SlideShare une entreprise Scribd logo
1  sur  17
A PROPOSED RFID WIRELESS BODY
SENSOR MESH NETWORK USING
INTELLIGENT AGENTS AND CLOUD-
BASED ARCHITECTURE
Tyrone Edwards, Tyrone Grandison, Suresh Sankaranarayanan
LACCEI Symposium of Health Informatics in Latin America and the Caribbean 2013
Outline
 Motivation
 The Proposal
 Foundational Technologies (FT)
 The System
 Conclusion
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
2
Motivation
 Information Technology holds promise for Healthcare
 Improve efficiency.
 Reduce error.
 In Jamaica:
 Healthcare is mostly paper-based
 Increased desire for Healthcare to be computer-based
 Most immediate impact potential in patient monitoring
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
3
The Proposal
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
4
 GOAL:
 Create infrastructure that merges wireless, RFID & cloud technology to
enable efficient, adaptive and cost-effective patient monitoring in Jamaica
 HOW:
 Integrate RFID Wireless Body Sensor Integrated Mesh Network
technology with Cloud-based intelligent agents.
 Use policy-driven agents.
 policies define the agent’s operational parameters.
 Policies created by the patient's assigned doctor and propagated through the
system.
 Extend system to support patient monitoring models defined using
Bayesian classifiers.
 Bayesian classifiers will allow for the training of agents to make decisions by
reasoning over the variations in expected readings of monitored parameters, and
the actual readings.
FT: Wireless Technologies
 Wireless Sensor Network
 Used in a wide range of fields for monitoring objects of interest.
 Can be setup in a number of configurations easily.
 When configured for ad-hoc environments are susceptible to frequent network
failures and are also unreliable.
 Failures are not acceptable in a healthcare setting, where critical information
about the patient is being transmitted.
 Wireless Mesh Networks (WMN)
 an extension of Local Area Networks (LANs).
 far better range and also use a limited amount of cabling.
 Wireless Sensor Mesh Network (WSMN)
 an integration of wireless sensors and mesh networks.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
5
FT: Radio Frequency Identification
 Radio Frequency Identification is used to:
 manage medical equipment
 dangerous medical substances and drugs
 inventory control
 identify and locate patients
 monitor patients’ physiological parameters
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
6
FT: Intelligent Agents
 Intelligent Agent Technology (IAT) was born from the field of
Artificial Intelligence.
 An agent is defined as “anything that can be viewed as
perceiving its environment through sensors and acting upon
that environment through effectors”.
 IAT as been used for searching and making appointments at
various healthcare facilities based on the patients current
health condition.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
7
FT: Cloud Computing
 Cloud computing presents Information Technology (IT) resources to
users as “Pay-Per-Use” services.
 Currently, there are three (3) primary services available via the
Cloud, namely:
 Infrastructure as a Service (IaaS)
 Platform as a Service (PaaS)
 Software as a Service (SaaS)
 ICT Healthcare service are good candidates to leverage Cloud
technology.
 Cloud–based Healthcare services can be accessed by small clinics
to multi-specialty hospital on a pay per use service.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
8
Proposed System: Architecture
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
9
Proposed System: Intelligent Agents
 Patient Agent (PA)
 Is located at the cluster head of the RFID-WBSMN of the patient
 Queries the sensors for data
 Transmits sensor data to the Aggregator Agent (AA).
 Aggregator Agent (AA)
 Is located at the Base Station
 Checks for indications of anomalous readings sent by the PA
 Initiates alerts to the Nurse and Doctor Agents of the on- duty medical staff
and also the patient’s assigned doctor.
 Transmits the patient’s data to the Cloud-based application server for final
processing and storage in the database server.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
10
Proposed System: Intelligent Agents
 Nurse Agent (NA)
 Is located on the smart handheld device for the on-duty nurse.
 Provide alerts to the on-duty Nurse
 Allows querying of patient’s status
 which includes current and past sensor readings.
 Doctor Agent (DA)
 Is located on the smart handheld device for the:
 on-duty doctor
 patient’s assigned doctor
 Provides alerts to the doctor
 Allows querying of patient’s status
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
11
Conclusion
 We propose a way to improve outcomes in Jamaica.
 We appreciate that there outstanding issues
 Workflow
 Security
 Privacy
 Engagement
 We hope that the leveraging of RFID, Wireless and Cloud
enables the speedy adoption and shortest time to impact.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
12
THANK YOU
August 14th, 2013
13
LACCEI Symposium of Health Informatics in Latin America and the Caribbean
BACKUP
August 14th, 2013
14
LACCEI Symposium of Health Informatics in Latin America and the Caribbean
Proposed System: Architecture
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
15
References
Ahsan, K., Shah, H., and Kingston, P. (2010, January). “RFID Applications: An Introductory and Exploratory Study”. International Journal
of Computer Science Issues (IJCSI), Vol. 7, No. 1, pp 1-7.
Akyildiz, I. F., Wang, X., and Wang, W. (2005). “Wireless mesh networks: a survey”. Computer Networks, Vol. 47, pp 445-487.
Benjamin, N. A., & Sankaranarayanan, S. (2009). “Performance of Wireless Body Sensor based Mesh Network for Health Application”.
International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), pp 21-28.
Castellani, A. P., Bui, N., Casari, P., Rossi, M., Shelby, Z., & Zorzi, M. (2010). “Architecture and protocols for the internet of things: A
case study”. Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops
(PERCOM Workshops), IEEE, pp. 678-683.
Edwards, T., & Sankaranarayanan, S. (2011). “Applications of Intelligent Agents in Hospital Search and Appointment System”.
International Journal of E-Services and Mobile Applications (IJESMA), Vol. 3, No. 4, pp 57-81.
Fifah, B S.(2013) “NFC Enabled Patient appointment System”, Bachelor of Internet Computing (Hons) Project, Department of
Computing and Information Systems, Institut Teknologi Brunei, Brunei.
Horowitz, B T.(2012). Hospital Cloud Platform Sends Patient Data From Emergency Vehicles to ERs, http://www.eweek.com/c/a/Health-
Care-IT/Hospital-Cloud-Platform-Sends-Patient-Data-From-Emergency-Vehicles-to-ERs-561382/, 04/11/13.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
16
References
Korkmaz, I., Atay, C., and Kyparisis, G. (2010). “A Mobile Patient Monitoring System Using RFID”. Latest Trends on Computers, Vol. 2, pp 726-732.
Lefebvre, E., Castro, L., and Lefebvre, L. A. (2011). “Assessing the prevailing implementation issues of RFID in healthcare: A five-phase implementation
model”. International Journal of Computers and Communications, Vol. 5, No. 2, pp 101-117.
Mitrokotsa, A., and Douligeris, C. (2009). “Integrate RFID and Sensor Networks: Architectures and Applications”. RFID and Sensor Networks, pp 511-536.
Morak, J., Schreier, G. (2012). “MHealth based on NFC Technology-Preliminary results from Medium Scale Proof of Concept Projects”, Proceedings of
Ehealth 2012, Vienna, Austria.
Rantzau, R. Kailing, K. Beier, S. Grandison, T. (2006). "Discovery Services Enabling RFID Traceability in EPCglobal Networks". Proceedings of the 13th
International Conference on Management of Data (COMAD) 2006, Delhi, India. December 2006.
Sankaranarayanan, S. (2008). “Policy based Agent Architecture for Sensor based Mesh Networks-Health Care Monitoring”. Proceedings of the International
Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-08), Florida, USA: Curran Associates, Inc., pp. 75-81.
Sankaranarayanan, S., and Ganesan, S. (2009). “A layered architecture for agent based wireless sensor mesh networks- applications in healthcare”.
International Journal of Embedded System and Computer Engineering, Vol. 1, No. 1, pp 51-61.
Singh, S. K., Singh, M. P., and Singh, D. K. (2010). “Routing Protocols in Wireless Sensor Networks – A Survey”. International Journal of Computer Science &
Engineering Survey (IJCSES), Vol. 1, No. 2, pp 63-83.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
17

Contenu connexe

En vedette

Course 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateCourse 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateImad Daou
 
Eje cafetero
Eje cafeteroEje cafetero
Eje cafeteroeduardo
 
Jw day 10 (unit 3)
Jw day 10 (unit 3)Jw day 10 (unit 3)
Jw day 10 (unit 3)Angala Maria
 
Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)Julie Anne Kent
 
Blogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective LearningBlogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective Learningvogmae
 
Versaille (1)
Versaille (1)Versaille (1)
Versaille (1)pesak
 
Just Words day 6 (unit 2)
Just Words day 6 (unit 2)Just Words day 6 (unit 2)
Just Words day 6 (unit 2)Angala Maria
 
CentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network ToolCentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network ToolImad Daou
 
Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011Fredrik Karlsson
 
Children’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent ForsethChildren’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent ForsethChildren's Hospital and Health System
 
Московский workshop ЕАСD
Московский workshop ЕАСDМосковский workshop ЕАСD
Московский workshop ЕАСDElena Sosnovtseva
 
Presentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility frameworkPresentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility frameworkGrial - University of Salamanca
 

En vedette (18)

Course 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateCourse 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM Template
 
Eje cafetero
Eje cafeteroEje cafetero
Eje cafetero
 
Paulitaaa
PaulitaaaPaulitaaa
Paulitaaa
 
Jw day 10 (unit 3)
Jw day 10 (unit 3)Jw day 10 (unit 3)
Jw day 10 (unit 3)
 
Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)
 
Blogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective LearningBlogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective Learning
 
Versaille (1)
Versaille (1)Versaille (1)
Versaille (1)
 
Just Words day 8
Just Words day 8Just Words day 8
Just Words day 8
 
CLIL training Spain
CLIL training SpainCLIL training Spain
CLIL training Spain
 
Just Words day 6 (unit 2)
Just Words day 6 (unit 2)Just Words day 6 (unit 2)
Just Words day 6 (unit 2)
 
CentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network ToolCentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network Tool
 
Double entry
Double entryDouble entry
Double entry
 
Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011
 
3 a ukraine
3 a ukraine3 a ukraine
3 a ukraine
 
Children’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent ForsethChildren’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
 
Московский workshop ЕАСD
Московский workshop ЕАСDМосковский workshop ЕАСD
Московский workshop ЕАСD
 
Iværksætterkursus trin 2
Iværksætterkursus trin 2Iværksætterkursus trin 2
Iværksætterkursus trin 2
 
Presentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility frameworkPresentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility framework
 

Plus de Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Tyrone Grandison
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessTyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodTyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab LaunchTyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanTyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusTyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of InnovationTyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMETyrone Grandison
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceTyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social GoodTyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationTyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of AmericaTyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsTyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeTyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in HealthcareTyrone Grandison
 

Plus de Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

A Proposed RFID Wireless Body Sensor Mesh Network using Intelligent Agents and Cloud-based Architecture

  • 1. A PROPOSED RFID WIRELESS BODY SENSOR MESH NETWORK USING INTELLIGENT AGENTS AND CLOUD- BASED ARCHITECTURE Tyrone Edwards, Tyrone Grandison, Suresh Sankaranarayanan LACCEI Symposium of Health Informatics in Latin America and the Caribbean 2013
  • 2. Outline  Motivation  The Proposal  Foundational Technologies (FT)  The System  Conclusion August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 2
  • 3. Motivation  Information Technology holds promise for Healthcare  Improve efficiency.  Reduce error.  In Jamaica:  Healthcare is mostly paper-based  Increased desire for Healthcare to be computer-based  Most immediate impact potential in patient monitoring August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 3
  • 4. The Proposal August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 4  GOAL:  Create infrastructure that merges wireless, RFID & cloud technology to enable efficient, adaptive and cost-effective patient monitoring in Jamaica  HOW:  Integrate RFID Wireless Body Sensor Integrated Mesh Network technology with Cloud-based intelligent agents.  Use policy-driven agents.  policies define the agent’s operational parameters.  Policies created by the patient's assigned doctor and propagated through the system.  Extend system to support patient monitoring models defined using Bayesian classifiers.  Bayesian classifiers will allow for the training of agents to make decisions by reasoning over the variations in expected readings of monitored parameters, and the actual readings.
  • 5. FT: Wireless Technologies  Wireless Sensor Network  Used in a wide range of fields for monitoring objects of interest.  Can be setup in a number of configurations easily.  When configured for ad-hoc environments are susceptible to frequent network failures and are also unreliable.  Failures are not acceptable in a healthcare setting, where critical information about the patient is being transmitted.  Wireless Mesh Networks (WMN)  an extension of Local Area Networks (LANs).  far better range and also use a limited amount of cabling.  Wireless Sensor Mesh Network (WSMN)  an integration of wireless sensors and mesh networks. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 5
  • 6. FT: Radio Frequency Identification  Radio Frequency Identification is used to:  manage medical equipment  dangerous medical substances and drugs  inventory control  identify and locate patients  monitor patients’ physiological parameters August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 6
  • 7. FT: Intelligent Agents  Intelligent Agent Technology (IAT) was born from the field of Artificial Intelligence.  An agent is defined as “anything that can be viewed as perceiving its environment through sensors and acting upon that environment through effectors”.  IAT as been used for searching and making appointments at various healthcare facilities based on the patients current health condition. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 7
  • 8. FT: Cloud Computing  Cloud computing presents Information Technology (IT) resources to users as “Pay-Per-Use” services.  Currently, there are three (3) primary services available via the Cloud, namely:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS)  ICT Healthcare service are good candidates to leverage Cloud technology.  Cloud–based Healthcare services can be accessed by small clinics to multi-specialty hospital on a pay per use service. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 8
  • 9. Proposed System: Architecture August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 9
  • 10. Proposed System: Intelligent Agents  Patient Agent (PA)  Is located at the cluster head of the RFID-WBSMN of the patient  Queries the sensors for data  Transmits sensor data to the Aggregator Agent (AA).  Aggregator Agent (AA)  Is located at the Base Station  Checks for indications of anomalous readings sent by the PA  Initiates alerts to the Nurse and Doctor Agents of the on- duty medical staff and also the patient’s assigned doctor.  Transmits the patient’s data to the Cloud-based application server for final processing and storage in the database server. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 10
  • 11. Proposed System: Intelligent Agents  Nurse Agent (NA)  Is located on the smart handheld device for the on-duty nurse.  Provide alerts to the on-duty Nurse  Allows querying of patient’s status  which includes current and past sensor readings.  Doctor Agent (DA)  Is located on the smart handheld device for the:  on-duty doctor  patient’s assigned doctor  Provides alerts to the doctor  Allows querying of patient’s status August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 11
  • 12. Conclusion  We propose a way to improve outcomes in Jamaica.  We appreciate that there outstanding issues  Workflow  Security  Privacy  Engagement  We hope that the leveraging of RFID, Wireless and Cloud enables the speedy adoption and shortest time to impact. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 12
  • 13. THANK YOU August 14th, 2013 13 LACCEI Symposium of Health Informatics in Latin America and the Caribbean
  • 14. BACKUP August 14th, 2013 14 LACCEI Symposium of Health Informatics in Latin America and the Caribbean
  • 15. Proposed System: Architecture August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 15
  • 16. References Ahsan, K., Shah, H., and Kingston, P. (2010, January). “RFID Applications: An Introductory and Exploratory Study”. International Journal of Computer Science Issues (IJCSI), Vol. 7, No. 1, pp 1-7. Akyildiz, I. F., Wang, X., and Wang, W. (2005). “Wireless mesh networks: a survey”. Computer Networks, Vol. 47, pp 445-487. Benjamin, N. A., & Sankaranarayanan, S. (2009). “Performance of Wireless Body Sensor based Mesh Network for Health Application”. International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), pp 21-28. Castellani, A. P., Bui, N., Casari, P., Rossi, M., Shelby, Z., & Zorzi, M. (2010). “Architecture and protocols for the internet of things: A case study”. Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, pp. 678-683. Edwards, T., & Sankaranarayanan, S. (2011). “Applications of Intelligent Agents in Hospital Search and Appointment System”. International Journal of E-Services and Mobile Applications (IJESMA), Vol. 3, No. 4, pp 57-81. Fifah, B S.(2013) “NFC Enabled Patient appointment System”, Bachelor of Internet Computing (Hons) Project, Department of Computing and Information Systems, Institut Teknologi Brunei, Brunei. Horowitz, B T.(2012). Hospital Cloud Platform Sends Patient Data From Emergency Vehicles to ERs, http://www.eweek.com/c/a/Health- Care-IT/Hospital-Cloud-Platform-Sends-Patient-Data-From-Emergency-Vehicles-to-ERs-561382/, 04/11/13. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 16
  • 17. References Korkmaz, I., Atay, C., and Kyparisis, G. (2010). “A Mobile Patient Monitoring System Using RFID”. Latest Trends on Computers, Vol. 2, pp 726-732. Lefebvre, E., Castro, L., and Lefebvre, L. A. (2011). “Assessing the prevailing implementation issues of RFID in healthcare: A five-phase implementation model”. International Journal of Computers and Communications, Vol. 5, No. 2, pp 101-117. Mitrokotsa, A., and Douligeris, C. (2009). “Integrate RFID and Sensor Networks: Architectures and Applications”. RFID and Sensor Networks, pp 511-536. Morak, J., Schreier, G. (2012). “MHealth based on NFC Technology-Preliminary results from Medium Scale Proof of Concept Projects”, Proceedings of Ehealth 2012, Vienna, Austria. Rantzau, R. Kailing, K. Beier, S. Grandison, T. (2006). "Discovery Services Enabling RFID Traceability in EPCglobal Networks". Proceedings of the 13th International Conference on Management of Data (COMAD) 2006, Delhi, India. December 2006. Sankaranarayanan, S. (2008). “Policy based Agent Architecture for Sensor based Mesh Networks-Health Care Monitoring”. Proceedings of the International Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-08), Florida, USA: Curran Associates, Inc., pp. 75-81. Sankaranarayanan, S., and Ganesan, S. (2009). “A layered architecture for agent based wireless sensor mesh networks- applications in healthcare”. International Journal of Embedded System and Computer Engineering, Vol. 1, No. 1, pp 51-61. Singh, S. K., Singh, M. P., and Singh, D. K. (2010). “Routing Protocols in Wireless Sensor Networks – A Survey”. International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 1, No. 2, pp 63-83. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 17