scholarly journals Patient Behavioral Analysis with Smart Healthcare and IoT

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Viney Dhiman ◽  
Mohamed A. M. Iesa ◽  
Haider Alsarhan ◽  
Abolfazl Mehbodniya ◽  
Anurag Tiwari ◽  
...  

Patient behavioral analysis is the key factor for providing treatment to patients who may suffer from various difficulties including neurological disease, head trauma, and mental disease. Analyzing the patient’s behavior helps in determining the root cause of the disease. In traditional healthcare, patient behavioral analysis has lots of challenges that were much more difficult. The patient behavior can be easily analyzed with the development of smart healthcare. Information technology plays a key role in understanding the concept of smart healthcare. A new generation of information technologies including IoT and cloud computing is used for changing the traditional healthcare system in all ways. Using Internet of Things in the healthcare institution enhances the effectiveness as well as makes it more personalized and convenient to the patients. The first thing that will be discussed in the article is the technologies that have been used to support the smart class, and further, there will be a discussion on the existing problems with the smart healthcare system and how these problems can be solved. This study can provide essential information about the role of smart healthcare and IoT in maintaining behavior of patent. Various biomarkers are maintained properly with the help of these technologies. This study can provide effective information about importance of smart health system. This smart healthcare is conducted with the involvement of proper architecture. This is treated as effective energy efficiency architecture. Artificial intelligence is used increasingly in healthcare to maintain diagnosis and other important factors of healthcare. This application is also used to maintain patient engagement, which is also included in this study. Major hardware components are also included in this technology such as CO sensor and CO2 sensor.

2014 ◽  
Vol 519-520 ◽  
pp. 1538-1541
Author(s):  
Xiu Mei Wei ◽  
Jing Hong ◽  
Xiao Ning Guo

Through the analysis of application status of internet of things technology and cloud computing such as the new generation of information technologies in the wisdom agriculture and the existing problems, we puts forward the integrated model of IOT, cloud computing and agricultural information technology, and agricultural technology system architecture model of new generation information technology conditions.


2021 ◽  
Author(s):  
Michael Enbibel

This research is done for optimizing telemedicine framework by using fogging or fog computing for smart healthcare systems. Fog computing is used to solve the issues that arise on telemedicine framework of smart healthcare system like Infrastructural, Implementation, Acceptance, Data Management, Security, Bottleneck system organization, and Network latency Issues. we mainly used Distributed Data Flow (DDF) method using fog computing in order to fully solve the listed issues.


2021 ◽  
Vol 13 (3) ◽  
pp. 156-162
Author(s):  
Nataliya Blaga ◽  
◽  
Volodymyr Hobela

The mechanism of communication process and information security at an enterprise is considered. The theoretical aspects of the communications at the enterprise are based on the variety of its form and the relation of organizational and information structures: most activities have underlying links via information processes. Thus information security of communication process has a significant impact on the information security of the enterprise as a whole. In modern conditions and circumstances, the information security of the enterprise is largely reduced to cybersecurity and suffers from most threats of the latter. However, the human factor is responsible for most of the real facts of inflicting harm due to information security breaches. Thus, traditional mechanisms of privacy and confidentiality ensuring need to be adapted to new realities. New opportunities also set new requirements for understanding the very concept of information security: information must not only be protected but also timely and accurate as far as it is possible to be provided with modern telecommunication systems and information technologies: information security is a system of information protection of the enterprise – protection against theft, delayed and inaccurate providing of essential information to the recipient inside the enterprise or outside it. There are proposed and justified four principles necessary but not sufficient to ensure efficient mechanism of information security regarding communication process at small to medium enterprises. These include information awareness of staff even if they are not advanced with information technologies, traditional methods of protection against cyber threats such as passwords and encryption, control over information flows and the infrastructure that provides them, reliable cooperation and protection of remote access. These principles should be followed by managers at all levels.


Sign in / Sign up

Export Citation Format

Share Document