":null,"abstract":"Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130682255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.11591/ijict.v9i3.pp212-220
O. Simon, U. I. Bature, K. I. Jahun, N. M. Tahir
In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
{"title":"Electronic doorbell system using keypad and GSM","authors":"O. Simon, U. I. Bature, K. I. Jahun, N. M. Tahir","doi":"10.11591/ijict.v9i3.pp212-220","DOIUrl":"https://doi.org/10.11591/ijict.v9i3.pp212-220","url":null,"abstract":"In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.11591/IJICT.V9I2.PP117-139
Wajid Hassan, T. Chou, Omar Tamer, John Pickard, Patrick Appiah-Kubi, L. Pagliari
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
{"title":"Cloud computing survey on services, enhancements and challenges in the era of machine learning and data science","authors":"Wajid Hassan, T. Chou, Omar Tamer, John Pickard, Patrick Appiah-Kubi, L. Pagliari","doi":"10.11591/IJICT.V9I2.PP117-139","DOIUrl":"https://doi.org/10.11591/IJICT.V9I2.PP117-139","url":null,"abstract":"Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122654705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-06DOI: 10.0001/IJLLIS.V9I4.2074
J. Arani
This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
{"title":"Academic insight on application and challenges of software to develop educational medical english writing","authors":"J. Arani","doi":"10.0001/IJLLIS.V9I4.2074","DOIUrl":"https://doi.org/10.0001/IJLLIS.V9I4.2074","url":null,"abstract":"This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.11591/ijict.v9i1.pp9-18
A. Ojugo, A. Eboka
Today’s popularity of the short messages services (SMS) has created a propitious environment for spamming to thrive. Spams are unsolicited advertising, adult-themed or inappropriate content, premium fraud, smishing and malware. They are a constant reminder of the need for an effective spam filter. However, SMS limitations of 160-charcaters and 140-bytes size as well as its being rippled with slangs, emoticons and abbreviations further inhibits effective training of models to aid accurate classification. The study proposes Genetic Algorithm Trained Bayesian Network solution that seeks to normalize noisy feats, expand text via use of lexicographic and semantic dictionaries that uses word sense disambiguation technique to train the underlying learning heuristics. And in turn, effectively help to classify SMS in spam and legitimate classes. Hybrid model comprises of text preprocessing, feature selection as well as training and classification section. Study uses a hybrid Genetic Algorithm trained Bayesian model for which the GA is used for feature selection; while, the Bayesian algorithm is used as classifier.
{"title":"Memetic algorithm for short messaging service spam filter using text normalization and semantic approach","authors":"A. Ojugo, A. Eboka","doi":"10.11591/ijict.v9i1.pp9-18","DOIUrl":"https://doi.org/10.11591/ijict.v9i1.pp9-18","url":null,"abstract":"Today’s popularity of the short messages services (SMS) has created a propitious environment for spamming to thrive. Spams are unsolicited advertising, adult-themed or inappropriate content, premium fraud, smishing and malware. They are a constant reminder of the need for an effective spam filter. However, SMS limitations of 160-charcaters and 140-bytes size as well as its being rippled with slangs, emoticons and abbreviations further inhibits effective training of models to aid accurate classification. The study proposes Genetic Algorithm Trained Bayesian Network solution that seeks to normalize noisy feats, expand text via use of lexicographic and semantic dictionaries that uses word sense disambiguation technique to train the underlying learning heuristics. And in turn, effectively help to classify SMS in spam and legitimate classes. Hybrid model comprises of text preprocessing, feature selection as well as training and classification section. Study uses a hybrid Genetic Algorithm trained Bayesian model for which the GA is used for feature selection; while, the Bayesian algorithm is used as classifier.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133454684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-13DOI: 10.11591/ijict.v8i3.pp117-121
C. Balamurugan, P. Vijayakumar
Gas sensing technology has become topical research work for quite some time and we also want to protect our home asserts from any kind of hazards. In this work we take an overview on how to protect our home from fire and its safety issues based on wireless sensor network using wifi and cloud technologies. It also showcases the research done on the detection mechanism of leakage of domestic cooking gas at ambient condition. It can detect the fire, leakage of gas or smoke and sends an auto-generated email remotely to intimate the owner. We survey and examine the existing work in security system and its applications.
{"title":"Cloud connected smart home gas cylinder platform based wifi control","authors":"C. Balamurugan, P. Vijayakumar","doi":"10.11591/ijict.v8i3.pp117-121","DOIUrl":"https://doi.org/10.11591/ijict.v8i3.pp117-121","url":null,"abstract":"Gas sensing technology has become topical research work for quite some time and we also want to protect our home asserts from any kind of hazards. In this work we take an overview on how to protect our home from fire and its safety issues based on wireless sensor network using wifi and cloud technologies. It also showcases the research done on the detection mechanism of leakage of domestic cooking gas at ambient condition. It can detect the fire, leakage of gas or smoke and sends an auto-generated email remotely to intimate the owner. We survey and examine the existing work in security system and its applications.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-13DOI: 10.11591/ijict.v8i3.pp152-161
Asbartanov Lase, B. Ranti
This research was conducted to develop the Indonesian Government Enterprise Architecture (IGEA) framework which is suitable for Indonesian government agencies. Due to their complexity and expensive implementation cost, existing EA frameworks such as TOGAF and Zachman have so far not been the choice for building GEA by some countries including Australia and New Zealand. Those countries have built their own GEA namely Australia’s AGA and New Zealand’s GEA-NZ, respectively. Learning from this experience, the authors did a research to build Indonesia’s GEA or IGEA. This paper explains the research process which starts from mapping or comparing TOGAF, AGA, and GEA-NZ frameworks to get the underlying foundation for building GEA, analyzing framework artifacts, to building IGEA by adding specific Indonesian regulations and policies such as RPJMN and Nawacita. This IGEA framework is expected to become a reference for developing EA not only at institutional level but also the most important thing at national or cross institutional level, in order to increase the effectiveness of government IT spending.
{"title":"Developing the indonesian government enterprise architecture framework appropriate for Indonesian government agencies","authors":"Asbartanov Lase, B. Ranti","doi":"10.11591/ijict.v8i3.pp152-161","DOIUrl":"https://doi.org/10.11591/ijict.v8i3.pp152-161","url":null,"abstract":"This research was conducted to develop the Indonesian Government Enterprise Architecture (IGEA) framework which is suitable for Indonesian government agencies. Due to their complexity and expensive implementation cost, existing EA frameworks such as TOGAF and Zachman have so far not been the choice for building GEA by some countries including Australia and New Zealand. Those countries have built their own GEA namely Australia’s AGA and New Zealand’s GEA-NZ, respectively. Learning from this experience, the authors did a research to build Indonesia’s GEA or IGEA. This paper explains the research process which starts from mapping or comparing TOGAF, AGA, and GEA-NZ frameworks to get the underlying foundation for building GEA, analyzing framework artifacts, to building IGEA by adding specific Indonesian regulations and policies such as RPJMN and Nawacita. This IGEA framework is expected to become a reference for developing EA not only at institutional level but also the most important thing at national or cross institutional level, in order to increase the effectiveness of government IT spending.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.11591/IJICT.V8I2.PP102-110
C. A. Rayed
Business intelligence comprises of tools and applications that are leverages software and services to translate data into intelligent actions for strategic, tactical and operational decisions. The intelligent business solution facilitates and develops the service provided to the market researchers, saves time and effort needed to identify the customers predict demand and manage production more efficiently, ability to explore possibilities to increase revenue. The purpose of this paper is using business intelligence solutions for forecasting in Marketing Researches. The intelligence solutions are helping the market researchers to achieve efficiency, effectiveness, and differentiation.
{"title":"Using business intelligence solutions for forecasting in marketing researches","authors":"C. A. Rayed","doi":"10.11591/IJICT.V8I2.PP102-110","DOIUrl":"https://doi.org/10.11591/IJICT.V8I2.PP102-110","url":null,"abstract":"<span style=\"font-size: xx-small;\"><span style=\"line-height: normal;\">Business intelligence comprises of tools and applications that are leverages software and services to translate data into intelligent actions for strategic, tactical and operational decisions. The intelligent business solution facilitates and develops the service provided to the market researchers, saves time and effort needed to identify the customers predict demand and manage production more efficiently, ability to explore possibilities to increase revenue. The purpose of this paper is using business intelligence solutions for forecasting in Marketing Researches. The intelligence solutions are helping the market researchers to achieve efficiency, effectiveness, and differentiation.</span></span>","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"479 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-20DOI: 10.11591/IJICT.V8I2.PP71-76
Kumar Keshamoni
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
医院里的病人会遇到用电线连接身体的医疗器械的问题。有线医疗仪器限制了患者的质量。此外,卫生保健区单位强制使用工作工具和措施。因此,无线观察患者是非常有效的解决其缺点。本研究的主要目的是分析医院内患者无线监护的现状和前景。本研究旨在建立一个实现无线观测的缩影系统。除此之外,本文还共同研究了构建最有效的无线观测系统的最合适技术。设计了缩影的传感元件节点和接收器。使用傀儡电话作为入口,接收来自传感元件节点的信息并将信息转发到接收器。低功耗蓝牙用于传感元件节点与傀儡手机之间的通信。局域网用于傀儡电话和连接到笔记本电脑的接收器之间的通话。传感元件读数在Arduino Serial Monitor中初始确定,然后发送到sink节点。身体的感应元件读数显示在傀儡手机上,但也显示在网站上。创建了传感元件的实时信息,并成功地在网站内更新。结果和工程研究表明,利用无干扰、变化短、极安全的通信方式进行无线观测是非常有效的。蓝牙低功耗,是系统的合适选择。风格的传感元件节点应该非常小,因为它是佩戴在身体周围。因此,应该使用较小的部件。
{"title":"Design and architecture of wireless body area network using android application","authors":"Kumar Keshamoni","doi":"10.11591/IJICT.V8I2.PP71-76","DOIUrl":"https://doi.org/10.11591/IJICT.V8I2.PP71-76","url":null,"abstract":"Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}