Indoor TMD Secure System for early Detection of Alzheimer’s Disease

Article Preview

Abstract:

With more number of aged people being diagnosed for Alzheimer’s disease and prevention being the only remedy, the proposed idea helps in continuous monitoring through wireless technology. The Tracking, Monitoring and tele-Diagnosing (TMD) secure system utilises Bluetooth wireless technology. Here the movement pattern of the patient is tracked with the help of Bluetooth enabled handheld device carried by the patient and Bluetooth APs located in each room. This pattern is stored in the data base. To protect the privacy of the patient the collected information is secured through geo-encryption technique before sending via open wireless channel (internet). The remote medical practitioner is able to diagnose whether the target patient is developing Alzheimer’s disease from the received information. Thus, our proposed system provides secured remote diagnosis of the disease in senior people.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

2237-2243

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] WHO; http: /www. searo. who. int.

Google Scholar

[2] L. D. Vittorini and B. Robinson, Optimizing Indoor GPS Performance: Receiver Frequency Standards, GPS World, Nov. 2003, p.40–48.

Google Scholar

[3] Bluetooth; http: /www. bluetooth. com.

Google Scholar

[4] Lifeline; http: /www. lifeline. ca.

Google Scholar

[5] A.V. N Krishna, S.N. N Pandit, A. Vinaya Babu, A Genaralised Scheme for data Encryption Technique Using a Randomized Matrix Key, Journal of Discrete Mathematical Sciences and Cryptography, 10, (2007), No. 1, pp.73-81.

DOI: 10.1080/09720529.2007.10698109

Google Scholar

[6] Chandra Sekhar, K.R. Sudha and Prasad Reddy P.V.G.D., Data Encryption Technique Using Random Number Generator, Granular Computing, 2007. GRC 2007. IEEE International Conference, on 2-4 Nov 2007, pp.576-576.

DOI: 10.1109/grc.2007.73

Google Scholar

[7] K. R Sudha, A. Chandra Sekhar and Prasad reddy P.V.G. D Cryptography protection of digital signals Using Some recurrence Relation, IJCSNS International Journal of Computer Science and Network Security, 7, No. 5, may 2007 pp.203-207.

Google Scholar

[8] A. P Stakhov, The golden matrices and new kind of cryptography , chaos, Soltions and Fractals, 32, (2007) pp.1138-1146.

DOI: 10.1016/j.chaos.2006.03.069

Google Scholar

[9] A. P Stakhov, The golden section and the modern hormony mathematics. Applications of Fibonacci numbers, 7, kluwer Academic publishers; (1998), pp.393-99.

DOI: 10.1007/978-94-011-5020-0_43

Google Scholar

[10] A. P Stakhov, The golden section in the Measurement theory, compute Math Appl; 17, (1989), pp.613-638.

Google Scholar

[11] WidComm; http: /www. widcomm. com.

Google Scholar

[12] H. T. Cheng, H. Jiang, and W. Zhuang, Distributed Medium Access Control for Wireless Mesh Networks, Wireless Commun. Mobile Comp., vol. 6, no. 6, Sept.

DOI: 10.1002/wcm.445

Google Scholar

[13] Harter et al., The Anatomy of a Context-Aware Application, Wireless Net., vol. 8, no. 2, Mar. 2002, p.187–97.

Google Scholar

[14] N. B. Priyantha et al., The Cricket Compass for Context-Aware Mobile Applications, " Proc. MobiCom , 01, July 2001, p.1–14.

Google Scholar