IoT Based Heart Attack Detection, Heart Rate and Temperature Monitor

2019 ◽  
Vol 1 (6) ◽  
pp. 61-70
Author(s):  
Vaishnave A.K ◽  
Jenisha S.T ◽  
Tamil Selvi S

The Internet of Things (IoT) is inter communication of embedded devices using networking technologies. The IoT will be one of the important trends in future; can affect the networking, business and communication. In this paper, proposing a remote sensing parameter of the human body which consists of pulse and temperature. The parameters that are used for sensing and monitoring will send the data through wireless sensors. Adding a web based observing helps to keep track of the regular status of patient. The sensing data will be continuously collected in a database and will be used to inform patient to any unseen problems to undergo possible diagnosis. Experimental results prove the proposed system is user friendly, reliable, economical. IoT typically expected to propose the advanced high bandwidth connectivity of embedded devices, systems and services which goes beyond machine –to – machine (M2M) context. The advanced connectivity of devices aide in automation is possible in nearly all field. Everyone today is so busy in their lives; even they forget to take care of their health. By keeping all these things in minds, technology really proves to be an asset for an individual. With the advancement in technology, lots of smart or medical sensors came into existence that continuously analyzes individual patient activity and automatically predicts a heart attack before the patient feels sick.

2017 ◽  
Vol 170 (5) ◽  
pp. 26-30 ◽  
Author(s):  
Gowrishankar S. ◽  
Prachita M. ◽  
Arvind Prakash

2017 ◽  
Vol 1 (1) ◽  
pp. 44-49
Author(s):  
Nur Azizah ◽  
Dedeh Supriyanti ◽  
Siti Fairuz Aminah Mustapha ◽  
Holly Yang

In a company, the process of income and expense of money must have a profit-generating goal base. The success of financial management within the company, can be monitored from the ability of the financial management in managing the finances and utilize all the opportunities that exist with as much as possible with the aim to control the company's cash (cash flow) and the impact of generating profits in accordance with expectations. With a web-based online accounting system version 2.0, companies can be given the ease to manage money in and out of the company's cash. It has a user friendly system with navigation that makes it easy for the financial management to use it. Starting from the creation of a company's cash account used as a cash account and corporate bank account on the system, deletion or filing of cash accounts, up to the transfer invoice creation feature, receive and send money. Thus, this system is very effective and efficient in the management of income and corporate cash disbursements.   Keywords:​Accounting Online System, Financial Management, Cash and Bank


2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Mehmet EMIN KORTAK

This research aimed at designing and improving the web-based integrated peer and self- assessment. WesPASS (web-based peer-assessment system), developed in this research, allows students to assess their own or their peers’ performance and project assignments and to report about the result of these assessments so that they correct their assignments. This study employed design-based research. The participants included 102 fourth grade primary school students and their 4 teachers from 2 state and 2 private primary schools in Ankara, Kecioren (Turkey) who employed the system and were engaged in a questionnaire survey to assess its quality. The findings were analyzed through quantitative data analysis. The findings revealed that the system can be used by elementary school students for peer and self-assessment system. The participants stated that WesPASS is simple and user-friendly, and it accelerates the assessment process by employing information technology and allows to share opinions 


2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

With the rapid increase in the volume of e-commerce, the security of web-based transactions is of increasing concern. A widespread but dangerously incorrect belief among web users is that all security issues are taken care of when a website uses HTTPS (secure HTTP). While HTTPS does provide security, websites are often developed and deployed in ways that make them and their users vulnerable to hackers. In this article we explore some of these vulnerabilities. We first introduce the key ideas and then provide several experiential learning exercises so that readers can understand the challenges and possible solutions to them in a hands-on manner.


2020 ◽  
Author(s):  
Suchitra Giri ◽  
Ujjwal Kumar ◽  
Varsha Sharma ◽  
Satish Kumar ◽  
Sikha Kumari ◽  
...  

2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-42
Author(s):  
Abdullah Qasem ◽  
Paria Shirani ◽  
Mourad Debbabi ◽  
Lingyu Wang ◽  
Bernard Lebel ◽  
...  

In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 460
Author(s):  
Yun-Hsuan Chen ◽  
Mohamad Sawan

We review in this paper the wearable-based technologies intended for real-time monitoring of stroke-related physiological parameters. These measurements are undertaken to prevent death and disability due to stroke. We compare the various characteristics, such as weight, accessibility, frequency of use, data continuity, and response time of these wearables. It was found that the most user-friendly wearables can have limitations in reporting high-precision prediction outcomes. Therefore, we report also the trend of integrating these wearables into the internet of things (IoT) and combining electronic health records (EHRs) and machine learning (ML) algorithms to establish a stroke risk prediction system. Due to different characteristics, such as accessibility, time, and spatial resolution of various wearable-based technologies, strategies of applying different types of wearables to maximize the efficacy of stroke risk prediction are also reported. In addition, based on the various applications of multimodal electroencephalography–functional near-infrared spectroscopy (EEG–fNIRS) on stroke patients, the perspective of using this technique to improve the prediction performance is elaborated. Expected prediction has to be dynamically delivered with high-precision outcomes. There is a need for stroke risk stratification and management to reduce the resulting social and economic burden.


Metabolites ◽  
2021 ◽  
Vol 11 (2) ◽  
pp. 113
Author(s):  
Julia Koblitz ◽  
Sabine Will ◽  
S. Riemer ◽  
Thomas Ulas ◽  
Meina Neumann-Schaal ◽  
...  

Genome-scale metabolic models are of high interest in a number of different research fields. Flux balance analysis (FBA) and other mathematical methods allow the prediction of the steady-state behavior of metabolic networks under different environmental conditions. However, many existing applications for flux optimizations do not provide a metabolite-centric view on fluxes. Metano is a standalone, open-source toolbox for the analysis and refinement of metabolic models. While flux distributions in metabolic networks are predominantly analyzed from a reaction-centric point of view, the Metano methods of split-ratio analysis and metabolite flux minimization also allow a metabolite-centric view on flux distributions. In addition, we present MMTB (Metano Modeling Toolbox), a web-based toolbox for metabolic modeling including a user-friendly interface to Metano methods. MMTB assists during bottom-up construction of metabolic models by integrating reaction and enzymatic annotation data from different databases. Furthermore, MMTB is especially designed for non-experienced users by providing an intuitive interface to the most commonly used modeling methods and offering novel visualizations. Additionally, MMTB allows users to upload their models, which can in turn be explored and analyzed by the community. We introduce MMTB by two use cases, involving a published model of Corynebacterium glutamicum and a newly created model of Phaeobacter inhibens.


2021 ◽  
pp. 193229682098557
Author(s):  
Alysha M. De Livera ◽  
Jonathan E. Shaw ◽  
Neale Cohen ◽  
Anne Reutens ◽  
Agus Salim

Motivation: Continuous glucose monitoring (CGM) systems are an essential part of novel technology in diabetes management and care. CGM studies have become increasingly popular among researchers, healthcare professionals, and people with diabetes due to the large amount of useful information that can be collected using CGM systems. The analysis of the data from these studies for research purposes, however, remains a challenge due to the characteristics and large volume of the data. Results: Currently, there are no publicly available interactive software applications that can perform statistical analyses and visualization of data from CGM studies. With the rapidly increasing popularity of CGM studies, such an application is becoming necessary for anyone who works with these large CGM datasets, in particular for those with little background in programming or statistics. CGMStatsAnalyser is a publicly available, user-friendly, web-based application, which can be used to interactively visualize, summarize, and statistically analyze voluminous and complex CGM datasets together with the subject characteristics with ease.


Sign in / Sign up

Export Citation Format

Share Document