An overview Adam McCullough – Group 10. Computers are unparalleled problem solvers. The fact that they are growing smaller, cheaper, and requiring less.

Slides:



Advertisements
Similar presentations
The Fault-Tolerant Insulin Pump Therapy Alfredo Capozucca, Nicolas Guelfi, Patrizio Pelliccione University of Luxembourg Faculty of Sciences, Technologies.
Advertisements

EE 545 – BOGAZICI UNIVERSITY. Agenda Introduction to IP What happened IPv5 Disadvantages of IPv4 IPv6 Overview Benefits of IPv6 over IPv4 Questions -
V i t a l i s ECE Spring 2013 TEAM 13 Presenter: Aakash Lamba Wireless Biometric Sensor Team Members: Aakash Lamba Di Mo Shantanu Joshi Yi Shen Patent.
Chapter 5 Networks. Learning Objectives After reading this chapter the reader should be able to: Understand the importance of networks in the field of.
Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction  Sensors help to easily keep track of various information PeoplePeople ProductsProducts.
Presented by Serge Kpan LTEC Network Systems Administration 1.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Keeping the Smart Grid Secure.  A smart grid delivers electricity from suppliers to consumers using digital technology to monitor (and optionally control)
BODY AREA SENSOR NETWORKS (BANs). HISTORY BANs used primarily for health monitoring BANs used primarily for health monitoring Hospital monitoring equipment.
Artificial Pancreas By: Anas Syed.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
SoNDa Sensor Network for Data Explore! 1. SoNDa Sensor Network for Data Explore! KEYWORDS Wireless Sensors Communication 2.
Brain Surgery By: Ben Wolter Why do some people need brain surgery? Some people need brain surgery because they have diseases that can’t be cured by.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
ELECTRONIC HEALTH RECORD
Connecting LANs, Backbone Networks, and Virtual LANs
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Medical informatics management EMS 484, 12 Dr. Maha Saud Khalid.
Smart Home for disabled people Students: Atara Gutman and Anastasia Logvinenko Instructor: Alexander Kinko Final Presentation Semester Spring part.
Topic 6 – Wireless Technology and handheld devices 1)TechMed scenario covers The uses of wireless technologies and handheld devices In the scenario: “Some.
1 Computer Maintenance Mobile Devices: How they Operate Copyright © Texas Education Agency, All rights reserved.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
U-Health Monitoring System Feb. 15, 2008 Hanyang University Songjun Lee.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
PERSONAL MEDICAL MONITOR Jason Ewing, Morgan Hinchcliffe, Dina Irgebayeva and Aida Kulmambetova.
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
Care Record Development Board Your Care, Your Record Thursday 23 rd November 2006 Assistive Technology Preventative healthcare services direct to your.
CodeBlue – Wireless Sensor Networks for Emergency Medical Care Matt Welsh, David Malan, Breanne Duncan, and Thaddeus Fulford-Jones Harvard University Steve.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
MOBILE PHONE SENSORS IN HEALTH APPLICATIONS Evgeny Stankevich, Llya Paramonov, Ivan Tomofeev Demidov Yaroslavl State University Presented By Brian K. Gervais.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Technology in Health Care By: Brook Niles.  An electronic medical record is a digital and portable version of the current paper file system that would.
Computational Intelligence II Lecturer: Professor Pekka Toivanen Exercises: Nina Rogelj
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
COMP 410 Update. The Problems Story Time! Describe the Hurricane Problem Do this with pictures, lots of people, a hurricane, trucks, medicine all disconnected.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Performance Monitoring Wearable Technology to monitor performance.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Your Name Your Title Your Organization (Line #1)‏ Your Organization (Line #2)‏ WSN in enhancing exercise experience in personal fitness Goran.
Samuel John Vinod Kumar CG Ganesh Raam K. Introduction  The need for health consciousness has increased in the recent past and so is the need to monitor.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Prepared by:Ronnel P. Agulto, CpE Objectives Different types of topologies; Their advantages & disadvantages How to choose an appropriate topologies in.
Introduction to Networking. What is a Network? Discuss in groups.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
By KESHAB DAS and PRITAM SARKAR INSITUTE OF RADIOPHYSICS & ELECTRONICS UNIVERSITY OF CALCUTTA.
IntroOH-1 CSE 5810 Remote Health Care Monitoring by Wearable Sensors and Mobile Devices Kanchan Jha Computer Science & Engineering Department The University.
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
Vital Signs Monitoring system
Gadgets in health it Convergence of Wellness and Wireless
Chapter 2 Network Models.
Activation method of smart phone alarm on attempt to open door or windows wireless Artificial Intelligence IoT Solutions for Health and Wellness by:
Networking and Health Information Exchange
Bluetooth Low Energy Overview.
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
About Me Name : Wong Yong Yuen Age : 20 Interests : Learning, exploring & Gaming Life Statement : Nothing is impossible. Never Give Up until the end. Goals.
Desktop/Personal Computer
Things You Need To Know Before Hiring A Live-In Caregiver
CS526 Wireless Sensor Networks
Internet of Things (IoT)
Mobile Devices: How they Operate
Chapter 2 Network Models
Welcome to The World of Internet of Things
Principles of Information Technology
Presentation transcript:

An overview Adam McCullough – Group 10

Computers are unparalleled problem solvers. The fact that they are growing smaller, cheaper, and requiring less power means that the scope and type of problems they can now be applied to is changing by the minute. One of the biggest problems computer science is trying to solve – or at least change – is medicine. Several companies are utilizing both existing and developing technology to provide health monitoring services in the home.

This allows many game-changing services:  Personal, portable monitoring of vital signs  Immediate notification in case of a medical emergency  Recording of vitals over time, to allow the tracking of therapy or treatment progress  Broad-scale data mining:  Tracking a flu epidemic the same way one tracks the spread of a worm or virus on a network: node by node.  Open up a whole new wealth of information for statistics, analysis, and research.  And much more. The general agreement is that we've just barely scratched the surface of what's really possible. [2] [1]

This also allows many new, unseen hazards:  Broadcast of personal health information over one or more networks  ‘Immediate notification’ may be making an impossible service guarantee  Broad-scale data mining!  Insurance company could decide to cut coverage right as a customer needs it  Research, or Big Brother?  Etc…

The Digital Tattoo is a conceptual design put out by Jim Mielke at the Greener Gadgets Design Competition 2008 [4] Basic facts :  Surgically embedded just beneath the skin.  LCD Touchscreen – invisible when off, easy to use when on.  It runs off of glucose and oxygen – If you’re running, it is.  Has Bluetooth networking support, and is designed to network both with devices within and without the users body.  Designed to be an always-on monitor for various blood disorders and vital signs

This technology would give both doctors and patients unprecedented access to medical information, such as heart rate, BAC, blood sugar level, and so on. This would normally require either invasive procedures or dedicated hardware to obtain/record this information. It also allows for the next level of contingency planning – if your vitals take a nose dive, this would be able to send an emergency notice out in an attempt to get paramedics on the scene.

However, this is not a new idea, just a new way to do it.. Many studies have already been done on the concept, and they’ve identified some basic limitations:  Power. Running on glucose guarantees an always-on (we hope!) power supply, but it does not necessarily generate a lot.  However, this particular application does not need a lot of processing power, nor does it need to move around a lot of data, comparatively speaking. Blood Pressure is not likely to change drastically over one Mhz!  This makes Bluetooth a sub-optimal choice. ZigBee is an alternative physical layer which is specifically designed for low data, low duty-cycle tasks.

 It needs to be reliable – 24/7/365.  Another possible energy source could be the patients movement. Work is being done on exploiting human movement as a readily available energy source. [5]  The low power availability also means that the tattoo won’t be able to connect to a global network itself – it will need either a cell phone, computer, or some other ‘personal wireless hub’ to act as a router.  ‘Smart house’ networks – houses that use ZigBee, Bluetooth, or wifi to control things like lights, thermostats, and so on would be ideal for this. [3]

This example is from a research paper [3]. The example expects the sensors to be external to the body, and connect to a specialized PWH. However, the concept can be generalized very easily.

This also highlights two different possible architectures – 1: Have the sensors integrated directly into the tattoo. This eliminates the need for a (medical) BAN, but puts more processing weight (and therefore more power draw) on one device. 2: Have the tattoo act as a router between several different, networked internal sensors and a Personal Wireless Hub (computer, house network, cell phone, etc.) This makes the overall design more generic and less centralized, but also opens up a possible security hole in the inter-sensor network.

This kind of network approach would allow the Digital Tattoo (paired with some form of PWH) to send an emergency notification to a hospital, paramedics, and so on if any of your vital signs go critical. What happens if the patient forgets or goes out of range of his PWH, and has a medical emergency?

One solution is to have the device send out a broadcast-like message to any device in range to send a message out to the proper destination (health care providers, paramedics, etc). It doesn't matter how the information arrives – just that it arrives. This does open up a rather huge privacy gap, however. Another would be to have the tattoo alert the user if he goes out of range.

 Security. This device has access to your vitals, medical history, what chemicals and substances you prefer, and so on. This is not public domain!  Possible solutions include heavy encryption, the limited range of the wireless protocols in use, and so on. [3]  Like all security options, the solutions are robust, but not full proof.  They also do not address the largest security hole: The user!

References: [1] [2] [3] [4] [5]

Questions?