Open Access Open Access  Restricted Access Subscription or Fee Access

Patient Monitoring System Using Wireless Sensor Network

Dr. P. Senthil Kumar, P. Kala, V. Sethupathi, S. Swarnavalli

Abstract


The main objective of this project is to improve the patient monitoring system and to enhance portability of health records. This is achieved by collecting a patient’s parameter using a controller and transmitting it to a computer through a wireless link. Here the computer acts as an internet gateway. Through our computer we update it to a remote server from which the data are made available through a webpage to restricted users. In our project we implement this by a model. We acquire two important patient parameters, body temperature and heart pulse. The sensed analog values are digitized using the ADC inbuilt in a PIC microcontroller. The microcontroller then forwards these values to its serial port to which a zigbee is connected. At the receiver end a receiver zigbee is used to receive the values and transmit to the computer. Using VB an application is created, which displays received values and data are updated to the server using the same.data is made available to the clients through a browser in secured manner.

Keywords


patient monitoring system,internet gateway.

Full Text:

PDF

References


A. Boukerche, R.B. Machado, K.R.L. Juca, J.B.M. Sobral, and M.S.M.A. Notare, “An Agent Based and Biological Inspired Real-Time Intrusion Detection and Security Model for Computer Network Operations,” Computer Comm., vol. 30, no. 13, pp. 2649-2660, Sept. 2007.

A. Boukerche, K.R.L. Juc, J.B. Sobral, and M.S.M.A. Notare, “An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems,” Parallel Computing, vol. 30, nos. 5/6, pp. 629-646, 2004.

IEEE 802.11-1999, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher Speed Physical Layer Extension in the 2.4 GHz Band.

J.R. Quinlan, “Induction of Decision Trees,” Machine Learning, vol. 1, pp. 81-106, 1986.

J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., pp. 15-28, 2003.

A. Boukerche, Algorithms and Protocols for Wireless and Mobile AdHoc Networks. Wiley, 2008.

A. Boukerche and M.S.M.A. Notare, “Behavior-Based Intrusion Detection in Mobile Phone Systems,” J. Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.

Y. Chen, Y. Li, X. Cheng, and L. Guo, “Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System,” Proc. Conf. Information Security and Cryptology (Inscrypt), 2006.

H. Liu and H. Motoda, Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic, 1998.

A.H. Sung and S. Mukkamala, “The Feature Selection and Intrusion Detection Problems,” Proc. Ninth Asian Computing Science Conf., 2004.

A.H. Sung and S. Mukkamala, “Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks,” Proc. Symp. Applications and the Internet (SAINT ’03), Jan. 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.