Mobile Computing Solutions for Healthcare Systems

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book focuses on recent developments in integrating AI, machine learning methods, medical image processing, advanced network security, and advanced antenna design techniques to implement practical Mobile Health (M-Health) systems. The editors bring together researchers and practitioners who address several developments in the field of M-Health. Chapters highlight intelligent healthcare IoT and Machine Learning based systems for personalized healthcare delivery and remote monitoring applications. The contents also explain medical applications of computing technologies such as Wireless Body Area Networks (WBANs), wearable sensors, multi-factor authentication, and cloud computing. The book is intended as a handy resource for undergraduate and graduate biomedical engineering students and mobile technology researchers who want to know about the recent trends in mobile health technology.

Author(s): Sivakumar R., Dimiter Velev, Basim Alhadidi, S. Vidhya, Sheeja V. Francis, B. Prabadevi
Publisher: Bentham Science Publishers
Year: 2023

Language: English
Pages: 245
City: Singapore

Cover
Title
Copyright
End User License Agreement
Contents
Foreword
1
FOREWORD 2
Foreword
2
Preface
List of Contributors
An SDN Based WBAN using Congestion Control Routing Algorithm with Energy Efficiency
Poonguzhali S.1,*, Sathish Kumar D.2 and Immanuel Rajkumar R.1
INTRODUCTION
Multiuser Detection
Interference Cancellation
EXISTING SYSTEM
Exhaustive Search Method for Channel Estimation For OFDM
DISADVANTAGES OF EXISTING SYSTEM
PROPOSED METHODOLOGY
RESULTS AND DISCUSSION
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
COVID-19 - Novel Short Term Prediction Methods
Sanjay Raju1, Rishiikeshwer B.S.1, Aswin Shriram T.1, Brindha G.R.1,*, Santhi B.1,* and Bharathi N.2,*
INTRODUCTION
The Hurdles in Predicting COVID-19
Materials and Methods
Novel Next Day Prediction Method
Novel M Days Prediction Method
The Mobile App
RESULT AND DISCUSSION
Next Day Prediction Analysis
N-Days Deviation and M-Days Prediction Analysis
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Intrusion Detection in IoT Based Health Monitoring Systems
M.N. Ahil1,*, V. Vanitha1 and N. Rajathi1
INTRODUCTION
RELATED WORKS
Host-Based Intrusion Detection System (HIDS)
Network Intrusion Detection System (NIDS)
PROPOSED METHOD
Data Collection
Pre-Processing
RESULTS AND DISCUSSION
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Machine Learning Methods For Intelligent Health Care
K. Kalaivani1,*, G. Valarmathi2, T. Kalaiselvi1 and V. Subashini2
INTRODUCTION
APPLICATIONS OF MACHINE LEARNINGIN HEALTH CARE
Diagnosis of Diseases
Drugdelivery and Manufacture
Medical Imaging Diagnosis
Personalized Medicine
Machine Learning-Based Behavioral Modification
Smart Health Records
Clinical Trial and Research
Crowd Sourced Data Collection
Better Radiotherapy
Outbreak Prediction
Artificial Intelligence in Healthcare
Clinical Analysis
Machine Learning Approaches in Smart Health
Machine Learning Methods in Smart Health
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Multi-Factor Authentication Protocol Based on Electrocardiography Signals for a Mobile Cloud Computing Environment
Silas L. Albuquerque1, Cristiano J. Miosso2, Adson F. da Rocha1 ,2 and Paulo R. L. Gondim1 ,*
INTRODUCTION
RELATED WORK
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
CC Authentication Service Based on Keystroke Standards
Efficient Authentication System Based on Several Factors For MCC
Comparison Between the Works Presented and this Work
PROPOSED PROTOCOL
Initial Considerations
The Network Model
The Authentication Model
Registration
Authentication
Update
Specific Aspects of the Electrocardiography-Based Process
Results Analyses from Electrocardiography-Based Authentication Process
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Recent Trends in Mobile Computing in Health Care, Challenges and Opportunities
S. Kannadhasan1,* and R. Nagarajan2
INTRODUCTION
Internet of Things
VARIOUS SECTOR OF INTERNET OF THINGS
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Secure Medical Data Transmission In Mobile Health Care System Using Medical Image Watermarking Techniques
B. Santhi1 and S. Priya1,*
INTRODUCTION
Performance Measures
Peak Signal to Noise Ratio (PSNR)
Normalized Cross-Correlation (NCC)
Structural Similarity Index (SSIM)
Number of Pixels Change Rate (NPCR)
Unified Average Changing Intensity (UACI)
INTELLIGENT BASED REVERSIBLE MEDICAL IMAGE WATERMARKING
Preliminaries
Integer Wavelet Transform (IWT)
Singular Value Decomposition (SVD)
Genetic Algorithm (GA)
Intelligent Based Medical Image Watermarking (IMW)
Watermark Extraction
Experimental Results
VISUALLY MEANINGFUL IMAGE ENCRYPTION (VMIE)
Decryption and Authentication
Experimental Analysis
Keyspace Analysis
Histogram Attack
Differential Attack
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Smartphone-Based Real-Time Monitoring and Forecasting of Drinking Water Quality using LSTM and GRU in IoT Environment
V. Murugan1,*, J. Jeba Emilyn2 and M. Prabu3
INTRODUCTION
METHODS AND MATERIALS
EXPERIMENTS AND DISCUSSION
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
IoT-Enabled Crowd Monitoring and Control to Avoid Covid Disease Spread Using Crowdnet and YOLO
Sujatha Rajkumar1, Sameer Ahamed R.1, Srinija Ramichetty1,* and Eshita Suri1
INTRODUCTION
Background of the Research Work
Literature Survey
YOLO Model for Crowd Detection
CrowdNet Algorithm for Crowd Detection
YOLO Open CV Flow Model
Data Analytics for Collected Crowd Data Based on Location Tags
CrowdNet for Crowd Detection
RESULTS
CONCLUSION AND FUTURE WORK
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
A Game-Based Neurorehabilitation Technology to Augment Motor Activity of Hemiparesis Patients
J. Sofia Bobby1,*, B. Raghul2 and B. Priyanka3
INTRODUCTION
Anatomy and Physiology of Brain
Frontal Lobe
Temporal Lobe
Parietal Lobe
Occipital Lobe
Definition of Stroke
Ischemic Stroke
Embolic Stroke
Hemorrhagic Stroke
Intracerebral Stroke
Symptoms
Causes
Diagnosis
Treatment and Recovery
Existing Technology
Therapeutic Rehabilitation Exercise
Music Therapy
Constraint Induced Movement Therapy
Robot-Based Rehabilitation
Mirror Therapy
Magnetic Brain Stimulation
Problems with Conventional Technology
Objective
HISTORY OF NEUROREHABILITATION
Historical Perspectives
Origins of the Neurofacilitation Approaches
Developments in the 1980s
Five Main Approaches
Constraint-Induced Movement Therapy
Weight-Supported Treadmill Training
Constraint-Induced Language Therapy
Prism Adaptation Training For Spatial Neglect
Transcranial Magnetic Stimulation
HARDWARE AND SOFTWARE
Hardware
Arduino UNOBoard
Sensor
Accelerometer
Capacitive Touch Electrodes
Hand Glove Model
Software
Arduino
Unity
Methodology
Exercises Focused
Games Designed
Fish Saver
Black Hole Mystery
Whack – A –Mole
Block Diagram
Game Based Rehabilitation Technology
Developed Neurorehabilitation Technology
Feedback
Visual Feedbacks
Auditory Feedback
Score System
EVALUATION BEFORE NEUROREHABILITATION TRAINING
Evaluation of Subject 1
Evaluation of Subject 2
Evaluation of Subject 3
Evaluation of Subject 4
Evaluation of Subject 5
Neurorehabilitation Training
Neurorehabilitation To Subject 1
Neurorehabilitation To Subject 2
RESULT & DISCUSSION
Fish Saver
Score Analysis
Time Analysis
Blackhole Mystery
Score Analysis
Time Analysis
Whack-A-Mole
Score Analysis
CONCLUSION AND FUTURE WORKS
Conclusion
Future Work
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Smart Wearable Sensor Design Techniques For Mobile Health Care Solutions
K. Vijaya1,* and B. Prathusha Laxmi2
INTRODUCTION TO THE SENSOR TECHNOLOGY
DIFFERENT TYPES OF SENSORS AND THE PHYSIOLOGICAL PARAMETERS THEY COULD DETECT
INTRODUCTION TO WIRELESS SENSORS COMMUNICATION
INTEGRATION OF SENSORS AND OTHER RELATED TECHNOLOGIES TO CREATE SMART WEARABLE DEVICE
DIFFERENT WEARABLE DEVICES THAT HAVE BEEN DESIGNED AND USED
Infants and Adults
Self-Tracking and Monitoring
CONCLUDING REMARKS
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Subject Index
Back Cover