Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323003
H. D. Tsague, Bhekisipho Twala
Although cryptography constitutes a considerable part of the overall security architecture for several use cases in embedded systems, cryptographic devices are still vulnerable to the diversity types of side channel attacks. Improvement in performance of Strained Silicon MOSFETs utilizing conventional device scaling has become more complex, because of the amount of physical limitations associated with the device miniaturization. Therefore, a great deal of attention has recently been paid to the mobility improvement technology through applying strain to CMOS channels. This paper reviews the characteristics of strained-Si CMOS with an emphasis on the mechanism of mobility enhancement due to strain. The device physics for improving the performance of MOSFETs is studied from the viewpoint of electronic states of carriers in inversion layers and, in particular, the sub-band structures. In addition, design and simulation of biaxial strained silicon NMOSFET (n-channel) is done using Silvaco's Athena/Atlas simulator. From the results obtained, it became clear that biaxial strained silicon NMOS is one of the best alternatives to the current conventional MOSFET.
{"title":"Simulation and parameter optimization of polysilicon gate biaxial strained silicon MOSFETs","authors":"H. D. Tsague, Bhekisipho Twala","doi":"10.1109/ICDIPC.2015.7323003","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323003","url":null,"abstract":"Although cryptography constitutes a considerable part of the overall security architecture for several use cases in embedded systems, cryptographic devices are still vulnerable to the diversity types of side channel attacks. Improvement in performance of Strained Silicon MOSFETs utilizing conventional device scaling has become more complex, because of the amount of physical limitations associated with the device miniaturization. Therefore, a great deal of attention has recently been paid to the mobility improvement technology through applying strain to CMOS channels. This paper reviews the characteristics of strained-Si CMOS with an emphasis on the mechanism of mobility enhancement due to strain. The device physics for improving the performance of MOSFETs is studied from the viewpoint of electronic states of carriers in inversion layers and, in particular, the sub-band structures. In addition, design and simulation of biaxial strained silicon NMOSFET (n-channel) is done using Silvaco's Athena/Atlas simulator. From the results obtained, it became clear that biaxial strained silicon NMOS is one of the best alternatives to the current conventional MOSFET.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323026
Imad Bou Hamad, A. Anouze
This study introduces a three-stage integrated framework consisting of data envelopment analysis (DEA), random forest, and logistic regression to examine and predict the impact of environmental variables on banks' performance. This framework identified five important environmental variables and their effects on bank performance when applied to 151 banks in Middle East and North African (MENA) countries over the period 2008-2010.
{"title":"Bank efficiency assessment using a hybrid approach of random forests and data envelopment analysis","authors":"Imad Bou Hamad, A. Anouze","doi":"10.1109/ICDIPC.2015.7323026","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323026","url":null,"abstract":"This study introduces a three-stage integrated framework consisting of data envelopment analysis (DEA), random forest, and logistic regression to examine and predict the impact of environmental variables on banks' performance. This framework identified five important environmental variables and their effects on bank performance when applied to 151 banks in Middle East and North African (MENA) countries over the period 2008-2010.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132428516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323023
Mohannad Ibrahim, Abdelghafor Elgamri, S. Babiker, Ahmed Mohamed
This paper proposes an approach to build a cost-effective standardized environmental monitoring device using the Raspberry-Pi (R-Pi) single-board computer. The system was designed using Python Programming language and can be controlled and accessed remotely through an Internet of Things platform. It takes information about the surrounding environment through sensors and uploads it directly to the internet, where it can be accessed anytime and anywhere through internet. Experimental results demonstrated that the system is able to accurately measure: temperature, humidity, light level and concentrations of the carbon monoxide harmful air pollutant. It's also designed to detect earthquakes through an assembled seismic sensor.
{"title":"Internet of things based smart environmental monitoring using the Raspberry-Pi computer","authors":"Mohannad Ibrahim, Abdelghafor Elgamri, S. Babiker, Ahmed Mohamed","doi":"10.1109/ICDIPC.2015.7323023","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323023","url":null,"abstract":"This paper proposes an approach to build a cost-effective standardized environmental monitoring device using the Raspberry-Pi (R-Pi) single-board computer. The system was designed using Python Programming language and can be controlled and accessed remotely through an Internet of Things platform. It takes information about the surrounding environment through sensors and uploads it directly to the internet, where it can be accessed anytime and anywhere through internet. Experimental results demonstrated that the system is able to accurately measure: temperature, humidity, light level and concentrations of the carbon monoxide harmful air pollutant. It's also designed to detect earthquakes through an assembled seismic sensor.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323011
N. Mekloi
Because equal gain diversity does not require estimation of the channel fading amplitudes, it is often used in practical as reduced complexity alternative to the maximal ratio processing. This paper develops an exact formulation in order to investigate the performance of equal gain combining. The approach of this paper and its main contribution is to model the Gaussian channel of aircraft global positioning systems. The performance is interested in the exact outage probability of dual branch equal gain combining in wireless system in presence of co-channel interference. The more general scenario of unequal power co-channel interferer is also formulated and derived. As the results, the closed form solution of outage probability corresponds to a Rayleigh fading.
{"title":"Theoretical reliability of dual GPS antennas over wireless fading channel","authors":"N. Mekloi","doi":"10.1109/ICDIPC.2015.7323011","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323011","url":null,"abstract":"Because equal gain diversity does not require estimation of the channel fading amplitudes, it is often used in practical as reduced complexity alternative to the maximal ratio processing. This paper develops an exact formulation in order to investigate the performance of equal gain combining. The approach of this paper and its main contribution is to model the Gaussian channel of aircraft global positioning systems. The performance is interested in the exact outage probability of dual branch equal gain combining in wireless system in presence of co-channel interference. The more general scenario of unequal power co-channel interferer is also formulated and derived. As the results, the closed form solution of outage probability corresponds to a Rayleigh fading.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125519423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323033
Raid Saabni
Facial expression analysis and recognition have been researched since the 17'th century. The foundational studies on facial expressions, which have formed the basis of today's research, can be traced back to few centuries ago. Precisely, a detailed note on the various expressions and movements of head muscles was given in 1649 by John Bulwer(1). Another important milestone in the study of facial expressions and human emotions, is the work done by the psychologist Paul Ekman(2) and his colleagues. This important work have been done in the 1970s and has a significant importance and large influence on the development of modern day automatic facial expression recognizers. This work lead to adapting and developing the comprehensive Facial Action Coding System(FACS), which has since then become the de-facto standard for facial expression recognition. Over the last decades, automatic facial expressions analysis has become an active research area that finds potential applications in fields such as Human-Computer Interfaces (HCI), Image Retrieval, Security and Human Emotion Analysis. Facial expressions are extremely important in any human interaction, and additional to emotions, it also reflects on other mental activities, social interaction and physiological signals. In this paper, we proposes an Artificial Neural Network (ANN) of two hidden layers, based on multiple Radial Bases Functions Networks (RBFN's) to recognize facial expressions. The ANN, is trained on features extracted from images by applying a multi-scale and multi-orientation Gabor filters. We have considered the cases of subject independent/dependent facial expression recognition using The JAFFE and the CK+ benchmarks to evaluate the proposed model.
{"title":"Facial expression recognition using multi Radial Bases Function Networks and 2-D Gabor filters","authors":"Raid Saabni","doi":"10.1109/ICDIPC.2015.7323033","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323033","url":null,"abstract":"Facial expression analysis and recognition have been researched since the 17'th century. The foundational studies on facial expressions, which have formed the basis of today's research, can be traced back to few centuries ago. Precisely, a detailed note on the various expressions and movements of head muscles was given in 1649 by John Bulwer(1). Another important milestone in the study of facial expressions and human emotions, is the work done by the psychologist Paul Ekman(2) and his colleagues. This important work have been done in the 1970s and has a significant importance and large influence on the development of modern day automatic facial expression recognizers. This work lead to adapting and developing the comprehensive Facial Action Coding System(FACS), which has since then become the de-facto standard for facial expression recognition. Over the last decades, automatic facial expressions analysis has become an active research area that finds potential applications in fields such as Human-Computer Interfaces (HCI), Image Retrieval, Security and Human Emotion Analysis. Facial expressions are extremely important in any human interaction, and additional to emotions, it also reflects on other mental activities, social interaction and physiological signals. In this paper, we proposes an Artificial Neural Network (ANN) of two hidden layers, based on multiple Radial Bases Functions Networks (RBFN's) to recognize facial expressions. The ANN, is trained on features extracted from images by applying a multi-scale and multi-orientation Gabor filters. We have considered the cases of subject independent/dependent facial expression recognition using The JAFFE and the CK+ benchmarks to evaluate the proposed model.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"39 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICDIPC.2015.7323025
Atif Khan, N. Salim, Y. J. Kumar
The aim of automatic multi-document abstractive summarization is to create a compressed version of the source text and preserves the salient information. Existing graph based summarization methods treat sentence as bag of words, rely on content similarity measure and did not consider semantic relationships between sentences. These methods may fail in determining redundant sentences that are semantically equivalent. This paper introduces a genetic semantic graph based approach for multi-document abstractive summarization. Semantic graph from the document set is constructed in such a way that the graph nodes represent the predicate argument structures (PASs), extracted automatically by employing semantic role labeling (SRL); and the edges of graph correspond to semantic similarity weight determined from PAS-to-PAS semantic similarity, and PAS-to-document set relationship. The PAS-to-document set relationship is represented by different features, weighted and optimized by genetic algorithm. The salient graph nodes (PASs) are ranked based on modified graph based ranking algorithm. In order to reduce redundancy, we utilize maximal marginal relevance (MMR) to re-ranks the PASs and use language generation to generate summary sentences from the top ranked PASs. Experiment of this study is carried out using DUC-2002, a standard corpus for text summarization. Experimental results reveal that the proposed approach performs better than other summarization systems.
{"title":"Genetic semantic graph approach for multi-document abstractive summarization","authors":"Atif Khan, N. Salim, Y. J. Kumar","doi":"10.1109/ICDIPC.2015.7323025","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323025","url":null,"abstract":"The aim of automatic multi-document abstractive summarization is to create a compressed version of the source text and preserves the salient information. Existing graph based summarization methods treat sentence as bag of words, rely on content similarity measure and did not consider semantic relationships between sentences. These methods may fail in determining redundant sentences that are semantically equivalent. This paper introduces a genetic semantic graph based approach for multi-document abstractive summarization. Semantic graph from the document set is constructed in such a way that the graph nodes represent the predicate argument structures (PASs), extracted automatically by employing semantic role labeling (SRL); and the edges of graph correspond to semantic similarity weight determined from PAS-to-PAS semantic similarity, and PAS-to-document set relationship. The PAS-to-document set relationship is represented by different features, weighted and optimized by genetic algorithm. The salient graph nodes (PASs) are ranked based on modified graph based ranking algorithm. In order to reduce redundancy, we utilize maximal marginal relevance (MMR) to re-ranks the PASs and use language generation to generate summary sentences from the top ranked PASs. Experiment of this study is carried out using DUC-2002, a standard corpus for text summarization. Experimental results reveal that the proposed approach performs better than other summarization systems.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICDIPC.2015.7323005
E. Azari, Hakduran Koc
Hardware/software partitioning has always been a crucial step in co-design of embedded systems as it affects the overall system performance significantly. This paper proposes a new approach to partition the tasks in a given Control Data Flow Graph (CDFG) representing an application. In order to enhance the performance, our approach considers the combination of two main paths in the system: hot path and critical path during the partitioning phase of the co-design. These two paths dominate the total execution time of a system. After identifying the hot path and the critical path, the proposed approach assigns as many tasks as possible to the hardware components by giving higher priorities to the tasks in the hot paths which directly have significant effect on critical path. Consequently, the total execution time of an application is reduced. The experimental evaluation shows that the proposed path-based partitioning method improves the performance significantly. In addition, the performance/area trade-off is presented.
{"title":"Improving performance through path-based hardware/software partitioning","authors":"E. Azari, Hakduran Koc","doi":"10.1109/ICDIPC.2015.7323005","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323005","url":null,"abstract":"Hardware/software partitioning has always been a crucial step in co-design of embedded systems as it affects the overall system performance significantly. This paper proposes a new approach to partition the tasks in a given Control Data Flow Graph (CDFG) representing an application. In order to enhance the performance, our approach considers the combination of two main paths in the system: hot path and critical path during the partitioning phase of the co-design. These two paths dominate the total execution time of a system. After identifying the hot path and the critical path, the proposed approach assigns as many tasks as possible to the hardware components by giving higher priorities to the tasks in the hot paths which directly have significant effect on critical path. Consequently, the total execution time of an application is reduced. The experimental evaluation shows that the proposed path-based partitioning method improves the performance significantly. In addition, the performance/area trade-off is presented.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125659316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICDIPC.2015.7323014
T. Xu, V. Leppãnen
In this paper, we investigate and compare different emerging memory technologies as on-chip cache for big data and signal processing applications. Static Random Access Memory (SRAM) has been widely used as level 1 and last level caches for multicore processors. Server chips integrate Dynamic Random Access Memory (DRAM) as an additional cache for better server-level applications that process more data. Both SRAM and DRAM have advantages and disadvantages. Therefore new types of RAMs are proposed and prototyped. For big data and signal processing applications nowadays, enormous amount of data are processed, usually with time limitations. We analyse novel RAMs, including Phase-change RAM (PRAM), Magnetoresistive RAM (MRAM), Ferroelectric RAM (FRAM) and Resistive RAM (RRAM). The conventional and new memories are analysed in terms of size, area, access latency and power consumption. We present benchmark results using a full system simulator. Workloads are selected from several big data, server, signal processing and video processing applications. Experiments show that, in consideration of these applications, it is crucial to replace SRAM and DRAM caches with MRAM and RRAM.
{"title":"Analysing emerging memory technologies for big data and signal processing applications","authors":"T. Xu, V. Leppãnen","doi":"10.1109/ICDIPC.2015.7323014","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323014","url":null,"abstract":"In this paper, we investigate and compare different emerging memory technologies as on-chip cache for big data and signal processing applications. Static Random Access Memory (SRAM) has been widely used as level 1 and last level caches for multicore processors. Server chips integrate Dynamic Random Access Memory (DRAM) as an additional cache for better server-level applications that process more data. Both SRAM and DRAM have advantages and disadvantages. Therefore new types of RAMs are proposed and prototyped. For big data and signal processing applications nowadays, enormous amount of data are processed, usually with time limitations. We analyse novel RAMs, including Phase-change RAM (PRAM), Magnetoresistive RAM (MRAM), Ferroelectric RAM (FRAM) and Resistive RAM (RRAM). The conventional and new memories are analysed in terms of size, area, access latency and power consumption. We present benchmark results using a full system simulator. Workloads are selected from several big data, server, signal processing and video processing applications. Experiments show that, in consideration of these applications, it is crucial to replace SRAM and DRAM caches with MRAM and RRAM.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICDIPC.2015.7323032
Albandari Alsumayt, J. Haggerty, Ahmad Lotfi
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect, Rehabilitate (MrDR) method, which is applied to detect three types of DoS attacks: wormhole; greyhole; and jellyfish attacks is an effective mechanism for dealing with them. The Network Simulator (NS2) was used to test the efficiency of the MrDR method and the results show that it works better for greyhole attacks than wormhole attacks, and it works least well in the case of jellyfish attacks.
{"title":"Comparison of the MrDR method against different DoS attacks in MANETs","authors":"Albandari Alsumayt, J. Haggerty, Ahmad Lotfi","doi":"10.1109/ICDIPC.2015.7323032","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323032","url":null,"abstract":"A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect, Rehabilitate (MrDR) method, which is applied to detect three types of DoS attacks: wormhole; greyhole; and jellyfish attacks is an effective mechanism for dealing with them. The Network Simulator (NS2) was used to test the efficiency of the MrDR method and the results show that it works better for greyhole attacks than wormhole attacks, and it works least well in the case of jellyfish attacks.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124338130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICDIPC.2015.7323030
M. Niswar, A. S. Wijaya, Muhammad Ridwan, Adnan, A. A. Ilham, R. Sadjad, Andreas Vogel
Disasters create mass casualties and the number of casualties usually surpasses the capability of medical resources, hence, medical teams must attach paper triage to casualties for determining the priority of treatments based on the severity of their condition. However, since casualties' condition could change at anytime, the paper triage cannot provide the latest information of their health condition. Therefore, we have developed a wearable medical device that can continuously monitor the health condition of casualties. It is a lightweight and low-cost wearable electronic triage with sensing system that can monitor the vital sign of casualties and classify them into three levels of severe conditions, i.e., major, delayed, and minor status. The electronic triage is mainly built from a low-power 8-bit microcontroller unit, RF units, and sensors including pulse oximetry and thermocouple breath sensor. This electronic triage has been developed using low-cost electronic components that are available in developing countries such as Indonesia, so that, our electronic triage can be easily manufactured and maintained locally. Furthermore, we have also developed a simple android-based mobile application for data acquisition, priority classification, data storage and data transfer to medical record server in hospitals.
{"title":"The design of wearable medical device for triaging disaster casualties in developing countries","authors":"M. Niswar, A. S. Wijaya, Muhammad Ridwan, Adnan, A. A. Ilham, R. Sadjad, Andreas Vogel","doi":"10.1109/ICDIPC.2015.7323030","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323030","url":null,"abstract":"Disasters create mass casualties and the number of casualties usually surpasses the capability of medical resources, hence, medical teams must attach paper triage to casualties for determining the priority of treatments based on the severity of their condition. However, since casualties' condition could change at anytime, the paper triage cannot provide the latest information of their health condition. Therefore, we have developed a wearable medical device that can continuously monitor the health condition of casualties. It is a lightweight and low-cost wearable electronic triage with sensing system that can monitor the vital sign of casualties and classify them into three levels of severe conditions, i.e., major, delayed, and minor status. The electronic triage is mainly built from a low-power 8-bit microcontroller unit, RF units, and sensors including pulse oximetry and thermocouple breath sensor. This electronic triage has been developed using low-cost electronic components that are available in developing countries such as Indonesia, so that, our electronic triage can be easily manufactured and maintained locally. Furthermore, we have also developed a simple android-based mobile application for data acquisition, priority classification, data storage and data transfer to medical record server in hospitals.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124646059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}