UNIT V Wearable
UNIT V Wearable
UNIT V Wearable
Application Design
The created application, Barcode Ed, because we wanted to isolate participants’ ability to scan and yet have an alternative
input mechanism (e.g., voice input) to record all food items consumed. In initial interviews, half of the CKD patients said they
did not eat any foods with barcodes. However, once they were prompted, we found they primarily ate frozen, scanned, and
prepared foods. Thus, for participants to use an easy input mechanism like scanning, they would have to learn how to identify
barcodes and use the scanner. We only used scanning and voice recording in this study. Barcode Ed consists of five screens.
➢ When participants turned on the PDA, they would view the Home screen. Participants could choose to voice record by
pressing the Voice button or scan a barcode by pressing the Scan button. As soon as participants pressed the Voice button,
the application would begin voice recording and show participants how many minutes and seconds they recorded on the
Voice recording screen.
➢ When participants were finished recording, they could press the Stop button and play back their recording on the Voice
recording play back screen. When participants were satisfied with their recording, they could return to the Home screen.
➢ When participants pressed the Scan button, participants could see a red laser line emitted by the scanner. Participants lined
the scanner line perpendicularly across the barcode they were attempting to scan. If the food item was successfully
scanned, a green check mark would appear on the Barcode scanning success screen.
➢ The application recorded the time the participant first pressed a Scan or Voice button, the barcode number or voice
recording, and the time the recording was saved. The recording was done how many times participants played back their
voice recordings.
➢ The participants were asked to participate in the study during their dialysis session. Four times during each phase of the
study for approximately 30 minutes. During the first session, we collected background information and taught participants
how to turn the PDA on, insert the scanner, and use the application.
The key findings of our study were:
• Participants preferred voice recording once they mastered the application
• Participants with low literacy skills needed extra instruction on how to sufficiently describe food items for voice recordings
• Participants reported more individual food items with the Barcode Ed application than what they thought they consumed
• Electronic monitoring provides researchers with ways to identify participant compliance
Graph of the number of voice recordings and barcode scans participants input over the two barcode education study phases (dotted line
denotes study break). Faces underneath each day denote when researchers met with participants
CASE STUDY 2: BARCODE AND IVR
The only difference in the application was that participants did not have the ability to record unstructured voice recordings.
If the food item did not have a barcode, the participant could not record the food item.
The IVRS that could be accessed with any phone to test participants’ ability to use structured voice input.
➢ Virtual electronic patient records (VEPR) enable the integration and sharing of healthcare information within large and
heterogeneous organizations by aggregating known data elements about patients from different information systems in
real-time.
➢ There are usually some constraints in terms of physical location as well as technology in order to access it. Healthcare
professionals need to access a terminal in order to get information about the patients they are treating.
➢ The use of wireless technology tries to take this integration further. It allows access to patient data and processing of
clinical records closer to the point of care. The access to information can minimize physical as well as time constraints for
healthcare, enhancing users’ mobility within the institution.
➢ Wireless technology adds a higher level of security issues. Disruptions and attempts to access information can be more
common and easier to try, and less simple to detect and control; so security needs to be studied and analysed thoroughly
before wireless networks are implemented in a larger scale within a hospital.
➢ This study proposes a wireless architecture in order to model access to an existing VEPR within a university hospital that
can provide an extra security layer to the wired system.
Architecture
➢ This VEPR allows the collection, integration and availability of clinical reports providing an upto-date overview of a patient
medical history at all points of care. The system uses a traditional three layered approach composed by presentation,
business and data layers.
➢ The presentation layer is composed by a web application (VIZ) and a package of graphical user interface components to be
used by third party applications.
➢ The application layer is composed by an integration engine (Multi-Agent system for Integration of Data – MAID), and a set
of web-services that allow access to the data layer.
➢ The data layer includes all repositories, that comprises the VEPR database and clinical documents file system, the central
patient system (SONHO) and the hospital statistics system.
➢ MAID collects clinical reports from various hospital Departmental Information Systems (DIS), and stores them on the
central repository (CRep) consisting of a database holding references to these clinical reports and a file system where
reports are stored.
VEPR generic architecture
Healthcare environments would greatly benefit with the availability of information anywhere through a wireless local area
network (WLAN). Usually, the healthcare institution where the WLAN is going to be deployed has already a LAN in use.
Authentication architecture
➢ The 802.1X three main processes are the mutual authentication between the client and the server, the cryptographic keys
dynamically generated after authentication and the centralized policy control.
➢ 802.1X is not a protocol; it is an authentication and key management process. In a wireless network it defines
authentication and the dynamic generation of cryptographic keys. The ciphering is accomplished using any of the wireless
security protocols.
➢ IEEE 802.1X (IEEE 802.1X, 2004) is a network security specification initially developed for wired networks, with its concepts
and utilization extended afterwards to wireless networks. 802.1X defines a network access control based in ports. It was
developed to deny or accept requests based on user authentication information.
WPA – Security and Architecture
➢ WPA (“(Wi-Fi Protected Access)”) was developed with the aim of decreasing the problems associated to Wired Equivalent
Protocol. WPA is based on the principles of the IEEE802.11i standard.
➢ WPA is intended to be implemented in a home/office environment and is available in all Access Points (APs) and Network
Interface Cards (NICs) currently available.
➢ RADIUS server authenticates the WLAN user and determines the session key to be used. RADIUS is only used to
communicate between the AP and the authentication server.
The proposed architecture, secure access to the current system is increased due to the wireless connectivity advantages (e.g.
mobility, everywhere access and access to wider range of devices). This access provides secure authentication and
authorization, secure communications and also maintains the integrity of the retrieved information, thus preserving the
security goals of the VEPR. This is very important and justifies the need for similar studies when implementing wireless
solutions.
Personal Health Records Systems Go Mobile
Information technology (IT) is dramatically transforming the delivery of healthcare services. This can be seen through the
increased activity in Mobile Health (M-Health) and promotion of the Electronic Health Record (EHR) systems in the healthcare
industry and the recent attention and increased activity in the adoption of Personal Health Record (PHR) systems.
➢ Hospital work is characterized by intense mobility, a frequent switching between tasks, and the need to collaborate and
coordinate activities among specialists. These working conditions impose important demands on hospital staff, whose
attention becomes a limited and important resource to administer.
➢ The pervasive technologies for hospitals are increasingly supporting heterogeneous devices that range from handheld
computers that can be used to capture and access limited amounts of information, to PCs that can be used at fixed sites
for longer periods of time, and semi-public displays located at convenient places that can be used to share and discuss
information with colleagues. Carrying out a single activity typically involves the use of several systems that call for the
user’s undivided attention.
➢ To overcome such difficulties is to develop ambient displays that could be embedded into the environment to provide a
getaway for that information that could be displayed by objects already placed in the physical space instead of the
traditional computer displays.
➢ Objects already known and used by hospital workers could be augmented with pervasive sensors making them capable of
extending their capabilities beyond its primary role while still constituting a part of the user’s environment. For instance, a
mirror augmented with infrared sensors and an acrylic panel could detect human presence and act as a message board to
display relevant information when a user faces the mirror.
THE IHOSPITAL: THE HOSPITAL AS A SMART ENVIRONMENT
▪ Providing Awareness of People and Artifacts
▪ Supporting Collaboration through Context-Aware Communication and the Seamless Interaction among Heterogeneous
Devices
▪ Using Context to Adapt and Personalize the Information
▪ Supporting Multitasking
AMBIENT DISPLAYS
➢ The physical environments where we live and work are saturated with ambient information, such as sounds or lights, that
we use as peripheral cues to discover contextual information relevant or that we manipulate to convey information to
others.
➢ Many types of ambient displays have been built to augment physical objects allowing users to manipulate or access
information. For instance, as part of the Ambient Room project, several displays using light, sound or motion have been
developed to augment a user’s office. Such displays provide users with awareness of the activity executed by a distant
loved one and the physical presence of others.
UNDERSTANDING HOW HOSPITAL STAFF MONITORS PATIENTS: A CASE STUDY
The mobile activity monitor. (a) A nurse uses the activity-aware bracelet; (b) the mobile activity-aware assistant shows
information related to an activity being executed by a patient; (c) a nurse uses her cell phone to assign colors; and (d) a nurse
associates contextual information with an activity.
The structure of an M-Health system; (1) Bluetooth Pedometer or Step Counter. (2) Bluetooth Monitoring Device for home
telemonitoring of patients with chronic diseases. The device is able to measure: Blood Oxygen saturation, Pulse rate,
Breath rate and Body acceleration. (3) Bluetooth Blood Pressure Monitor. (4) Bluetooth Precision Health Scale. (5)
Bluetooth and GSM/GPRS enabled Network Access Point e.g. a smart mobile phone or a personal digital assistant (PDA)
device applying mobile communication network, remote server at hospital and a monitoring device (presentation unit).
(A) Bluetooth enabled Precision Health Scale and a Bluetooth Blood Pressure monitor using mobile access point to
communicate with a public communication network and/or Internet. (B) The same Personal Area Network (PAN)
establishing Bluetooth connection to a fixed access point (AP) to communicate with a public communication network
and/or Internet.
➢ Recording of physiological vital signs in patients’ real-life environment could be especially useful in management of
chronic disorders; for example for heart failure, hypertension, diabetes, anorexia nervosa, chronic pain, or severe
obesity.
➢ The monitoring patients in diverse environments, by a mobile health system, is one of the major benefits of this
approach, however at the same time the demands and challenges for improving safety, security and integrity increase.
➢ Most research activities have been focused on achieving common platform for medical records, monitoring health
status of the patients in a real-time manner, improving the concept of online diagnosis, enhancing security and
integrity of the patients, developing or enhancing telemedicine solutions, which deals with remote delivery of health
care services applying telecommunications, etc.
➢ Recent advances in embedded computing systems have led to the evolution of wireless and mobile health services,
consisting of small battery-powered entities with computation and radio communication capabilities.
➢ The advancement permits data gathering and computation to be deeply integrated in the patients’ daily environment.
The technology has also the potential of automatically collecting vital signs to be fully integrated into the patient care
record and used for real-time triage, correlation with hospital records, and long-term observation.
➢ The trend of providing more and more wireless health care solutions is especially visible, because going wireless is
supported by the telecommunications service providers as well as by the end-users. For users, wireless means being free
from inconvenient cables and thereby more mobility plus easier and more flexible access to healthcare services. For
operators and providers, wireless means cheaper access, more users on the network and more benefit.
➢ Recording of physiological vital signs in patients’ real-life environment could be especially useful in management of chronic
disorders; e.g. for heart failure, hypertension, diabetes, anorexia nervosa, chronic pain, or severe obesity. This could also
be used to provide feedback about someone’s health in the form of behavioural feedback in order to prevent diseases.
➢ Monitoring patients in diverse environments, by a mobile health system, is one of the major benefits of this approach,
however at the same time the demands and challenges for improving safety, security and integrity increase.
Type of study
Study 1:Security and Privacy in a Wireless Remote Medical System for Home Healthcare Purpose
Principal sketch of the wireless remote monitoring system consisting of an ECG device, Bluetooth module attached
to ECG device, mobile phone, GSM/GPRS network, mobile modem server and a central monitoring station.
Study 2
Principal sketch of the wireless remote patient monitoring system containing ECG device, Bluetooth module,
mobile phone, GSM/GPRS network, router, data interpreter and a graphical ECG monitoring system
A Framework for Capturing Patient Consent in Pervasive Healthcare Applications
➢ A new framework for pervasive healthcare applications where the patient’s consent has a pivotal role. In their
framework, patients are able to control the disclosure of their medical data. The patient’s consent is implicitly captured
by the context in which his or her medical data is being accessed. Context is expressed in terms of workflows. The
execution of a task in a workflow carries information that the system uses for providing access rights accordingly to the
patient’s consent.
➢ Healthcare Applications are characterized by the integration of software systems in healthcare environments.
Healthcare applications seamlessly assist patients and carers in performing their tasks and provide them ubiquitous
access to required information.
➢Cell phones are used by 76% (929.37 million) people in India. Monthly cell phone addition is nearly 8.35 million in 2012.
➢ India has third largest number of mobile phone users in the world next to China and United States of America.
➢Health sector till date has been slow in adopting mobile technologies into routine
operations to benefit patients and providers.
▪In a study shows that mobile healthcare business in Asia is growing at the rate of 80%/year. Ageing and tech-friendly
population is likely to give a thrust to mobile
healthcare business.
Applications developed in the process were for remote patient monitoring, mobile nursing, access to mobile medical records
and free access to healthcare information via mobile phones.
MOBILE HEALTH AND ITS APPLICATIONS
➢Mobile health is a term coined for medical and public health practice supported by mobile devices, e.g. mobile phone,
patient-monitoring devices, personal digital assistants
(PDAs) and other wireless devices.
➢Application of mobile health (m-health) in hospitals can contribute greatly to the management of health and disease of
inpatient, outpatient and emergency patients.
➢Healthcare provider satisfaction can be the observed outcomes. Innovations in smartphones need to address the
following concerns of health:
Tools that can be built strategically in the smartphones for the same are:
➢Calling
➢Advertising
Technology is a big enabler and differentiator that has revolutionised the delivery of quality healthcare.
It improves the overall operational efficiency, speeds up workflows, curtails turnaround time (TAT), reduces medication
errors and improves clinical outcomes.
Applications using mobile telephone and telemedicine can greatly enhance the accessibility and penetration of
healthcare services, and overcome barriers in delivery of equitable
healthcare.
➢ Building context-aware mobile healthcare systems has become increasingly important with the emergence of new medical
sensor technologies, the fast adoption of advanced mobile systems, and improved quality of care required by today’s
patients. A unique feature of our mobile healthcare system is a distributed processing paradigm whereby a set of bio-
signal processing tasks is spread across a heterogeneous network.
➢ Telemedicine has been receiving more and more attention due to its potential amongst others to tackle the resource
challenges to the healthcare system posed by the aging society, by improving the quality of diagnosis and treatment and
by reducing the costs of delivering healthcare.
➢ On top of the platform, multiple applications, such as tele-monitoring and tele-treatment services, can be operated to
provide continuous (24/7) mobile services to patients.
➢ The performance of m-health systems can be seriously affected by context changes and scarcity of the platform resources,
e.g. network bandwidth, battery power and computational power of handhelds and to solve this mismatch between
application demand and resources, an appropriate context-aware adaptation mechanism should be embedded into the
system.
➢ Approaches : (1) Task adjustment - this is to automatically change task behavior to use less of a scarce resource, e.g. scalable
video transmission over wireless network; (2) resource reservation - this is to ask the environment to guarantee a certain
level of a resource, e.g. QoS (Quality of Service) management and reservation techniques; (3) user notification - this is to
suggest a corrective action to the user.
➢ The fundamental model common to remote monitoring systems consists of a set of bio-signal data processing tasks
distributed across a set of networked devices.
Questions:
1. What are the requirements for task redistribution in m-health systems?
2. What are the QoS performance measures relevant for the m-health application and which performance characteristics can be
improved by a “more suitable task assignment”?
3. How can an optimal task assignment be computed given one particular performance measure?
4. What is the impact of the redistribution of tasks on the continuity of the services and what are the potential techniques to
minimize these disruptions?
Section 2 motivates our research by presenting a context-aware m-health system and its application scenario, which allows
us to further study the requirements on task-redistribution and relevant performance measures. In Section 3, we formulate
the problem of task assignment in m-health in order to support task redistribution. Section 4 classifies the task assignment
problem into several groups based on the model setting and presents the solutions. Section 5 presents the design and
implementation of a component-based infrastructure to support the task redistribution. Section 6 provides some further
discussions relate to both technical outcomes and non-technical outcomes.
The M-health system enables a remote health professional to view processed bio-signals and take appropriate
action for the patient
Distributed bio-signal processing tasks in a epileptic seizure detection algorithm studied in the AWARENESS project (Tönis,
Hermens, & Vollenbroek-Hutten, 2006): Raw ECG and movement information (obtained by accelerometers) are processed
in distinguished steps to estimate the chance of a seizure attack
MADE – a task redistribution based adaptation middleware that can dynamically redistribute the application tasks
across platform resources
Technology Enablers for Context-Aware Healthcare Applications
➢ The increasing availability of mobile devices and wireless networks, and the tendency for them to become ubiquitous in
our dally lives, creates a favourable technological environment for the emergence of new, simple, and added-value
applications for healthcare.
➢ This study focuses on how context and location can be used in innovative applications and how to use a set of solutions
and technologies that enable the development of innovative context and location-aware solutions for healthcare area. It
shows how a mobile phone can be used to compute the level of familiarity of the user with the surrounding environment
and how the familiarity level can be used in a number of situations.
The context manager that manages the context and interacts with a set of external entities
CONTEXT AND CONTEXT MANAGEMENT
3.2.ISFET
➢ The ISFET measures pH.
➢ It can reveal pathological cnditions associated with abnormal pH levels
➢ These abnormalities include :
1. Pancreatic disease
2 . Hypertension
3. Inflammatory bowel disease…..
3.3. ELECTODE ELECTROCHEMICAL CELL
• The three electrode electrochemical cell detects the level of dissolved
oxygen in solution.
• It measures the oxygen gradient from the proximal to the distal GI Tract
• It investigates :
• Growth of aerobic or bacterial infection
• Formation of radicals causing cellular injury & pathophysiological
conditions like inflammation & Gastric ulceration.
• It develops 1st generation enzymes linked with amperometric
biosensors.
3.4.DIRECT CONTACT GOLD
ELECTODE
• The pair of direct contact Gold electrodes measures conductivity by,
conductivity as measured.
4.CONTROL CHIP
• The ASIC (Application Specific Integrated Circuit) is the control unit that
connects together other components of the micro system.