SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Heart Failure Alert System using Rfid Technology



                  Heart Failure Alert System using Rfid Technology
             C.Sri Aditya                                   K.S.Praneeth                                 B.V.S.Sripathi
           EEE Department                                  CSE Department                               ECE Department
          (3rd year, 1st sem)                             (3rd year, 1st sem)                          (3rd year, 1st sem)
       Guru Nanak Engg. College                        Guru Nanak Engg. College                     Guru Nanak Engg. College




Abstract
           Now-a-days the deaths caused due to the heart              This paper gives a predicted general model for Heart Failure

failure have been of major concern .The majority of the deaths        Alert System. It also discusses the Algorithm for converting

caused by heart failures are due to the lack of medical               the Analog pulse to Binary data in the tag and the Algorithm

assistance in time. This paper gives an insight of a new              for Alerting the Location & Tracking Station. It discusses in

technology that relates directly to the exploding wireless            detail the various stages involved in tracking the exact location

marketplace. This technology is a whole new wireless and              of the Victim using this technology.

RFID (Radio Frequency Identification) enabled frontier in             Keywords:

which a victim’s actual location is integral for providing                RFID, RFID-passive tags, GPS, PAM.

valuable medical services.                                            1. Introduction:
The paper will be demonstrating for the first time ever the                      It is tough to declare convincingly what is the most
usage of wireless telecommunications systems and miniature            important organ of our body.Infact every organ has its own
sensor devices like RFID passive Tags , that are smaller than a       importance contributing and coordinating superbly to keep the
grain of rice and equipped with a tiny antenna which will             wonderful machine the human body functioning smoothly.
capture and wirelessly transmit a person's vital body-function        And one of the primary organs which the body cannot do
data, such as pulse or body temperature , to an integrated            without is the heart, 72 beats a minute or over a trillion in a
ground station. In addition, the antenna will also receive            lifetime. The pump house of our body pumping the blood to
information regarding the location of the individual from the         every corner of our body every moment, thus sending oxygen
GPS (Global Positioning Satellite) System. Both sets of data          and nutrients to each and every cell. Over a period of time, the
medical information and location will then be wirelessly              heart muscles go weak, the arteries get blocked and sometimes
transmitted to the ground station and made available to save          because of a shock a part of the heart stops functioning
lives by remotely monitoring the medical conditions of at-risk        resulting in what is called a HEART ATTACK. Heart attack is
patients and providing emergency rescue units with the                a major cause of death and in today’s tension full world it has
person's exact location.                                              become very common. Presently there is no mechanism by
                                                                      which a device monitors a person’s heart 24 hours a day, 7
                                                                      days a week and gives him instant protection in case of
                                                                      problem. Our primary focus is on people with a history of
                                                                      heart problem as they are more prone to death due to heart
Copyright © 2007
Paper Identification Number: SC-5.4                                   failure. In the 1970s, a group of scientists at the Lawrence
This peer-reviewed paper has been published by the Pentagram
Research Centre (P) Limited. Responsibility of contents of this       Livermore Laboratory (LLL) realized that a handheld receiver
paper rests upon the authors and not upon Pentagram Research
                                                                      stimulated by RF power could send back a coded radio signal.
Centre (P) Limited. Copies can be obtained from the company for a
cost                                                                  Such a system could be connected to a simple computer and
                                                                      used to control access to a secure facility.




                                                                    292
International Conference on Systemics, Cybernetics and Informatics



This system ultimately became one of the first building entry        The RF tags could be divided in two major groups:
systems based on the first commercial use of RFID.                   Passive, where the power to energize the tag’s circuitry is
RFID or Radio Frequency identification is a technology that          draw from the reader generated field.
enables the tracking or identification of objects using IC based     Active, in this case the tag has an internal power source, in
tags with an RF circuit and antenna, and RF readers that             general a battery that could be replaceable or not, in some case
"read" and in some case modify the information stored in the         this feature limited the tag lifetime, but for some applications
IC memory. RFID is an automated data-capture technology              this is not important, or the tag is designed to live more than
that can be used to electronically identify, track, and store        the typical time needed.
information about groups of products, individual items, or             Rfid readers:
product components. The technology consists of three key                       RFID readers are querying systems that interrogate
pieces:                                                              or send signals to the tags and receive the responses. These
•                    RFID tags;                                      responses can be stored within the reader for later transfer to a
•                    RFID readers;                                   data collection system or instantaneously transferred to the
•                    A data collection and management                data collection system. Like the tags themselves, RFID readers
system.                                                              come in many sizes. RFID readers are usually on, continually
Rfid tags:                                                           transmitting radio energy and awaiting any tags that enter their
          RFID tags are small or miniaturized computer chips         field of operation. However, for some applications, this is
programmed with information about a product or with a                unnecessary and could be undesirable in battery-powered
number that corresponds to information that is stored in a           devices that need to conserve energy. Thus, it is possible to
database. The tags can be located inside or on the surface of        configure an RFID reader so that it sends the radio pulse only
the product, item, or packing material.                              in response to an external event. For example, most electronic
                                                                     toll collection systems have the reader constantly powered
                                                                     upon that every passing car will be recorded. On the other
                                                                     hand, RFID scanners used in veterinarian’s offices are
                                                                     frequently equipped with triggers and power up the only when
                                                                     the trigger is pulled. The largest readers might consist of a
                                                                     desktop personal computer with a special card and multiple
                                                                     antennas connected to the card through shielded cable. Such a
                                                                     reader would typically have a network connection as well so
                                                                     that it could report tags that it reads to other computers. The
                                                                     smallest readers are the size of a postage stamp and are
                                                                     designed to be embedded in mobile telephones.

                                                                     2. General Model for Heart Failure Alert
                                                                     System:




                                                                 293
Heart Failure Alert System using Rfid Technology



The Heart Failure Alert System consists of:
•         RFID Tag (Implanted into Human body).
•         RFID Reader (Placed in a Cellular Phone).
•         Global Positioning Satellite System.
•         Locating & Tracking Station.
•         Mobile Rescue Units.
The grain-sized RFID Tag is implanted into the human body,            Fig: Grain sized RFID Tag
which keeps track of the heart pulse in the form of Voltage           RFID Tags are smaller than a grain of rice and equipped with
levels. A RFID Reader is placed into the Cellular Phone. The          a tiny antenna will capture and wirelessly transmit a person's
RFID Reader sends a Command to the RFID Tag which in                  vital body-function data, such as pulse and do not require line
turn sends these Voltage pulses in the form of bits using the         of sight. These tags are capable of identifying the Heart pulses
Embedded Software in the Tag as Response which is a                   in the form of Voltage levels and converts into a bit sequence.
continuous process. These bit sequence is then sent to                The first step in A-D Conversion is Pulse Amplitude
Software Program in the Cellular Phone as input and checks            Modulation(PAM).This takes an Analog signal, samples it and
for the Condition of Heart Failure. If any sign of Failure is         generates a sequence of pulses based on the results of the
sensed then immediately an ALERT Signal will be generated             Sampling(measuring        the      Amplitude       at     equal
and in turn results in the AUTODIALING to the Locating &              intervals)PCM(Pulse     Code    Modulation)quantizes      PAM
Tracking Station. This station with the use of GPS System             Pulses.ie the method of assigning integral values in a specific
comes to know the Whereabouts of the Victim. The Locating             range to sampled instances. The binary encoding of these
& Tracking Station also simultaneously alerts the Rescue              integral values is done based on the Algorithm BIN_ENC
Units.                                                                depending on the Average Heart pulse voltage of the Victim
3. Working of implanted rfid tags:                                    (Avg_pulse).
         Passive RFID systems typically couple the transmitter        Alg BIN_ENC:
to the receiver with either load modulation or backscatter,           Step1: Read the Analog Signals from the Heart.
depending on whether the tags are operating in the near or far        Step2: Sample the Analog Signal and generate series of
field of the reader, respectively. In the near field, a tag couples   pulses based on the
with a reader via electromagnetic inductance. The antennas of                Results of Sampling based on the Tag Frequency.
both the reader and the tag are formed as coils, using many           Step3: Assign Integral Values to each Sampled Instances
turns of small gauge wire. The reader communicates with the           generated.
tag by modulating a carrier wave, which it does by varying the        Step4: Consider every Individual Sampled Unit and
amplitude, phase, or frequency of the carrier, depending on the       Compare with the Average
design of the RFID system in question. The tag communicates
with the reader by varying how much it loads its antenna. This          Voltage Level of the Heart.
in turn affects the voltage across the reader’s antenna. By           Step5: If the Sampled Instance Value is in between the
switching the load on and off rapidly, the tag can establish its      avg_pulse Values
own carrier frequency (really a sub carrier) that the tag can in             Then Assign BIT=0
turn modulate to communicate its reply.                                      Otherwise Assign BIT=1
                                                                      Step6: Generate the bit sequence by considering all the
                                                                      generated Individual
                                                                             Sample Instances.




                                                                  294
International Conference on Systemics, Cybernetics and Informatics



                                                                  Algorithm ALERT.
                                                                  Alg ALERT:
                                                                        Step 1: Read the bit sequence from the Reader.
                                                                        Step 2: Count for the no of bit zeros in the data using
                                                                  a counter.
                                                                        Step 3: If you encounter a bit one, then set counter to
                                                                  zero.
                                                                        Step 4: If the counter is equal to five then go to Step 5
                                                                  else go to Step 1.
                                                                        Step 5: Send alert to the nearest Locating & Tracking
                                                                  Station.

Fig: Analog-Binary Digits Conversion in Tags
                                                                  4. Stages In Heart Failure Alert System:
                                                                  Stage 1:

Working of rfid reader inside cellular phone:
The RFID reader sends a pulse of radio energy to the tag and
listens for the Tag’s response. The tag detects this energy and
sends back a response that contains the tag’s serial number
and possibly other information as well. In simple RFID
systems, the reader’s pulse of energy functioned as an on-off     The Tag continuously senses the Heart Pulses, when the
switch; in more sophisticated systems, the reader’s RF signal     Reader sends a Command it sends the output of the
can contain commands to the tag, instructions to read or write    BIN_ENC() as the Response to the Reader.
memory that the tag contains. Historically, RFID readers were
                                                                  /*Module for the Conversion of Analog Signals to Binary
designed to read only a particular kind of tag, RFID readers      digits*/
are usually on, continually transmitting radio energy and         BIN_ENC()
awaiting any tags that enter their field of operation.              {
                                                                            Scanf (“The Value of the generated Sample %f”, Value);
                                                                            If (+Avg_pulse<Value<-Ang_pulse)
                                                                              {Bit=0 ;}
                                                                            else if (Value>+Avg_pulse || Value<-Avg_pulse)
                                                                                 {Bit=1 ;}
                                                                        }

Fig: RFID Reader in cellular phone.
The Reader continuously sends the Command to the tags and
                                                                  Stage 2:
in turn receives the Voltage levels in the form of bit sequence
as Response from the tags with the help of the BIN_ENC
algorithm. The reader sends the received Bit Sequence to a
software embedded in the cellular phone , In case of detection
of a weak heart pulse this software automatically alerts the
Tracking & Location station . The software uses the




                                                              295
Heart Failure Alert System using Rfid Technology



                                                                       simultaneous ALERT to both the GPS System & Mobile
The bits obtained are sent to the ALERT() program to check             Rescue Unit in order to alert the Rescue team in the Mobile
whether the bit is ’BIT 0’ or ’BIT 1’.If a ‘BIT 0’ is                  Rescue Unit to indicate a possible Heart Failure within the
encountered, the counter is incremented and again it checks            radius of the Unit. The GPS System mean-while tracks the
for the next bit. If a ‘BIT 1’is encountered then counter is set       exact location of the Victim and it guides the Mobile Rescue
to zero and it again checks for the next bit. If counter=5 then it     Unit to the destination in time and provides immediate
alerts the Locating & Tracking Station.                                medical assistance to the Victim.
/*Module for checking the Weak Pulse */                                5. Conclusion:
ALERT ()                                                                         This new technology will open up a new era in the
 {                                                                     field of Biomedical Engineering .The only drawback of this
     if (bit==0)                                                       technology is that, It doesn’t give the promise of saving every
         { counter++;      }                                           person who is implanted with the tag and using this
     else                                                              technology. In the near future; we would like to extend the
          {counter=0 ;}                                                technology so that every customer who is implanted with the
         if(counter==5)                                                tags and those who have been using the technology will be
          {                                                            saved. The Worlds first GSM phone (NOKIA 5140)offering
              printf(“ Report ‘Weak Pulse Detected’ to Locating &      with RFID reading capability has already come into the
Tracking System”);                                                     market, In the near future the rfid readers would come into the
              counter=0;                                               wrist watches, which would be handy than the cellular phones.
          }                                                            This new technology would probably become cheaper in the
     }                                                                 future. In the near future we hope this new technology would
Stage 3:                                                               probably reduce the deaths due to heart failures.




                                                                       Fig: Nokia 5140 Handset offering RIFD Reader
A Special ALERT message is sent to the Locating & Tracking             6. a. Web References:
System through the Cellular Phone by making use of features            1.”Identity chip planted under the skin approved for use in
like AutoMessaging, Autodialling which will be provided by             Health care”.
the Cellular Network Service Provider. Then the Locating &             URL: http://www.spychips.com
Tracking Station simultaneously sends an ALERT to the                  2.”RFID Tags and RFID Chips”
Mobile Rescue Unit and sends a request to GPS System for               URL: http://www.rfidjournal.com
the proper location of the RFID Reader (or the Cellular                3.”Latest Updates on RFID”
Phone).The         Locating    &   Tracking   Station   sends   an



                                                                     296
International Conference on Systemics, Cybernetics and Informatics



URL: http://www.rfidnews.com                                                   EMAIL:-karanatipraneeth@yahoo.com,
4. "Fundamentals and Applications in Contact less Smart                        ph-no:040-27000965,9441885112
Cards and Identification"                                                 3.   B.V.S.Sripathi: : Currently pursuing his B.Tech in
URL:http://www.rfid-handbook.de/index.html                                     3rd   year,   Electronics    and      communications
5.”Annual review of Bio-medical Engineering:”                                  Engineering in Guru Nanak Engineering College,
URL: http://www.ide.com                                                        Ibrahimpatnam. His areas of inetersts are radio wave
6.”Injectable     Electronic    Identification,   Monitoring   and             propagation, Digital communications, Signals and
Simulating Systems”                                                            systems        and          digital       electronics
URL: http://www.in-stat.com                                                    EMAIL:-santhosh_gnec@yahoo.co.in,
7.”Changing the world for less than the price of a cup of a                    Ph-no: 040-27115512
coffee”
URL: http://www.line56.com
8. www.siliconchip.com.au
9. www.wdrg.com/news/currentPR/rfid.html
10. www.digitalangel.net
6. b. Other References:
     1.   RFID SECURITY – by Pete Lindstorm
     2.   RFID ESSENTIALS – by Bill Glover, Himanshu
          Bhatt
     3.   RFID Case Studies - by Dr. Peter Harrop
     4.   RFID - George P. Lister
7. Authors:
     1.   C.Sri Aditya: Currently pursuing his B.Tech in 3rd
          year, Electrical and electronics Engineering in Guru
          Nanak Engineering College, Ibrahimpatnam.. He
          has presented a paper based on ‘Fuel Cells’ along
          with     other   classmates    at   Guru   Nanak     Dev
          Engineering college, Bidar. And also secured the
          third place at the techno-quiz held at the same
          college. His area of interests are Power electronics,
          Power systems, Nano generators, radio wave
          propagation          EMAIL:aditya.moorthi@gmail.com
          Ph.No : 040-40158638, 040-27135238
     2.   K.S.Praneeth: Currently pursuing his B.Tech 3rd
          year in Computer science and engineering at Guru
          Nanak Engineering College, Ibrahimpatnam. His
          area of interests is computer programming, artificial
          intelligence, data communications, and radio wave
          propagation.




                                                                 297

Contenu connexe

Tendances

Tendances (20)

Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology ppt
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Wearable biosensors1
Wearable biosensors1Wearable biosensors1
Wearable biosensors1
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
IBOC TECHNOLOGY
IBOC TECHNOLOGYIBOC TECHNOLOGY
IBOC TECHNOLOGY
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID
RFIDRFID
RFID
 
Types of sensors
Types of sensorsTypes of sensors
Types of sensors
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
 
Brain chips seminar ppt
Brain chips seminar ppt Brain chips seminar ppt
Brain chips seminar ppt
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection System
 
Abstract Of The Rfid Project I
Abstract Of The Rfid Project IAbstract Of The Rfid Project I
Abstract Of The Rfid Project I
 
Advanced Wireless Communication-EC8092
Advanced Wireless Communication-EC8092Advanced Wireless Communication-EC8092
Advanced Wireless Communication-EC8092
 
Image Sensor PPT
Image Sensor PPTImage Sensor PPT
Image Sensor PPT
 
Smart sensors
Smart sensorsSmart sensors
Smart sensors
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Smart sensors and their Application
Smart sensors and their ApplicationSmart sensors and their Application
Smart sensors and their Application
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 

En vedette

Artificial Passenger Fair
Artificial Passenger FairArtificial Passenger Fair
Artificial Passenger FairDIYA NAMBIAR
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing TechnologyMurlidhar Sarda
 
Rama krishna ppts for blue gene/L
Rama krishna ppts for blue gene/LRama krishna ppts for blue gene/L
Rama krishna ppts for blue gene/Lmsramakrishna
 
Free Space Optics
Free  Space  OpticsFree  Space  Optics
Free Space OpticsBise Mond
 
Machine vision systems ppt
Machine vision systems pptMachine vision systems ppt
Machine vision systems pptAkash Maurya
 
Free space optics (FSO)
Free space optics (FSO)Free space optics (FSO)
Free space optics (FSO)Bhavik Trivedi
 
Artificial Passenger
Artificial PassengerArtificial Passenger
Artificial Passengerpriyanka kini
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interfaceKomal Maloo
 
Introduction: some key thinkers in 20th Anthropology
Introduction: some key thinkers in 20th AnthropologyIntroduction: some key thinkers in 20th Anthropology
Introduction: some key thinkers in 20th AnthropologyHutchesons'​ Grammar School
 
1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy
1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy
1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoyCenk Ersoy
 
Ddwp minutes 16 10-2014
Ddwp minutes 16 10-2014Ddwp minutes 16 10-2014
Ddwp minutes 16 10-2014hayat alishah
 
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...Đông y Thọ Xuân Đường
 
Proforma monitoring p&d 25 2-2015
Proforma monitoring p&d 25 2-2015Proforma monitoring p&d 25 2-2015
Proforma monitoring p&d 25 2-2015hayat alishah
 

En vedette (18)

Artificial Passenger Fair
Artificial Passenger FairArtificial Passenger Fair
Artificial Passenger Fair
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing Technology
 
Rama krishna ppts for blue gene/L
Rama krishna ppts for blue gene/LRama krishna ppts for blue gene/L
Rama krishna ppts for blue gene/L
 
Free Space Optics
Free  Space  OpticsFree  Space  Optics
Free Space Optics
 
Machine vision systems ppt
Machine vision systems pptMachine vision systems ppt
Machine vision systems ppt
 
Free space optics (FSO)
Free space optics (FSO)Free space optics (FSO)
Free space optics (FSO)
 
Artificial Passenger
Artificial PassengerArtificial Passenger
Artificial Passenger
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Seahenge
SeahengeSeahenge
Seahenge
 
Black Church Blues Excerpts
Black Church Blues ExcerptsBlack Church Blues Excerpts
Black Church Blues Excerpts
 
Star Carr and the Mesolithic
Star Carr and the MesolithicStar Carr and the Mesolithic
Star Carr and the Mesolithic
 
Introduction: some key thinkers in 20th Anthropology
Introduction: some key thinkers in 20th AnthropologyIntroduction: some key thinkers in 20th Anthropology
Introduction: some key thinkers in 20th Anthropology
 
Maes Howe
Maes HoweMaes Howe
Maes Howe
 
Mala dfr.mak
Mala dfr.makMala dfr.mak
Mala dfr.mak
 
1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy
1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy
1700 1730 sap ortamlarinizi yeniden tanimlayin-cenk_ersoy
 
Ddwp minutes 16 10-2014
Ddwp minutes 16 10-2014Ddwp minutes 16 10-2014
Ddwp minutes 16 10-2014
 
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
Thủ dâm ảnh hưởng đến sinh sản không - Tổng đài tư vấn tâm lý, sức khỏe 1900 ...
 
Proforma monitoring p&d 25 2-2015
Proforma monitoring p&d 25 2-2015Proforma monitoring p&d 25 2-2015
Proforma monitoring p&d 25 2-2015
 

Similaire à Heartfailurealertsystem

My best effort
My best effortMy best effort
My best effortsujataray
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Ghouse Modin Mamdapur
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
Microcontroller Based Intelligent Blood Collecting System
Microcontroller Based Intelligent Blood Collecting SystemMicrocontroller Based Intelligent Blood Collecting System
Microcontroller Based Intelligent Blood Collecting Systemijsrd.com
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfSudipto Krishna Dutta
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 

Similaire à Heartfailurealertsystem (20)

Co4301524529
Co4301524529Co4301524529
Co4301524529
 
My best effort
My best effortMy best effort
My best effort
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...
 
Rfid
RfidRfid
Rfid
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Microcontroller Based Intelligent Blood Collecting System
Microcontroller Based Intelligent Blood Collecting SystemMicrocontroller Based Intelligent Blood Collecting System
Microcontroller Based Intelligent Blood Collecting System
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Page 1 54
Page 1 54Page 1 54
Page 1 54
 
RFID
RFIDRFID
RFID
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdf
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 

Dernier

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdfPaige Cruz
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"DianaGray10
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementNuwan Dias
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimizationarrow10202532yuvraj
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Dernier (20)

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API Management
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

Heartfailurealertsystem

  • 1. Heart Failure Alert System using Rfid Technology Heart Failure Alert System using Rfid Technology C.Sri Aditya K.S.Praneeth B.V.S.Sripathi EEE Department CSE Department ECE Department (3rd year, 1st sem) (3rd year, 1st sem) (3rd year, 1st sem) Guru Nanak Engg. College Guru Nanak Engg. College Guru Nanak Engg. College Abstract Now-a-days the deaths caused due to the heart This paper gives a predicted general model for Heart Failure failure have been of major concern .The majority of the deaths Alert System. It also discusses the Algorithm for converting caused by heart failures are due to the lack of medical the Analog pulse to Binary data in the tag and the Algorithm assistance in time. This paper gives an insight of a new for Alerting the Location & Tracking Station. It discusses in technology that relates directly to the exploding wireless detail the various stages involved in tracking the exact location marketplace. This technology is a whole new wireless and of the Victim using this technology. RFID (Radio Frequency Identification) enabled frontier in Keywords: which a victim’s actual location is integral for providing RFID, RFID-passive tags, GPS, PAM. valuable medical services. 1. Introduction: The paper will be demonstrating for the first time ever the It is tough to declare convincingly what is the most usage of wireless telecommunications systems and miniature important organ of our body.Infact every organ has its own sensor devices like RFID passive Tags , that are smaller than a importance contributing and coordinating superbly to keep the grain of rice and equipped with a tiny antenna which will wonderful machine the human body functioning smoothly. capture and wirelessly transmit a person's vital body-function And one of the primary organs which the body cannot do data, such as pulse or body temperature , to an integrated without is the heart, 72 beats a minute or over a trillion in a ground station. In addition, the antenna will also receive lifetime. The pump house of our body pumping the blood to information regarding the location of the individual from the every corner of our body every moment, thus sending oxygen GPS (Global Positioning Satellite) System. Both sets of data and nutrients to each and every cell. Over a period of time, the medical information and location will then be wirelessly heart muscles go weak, the arteries get blocked and sometimes transmitted to the ground station and made available to save because of a shock a part of the heart stops functioning lives by remotely monitoring the medical conditions of at-risk resulting in what is called a HEART ATTACK. Heart attack is patients and providing emergency rescue units with the a major cause of death and in today’s tension full world it has person's exact location. become very common. Presently there is no mechanism by which a device monitors a person’s heart 24 hours a day, 7 days a week and gives him instant protection in case of problem. Our primary focus is on people with a history of heart problem as they are more prone to death due to heart Copyright © 2007 Paper Identification Number: SC-5.4 failure. In the 1970s, a group of scientists at the Lawrence This peer-reviewed paper has been published by the Pentagram Research Centre (P) Limited. Responsibility of contents of this Livermore Laboratory (LLL) realized that a handheld receiver paper rests upon the authors and not upon Pentagram Research stimulated by RF power could send back a coded radio signal. Centre (P) Limited. Copies can be obtained from the company for a cost Such a system could be connected to a simple computer and used to control access to a secure facility. 292
  • 2. International Conference on Systemics, Cybernetics and Informatics This system ultimately became one of the first building entry The RF tags could be divided in two major groups: systems based on the first commercial use of RFID. Passive, where the power to energize the tag’s circuitry is RFID or Radio Frequency identification is a technology that draw from the reader generated field. enables the tracking or identification of objects using IC based Active, in this case the tag has an internal power source, in tags with an RF circuit and antenna, and RF readers that general a battery that could be replaceable or not, in some case "read" and in some case modify the information stored in the this feature limited the tag lifetime, but for some applications IC memory. RFID is an automated data-capture technology this is not important, or the tag is designed to live more than that can be used to electronically identify, track, and store the typical time needed. information about groups of products, individual items, or Rfid readers: product components. The technology consists of three key RFID readers are querying systems that interrogate pieces: or send signals to the tags and receive the responses. These • RFID tags; responses can be stored within the reader for later transfer to a • RFID readers; data collection system or instantaneously transferred to the • A data collection and management data collection system. Like the tags themselves, RFID readers system. come in many sizes. RFID readers are usually on, continually Rfid tags: transmitting radio energy and awaiting any tags that enter their RFID tags are small or miniaturized computer chips field of operation. However, for some applications, this is programmed with information about a product or with a unnecessary and could be undesirable in battery-powered number that corresponds to information that is stored in a devices that need to conserve energy. Thus, it is possible to database. The tags can be located inside or on the surface of configure an RFID reader so that it sends the radio pulse only the product, item, or packing material. in response to an external event. For example, most electronic toll collection systems have the reader constantly powered upon that every passing car will be recorded. On the other hand, RFID scanners used in veterinarian’s offices are frequently equipped with triggers and power up the only when the trigger is pulled. The largest readers might consist of a desktop personal computer with a special card and multiple antennas connected to the card through shielded cable. Such a reader would typically have a network connection as well so that it could report tags that it reads to other computers. The smallest readers are the size of a postage stamp and are designed to be embedded in mobile telephones. 2. General Model for Heart Failure Alert System: 293
  • 3. Heart Failure Alert System using Rfid Technology The Heart Failure Alert System consists of: • RFID Tag (Implanted into Human body). • RFID Reader (Placed in a Cellular Phone). • Global Positioning Satellite System. • Locating & Tracking Station. • Mobile Rescue Units. The grain-sized RFID Tag is implanted into the human body, Fig: Grain sized RFID Tag which keeps track of the heart pulse in the form of Voltage RFID Tags are smaller than a grain of rice and equipped with levels. A RFID Reader is placed into the Cellular Phone. The a tiny antenna will capture and wirelessly transmit a person's RFID Reader sends a Command to the RFID Tag which in vital body-function data, such as pulse and do not require line turn sends these Voltage pulses in the form of bits using the of sight. These tags are capable of identifying the Heart pulses Embedded Software in the Tag as Response which is a in the form of Voltage levels and converts into a bit sequence. continuous process. These bit sequence is then sent to The first step in A-D Conversion is Pulse Amplitude Software Program in the Cellular Phone as input and checks Modulation(PAM).This takes an Analog signal, samples it and for the Condition of Heart Failure. If any sign of Failure is generates a sequence of pulses based on the results of the sensed then immediately an ALERT Signal will be generated Sampling(measuring the Amplitude at equal and in turn results in the AUTODIALING to the Locating & intervals)PCM(Pulse Code Modulation)quantizes PAM Tracking Station. This station with the use of GPS System Pulses.ie the method of assigning integral values in a specific comes to know the Whereabouts of the Victim. The Locating range to sampled instances. The binary encoding of these & Tracking Station also simultaneously alerts the Rescue integral values is done based on the Algorithm BIN_ENC Units. depending on the Average Heart pulse voltage of the Victim 3. Working of implanted rfid tags: (Avg_pulse). Passive RFID systems typically couple the transmitter Alg BIN_ENC: to the receiver with either load modulation or backscatter, Step1: Read the Analog Signals from the Heart. depending on whether the tags are operating in the near or far Step2: Sample the Analog Signal and generate series of field of the reader, respectively. In the near field, a tag couples pulses based on the with a reader via electromagnetic inductance. The antennas of Results of Sampling based on the Tag Frequency. both the reader and the tag are formed as coils, using many Step3: Assign Integral Values to each Sampled Instances turns of small gauge wire. The reader communicates with the generated. tag by modulating a carrier wave, which it does by varying the Step4: Consider every Individual Sampled Unit and amplitude, phase, or frequency of the carrier, depending on the Compare with the Average design of the RFID system in question. The tag communicates with the reader by varying how much it loads its antenna. This Voltage Level of the Heart. in turn affects the voltage across the reader’s antenna. By Step5: If the Sampled Instance Value is in between the switching the load on and off rapidly, the tag can establish its avg_pulse Values own carrier frequency (really a sub carrier) that the tag can in Then Assign BIT=0 turn modulate to communicate its reply. Otherwise Assign BIT=1 Step6: Generate the bit sequence by considering all the generated Individual Sample Instances. 294
  • 4. International Conference on Systemics, Cybernetics and Informatics Algorithm ALERT. Alg ALERT: Step 1: Read the bit sequence from the Reader. Step 2: Count for the no of bit zeros in the data using a counter. Step 3: If you encounter a bit one, then set counter to zero. Step 4: If the counter is equal to five then go to Step 5 else go to Step 1. Step 5: Send alert to the nearest Locating & Tracking Station. Fig: Analog-Binary Digits Conversion in Tags 4. Stages In Heart Failure Alert System: Stage 1: Working of rfid reader inside cellular phone: The RFID reader sends a pulse of radio energy to the tag and listens for the Tag’s response. The tag detects this energy and sends back a response that contains the tag’s serial number and possibly other information as well. In simple RFID systems, the reader’s pulse of energy functioned as an on-off The Tag continuously senses the Heart Pulses, when the switch; in more sophisticated systems, the reader’s RF signal Reader sends a Command it sends the output of the can contain commands to the tag, instructions to read or write BIN_ENC() as the Response to the Reader. memory that the tag contains. Historically, RFID readers were /*Module for the Conversion of Analog Signals to Binary designed to read only a particular kind of tag, RFID readers digits*/ are usually on, continually transmitting radio energy and BIN_ENC() awaiting any tags that enter their field of operation. { Scanf (“The Value of the generated Sample %f”, Value); If (+Avg_pulse<Value<-Ang_pulse) {Bit=0 ;} else if (Value>+Avg_pulse || Value<-Avg_pulse) {Bit=1 ;} } Fig: RFID Reader in cellular phone. The Reader continuously sends the Command to the tags and Stage 2: in turn receives the Voltage levels in the form of bit sequence as Response from the tags with the help of the BIN_ENC algorithm. The reader sends the received Bit Sequence to a software embedded in the cellular phone , In case of detection of a weak heart pulse this software automatically alerts the Tracking & Location station . The software uses the 295
  • 5. Heart Failure Alert System using Rfid Technology simultaneous ALERT to both the GPS System & Mobile The bits obtained are sent to the ALERT() program to check Rescue Unit in order to alert the Rescue team in the Mobile whether the bit is ’BIT 0’ or ’BIT 1’.If a ‘BIT 0’ is Rescue Unit to indicate a possible Heart Failure within the encountered, the counter is incremented and again it checks radius of the Unit. The GPS System mean-while tracks the for the next bit. If a ‘BIT 1’is encountered then counter is set exact location of the Victim and it guides the Mobile Rescue to zero and it again checks for the next bit. If counter=5 then it Unit to the destination in time and provides immediate alerts the Locating & Tracking Station. medical assistance to the Victim. /*Module for checking the Weak Pulse */ 5. Conclusion: ALERT () This new technology will open up a new era in the { field of Biomedical Engineering .The only drawback of this if (bit==0) technology is that, It doesn’t give the promise of saving every { counter++; } person who is implanted with the tag and using this else technology. In the near future; we would like to extend the {counter=0 ;} technology so that every customer who is implanted with the if(counter==5) tags and those who have been using the technology will be { saved. The Worlds first GSM phone (NOKIA 5140)offering printf(“ Report ‘Weak Pulse Detected’ to Locating & with RFID reading capability has already come into the Tracking System”); market, In the near future the rfid readers would come into the counter=0; wrist watches, which would be handy than the cellular phones. } This new technology would probably become cheaper in the } future. In the near future we hope this new technology would Stage 3: probably reduce the deaths due to heart failures. Fig: Nokia 5140 Handset offering RIFD Reader A Special ALERT message is sent to the Locating & Tracking 6. a. Web References: System through the Cellular Phone by making use of features 1.”Identity chip planted under the skin approved for use in like AutoMessaging, Autodialling which will be provided by Health care”. the Cellular Network Service Provider. Then the Locating & URL: http://www.spychips.com Tracking Station simultaneously sends an ALERT to the 2.”RFID Tags and RFID Chips” Mobile Rescue Unit and sends a request to GPS System for URL: http://www.rfidjournal.com the proper location of the RFID Reader (or the Cellular 3.”Latest Updates on RFID” Phone).The Locating & Tracking Station sends an 296
  • 6. International Conference on Systemics, Cybernetics and Informatics URL: http://www.rfidnews.com EMAIL:-karanatipraneeth@yahoo.com, 4. "Fundamentals and Applications in Contact less Smart ph-no:040-27000965,9441885112 Cards and Identification" 3. B.V.S.Sripathi: : Currently pursuing his B.Tech in URL:http://www.rfid-handbook.de/index.html 3rd year, Electronics and communications 5.”Annual review of Bio-medical Engineering:” Engineering in Guru Nanak Engineering College, URL: http://www.ide.com Ibrahimpatnam. His areas of inetersts are radio wave 6.”Injectable Electronic Identification, Monitoring and propagation, Digital communications, Signals and Simulating Systems” systems and digital electronics URL: http://www.in-stat.com EMAIL:-santhosh_gnec@yahoo.co.in, 7.”Changing the world for less than the price of a cup of a Ph-no: 040-27115512 coffee” URL: http://www.line56.com 8. www.siliconchip.com.au 9. www.wdrg.com/news/currentPR/rfid.html 10. www.digitalangel.net 6. b. Other References: 1. RFID SECURITY – by Pete Lindstorm 2. RFID ESSENTIALS – by Bill Glover, Himanshu Bhatt 3. RFID Case Studies - by Dr. Peter Harrop 4. RFID - George P. Lister 7. Authors: 1. C.Sri Aditya: Currently pursuing his B.Tech in 3rd year, Electrical and electronics Engineering in Guru Nanak Engineering College, Ibrahimpatnam.. He has presented a paper based on ‘Fuel Cells’ along with other classmates at Guru Nanak Dev Engineering college, Bidar. And also secured the third place at the techno-quiz held at the same college. His area of interests are Power electronics, Power systems, Nano generators, radio wave propagation EMAIL:aditya.moorthi@gmail.com Ph.No : 040-40158638, 040-27135238 2. K.S.Praneeth: Currently pursuing his B.Tech 3rd year in Computer science and engineering at Guru Nanak Engineering College, Ibrahimpatnam. His area of interests is computer programming, artificial intelligence, data communications, and radio wave propagation. 297