SlideShare une entreprise Scribd logo
1  sur  17
A PROPOSED RFID WIRELESS BODY
SENSOR MESH NETWORK USING
INTELLIGENT AGENTS AND CLOUD-
BASED ARCHITECTURE
Tyrone Edwards, Tyrone Grandison, Suresh Sankaranarayanan
LACCEI Symposium of Health Informatics in Latin America and the Caribbean 2013
Outline
 Motivation
 The Proposal
 Foundational Technologies (FT)
 The System
 Conclusion
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
2
Motivation
 Information Technology holds promise for Healthcare
 Improve efficiency.
 Reduce error.
 In Jamaica:
 Healthcare is mostly paper-based
 Increased desire for Healthcare to be computer-based
 Most immediate impact potential in patient monitoring
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
3
The Proposal
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
4
 GOAL:
 Create infrastructure that merges wireless, RFID & cloud technology to
enable efficient, adaptive and cost-effective patient monitoring in Jamaica
 HOW:
 Integrate RFID Wireless Body Sensor Integrated Mesh Network
technology with Cloud-based intelligent agents.
 Use policy-driven agents.
 policies define the agent’s operational parameters.
 Policies created by the patient's assigned doctor and propagated through the
system.
 Extend system to support patient monitoring models defined using
Bayesian classifiers.
 Bayesian classifiers will allow for the training of agents to make decisions by
reasoning over the variations in expected readings of monitored parameters, and
the actual readings.
FT: Wireless Technologies
 Wireless Sensor Network
 Used in a wide range of fields for monitoring objects of interest.
 Can be setup in a number of configurations easily.
 When configured for ad-hoc environments are susceptible to frequent network
failures and are also unreliable.
 Failures are not acceptable in a healthcare setting, where critical information
about the patient is being transmitted.
 Wireless Mesh Networks (WMN)
 an extension of Local Area Networks (LANs).
 far better range and also use a limited amount of cabling.
 Wireless Sensor Mesh Network (WSMN)
 an integration of wireless sensors and mesh networks.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
5
FT: Radio Frequency Identification
 Radio Frequency Identification is used to:
 manage medical equipment
 dangerous medical substances and drugs
 inventory control
 identify and locate patients
 monitor patients’ physiological parameters
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
6
FT: Intelligent Agents
 Intelligent Agent Technology (IAT) was born from the field of
Artificial Intelligence.
 An agent is defined as “anything that can be viewed as
perceiving its environment through sensors and acting upon
that environment through effectors”.
 IAT as been used for searching and making appointments at
various healthcare facilities based on the patients current
health condition.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
7
FT: Cloud Computing
 Cloud computing presents Information Technology (IT) resources to
users as “Pay-Per-Use” services.
 Currently, there are three (3) primary services available via the
Cloud, namely:
 Infrastructure as a Service (IaaS)
 Platform as a Service (PaaS)
 Software as a Service (SaaS)
 ICT Healthcare service are good candidates to leverage Cloud
technology.
 Cloud–based Healthcare services can be accessed by small clinics
to multi-specialty hospital on a pay per use service.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
8
Proposed System: Architecture
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
9
Proposed System: Intelligent Agents
 Patient Agent (PA)
 Is located at the cluster head of the RFID-WBSMN of the patient
 Queries the sensors for data
 Transmits sensor data to the Aggregator Agent (AA).
 Aggregator Agent (AA)
 Is located at the Base Station
 Checks for indications of anomalous readings sent by the PA
 Initiates alerts to the Nurse and Doctor Agents of the on- duty medical staff
and also the patient’s assigned doctor.
 Transmits the patient’s data to the Cloud-based application server for final
processing and storage in the database server.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
10
Proposed System: Intelligent Agents
 Nurse Agent (NA)
 Is located on the smart handheld device for the on-duty nurse.
 Provide alerts to the on-duty Nurse
 Allows querying of patient’s status
 which includes current and past sensor readings.
 Doctor Agent (DA)
 Is located on the smart handheld device for the:
 on-duty doctor
 patient’s assigned doctor
 Provides alerts to the doctor
 Allows querying of patient’s status
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
11
Conclusion
 We propose a way to improve outcomes in Jamaica.
 We appreciate that there outstanding issues
 Workflow
 Security
 Privacy
 Engagement
 We hope that the leveraging of RFID, Wireless and Cloud
enables the speedy adoption and shortest time to impact.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
12
THANK YOU
August 14th, 2013
13
LACCEI Symposium of Health Informatics in Latin America and the Caribbean
BACKUP
August 14th, 2013
14
LACCEI Symposium of Health Informatics in Latin America and the Caribbean
Proposed System: Architecture
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
15
References
Ahsan, K., Shah, H., and Kingston, P. (2010, January). “RFID Applications: An Introductory and Exploratory Study”. International Journal
of Computer Science Issues (IJCSI), Vol. 7, No. 1, pp 1-7.
Akyildiz, I. F., Wang, X., and Wang, W. (2005). “Wireless mesh networks: a survey”. Computer Networks, Vol. 47, pp 445-487.
Benjamin, N. A., & Sankaranarayanan, S. (2009). “Performance of Wireless Body Sensor based Mesh Network for Health Application”.
International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), pp 21-28.
Castellani, A. P., Bui, N., Casari, P., Rossi, M., Shelby, Z., & Zorzi, M. (2010). “Architecture and protocols for the internet of things: A
case study”. Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops
(PERCOM Workshops), IEEE, pp. 678-683.
Edwards, T., & Sankaranarayanan, S. (2011). “Applications of Intelligent Agents in Hospital Search and Appointment System”.
International Journal of E-Services and Mobile Applications (IJESMA), Vol. 3, No. 4, pp 57-81.
Fifah, B S.(2013) “NFC Enabled Patient appointment System”, Bachelor of Internet Computing (Hons) Project, Department of
Computing and Information Systems, Institut Teknologi Brunei, Brunei.
Horowitz, B T.(2012). Hospital Cloud Platform Sends Patient Data From Emergency Vehicles to ERs, http://www.eweek.com/c/a/Health-
Care-IT/Hospital-Cloud-Platform-Sends-Patient-Data-From-Emergency-Vehicles-to-ERs-561382/, 04/11/13.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
16
References
Korkmaz, I., Atay, C., and Kyparisis, G. (2010). “A Mobile Patient Monitoring System Using RFID”. Latest Trends on Computers, Vol. 2, pp 726-732.
Lefebvre, E., Castro, L., and Lefebvre, L. A. (2011). “Assessing the prevailing implementation issues of RFID in healthcare: A five-phase implementation
model”. International Journal of Computers and Communications, Vol. 5, No. 2, pp 101-117.
Mitrokotsa, A., and Douligeris, C. (2009). “Integrate RFID and Sensor Networks: Architectures and Applications”. RFID and Sensor Networks, pp 511-536.
Morak, J., Schreier, G. (2012). “MHealth based on NFC Technology-Preliminary results from Medium Scale Proof of Concept Projects”, Proceedings of
Ehealth 2012, Vienna, Austria.
Rantzau, R. Kailing, K. Beier, S. Grandison, T. (2006). "Discovery Services Enabling RFID Traceability in EPCglobal Networks". Proceedings of the 13th
International Conference on Management of Data (COMAD) 2006, Delhi, India. December 2006.
Sankaranarayanan, S. (2008). “Policy based Agent Architecture for Sensor based Mesh Networks-Health Care Monitoring”. Proceedings of the International
Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-08), Florida, USA: Curran Associates, Inc., pp. 75-81.
Sankaranarayanan, S., and Ganesan, S. (2009). “A layered architecture for agent based wireless sensor mesh networks- applications in healthcare”.
International Journal of Embedded System and Computer Engineering, Vol. 1, No. 1, pp 51-61.
Singh, S. K., Singh, M. P., and Singh, D. K. (2010). “Routing Protocols in Wireless Sensor Networks – A Survey”. International Journal of Computer Science &
Engineering Survey (IJCSES), Vol. 1, No. 2, pp 63-83.
August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean
17

Contenu connexe

En vedette

Course 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateCourse 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateImad Daou
 
Eje cafetero
Eje cafeteroEje cafetero
Eje cafeteroeduardo
 
Jw day 10 (unit 3)
Jw day 10 (unit 3)Jw day 10 (unit 3)
Jw day 10 (unit 3)Angala Maria
 
Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)Julie Anne Kent
 
Blogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective LearningBlogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective Learningvogmae
 
Versaille (1)
Versaille (1)Versaille (1)
Versaille (1)pesak
 
Just Words day 6 (unit 2)
Just Words day 6 (unit 2)Just Words day 6 (unit 2)
Just Words day 6 (unit 2)Angala Maria
 
CentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network ToolCentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network ToolImad Daou
 
Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011Fredrik Karlsson
 
Children’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent ForsethChildren’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent ForsethChildren's Hospital and Health System
 
Московский workshop ЕАСD
Московский workshop ЕАСDМосковский workshop ЕАСD
Московский workshop ЕАСDElena Sosnovtseva
 
Presentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility frameworkPresentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility frameworkGrial - University of Salamanca
 

En vedette (18)

Course 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateCourse 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM Template
 
Eje cafetero
Eje cafeteroEje cafetero
Eje cafetero
 
Paulitaaa
PaulitaaaPaulitaaa
Paulitaaa
 
Jw day 10 (unit 3)
Jw day 10 (unit 3)Jw day 10 (unit 3)
Jw day 10 (unit 3)
 
Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)Library Instruction: PowerPoint (Turning Point Technologies)
Library Instruction: PowerPoint (Turning Point Technologies)
 
Blogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective LearningBlogs, Disruption and Reflective Learning
Blogs, Disruption and Reflective Learning
 
Versaille (1)
Versaille (1)Versaille (1)
Versaille (1)
 
Just Words day 8
Just Words day 8Just Words day 8
Just Words day 8
 
CLIL training Spain
CLIL training SpainCLIL training Spain
CLIL training Spain
 
Just Words day 6 (unit 2)
Just Words day 6 (unit 2)Just Words day 6 (unit 2)
Just Words day 6 (unit 2)
 
CentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network ToolCentOS 6.7 System Config Network Tool
CentOS 6.7 System Config Network Tool
 
Double entry
Double entryDouble entry
Double entry
 
Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011Vad är JQuery Mobile - Blixttal Mallis 2011
Vad är JQuery Mobile - Blixttal Mallis 2011
 
3 a ukraine
3 a ukraine3 a ukraine
3 a ukraine
 
Children’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent ForsethChildren’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
Children’s Miracle Network Hospitals Wisconsin Champion Vincent Forseth
 
Московский workshop ЕАСD
Московский workshop ЕАСDМосковский workshop ЕАСD
Московский workshop ЕАСD
 
Iværksætterkursus trin 2
Iværksætterkursus trin 2Iværksætterkursus trin 2
Iværksætterkursus trin 2
 
Presentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility frameworkPresentation of VALS project within an Erasmus+ mobility framework
Presentation of VALS project within an Erasmus+ mobility framework
 

Plus de Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Tyrone Grandison
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessTyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodTyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab LaunchTyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanTyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusTyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of InnovationTyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMETyrone Grandison
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceTyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social GoodTyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationTyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of AmericaTyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsTyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeTyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in HealthcareTyrone Grandison
 

Plus de Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 

Dernier

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

A Proposed RFID Wireless Body Sensor Mesh Network using Intelligent Agents and Cloud-based Architecture

  • 1. A PROPOSED RFID WIRELESS BODY SENSOR MESH NETWORK USING INTELLIGENT AGENTS AND CLOUD- BASED ARCHITECTURE Tyrone Edwards, Tyrone Grandison, Suresh Sankaranarayanan LACCEI Symposium of Health Informatics in Latin America and the Caribbean 2013
  • 2. Outline  Motivation  The Proposal  Foundational Technologies (FT)  The System  Conclusion August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 2
  • 3. Motivation  Information Technology holds promise for Healthcare  Improve efficiency.  Reduce error.  In Jamaica:  Healthcare is mostly paper-based  Increased desire for Healthcare to be computer-based  Most immediate impact potential in patient monitoring August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 3
  • 4. The Proposal August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 4  GOAL:  Create infrastructure that merges wireless, RFID & cloud technology to enable efficient, adaptive and cost-effective patient monitoring in Jamaica  HOW:  Integrate RFID Wireless Body Sensor Integrated Mesh Network technology with Cloud-based intelligent agents.  Use policy-driven agents.  policies define the agent’s operational parameters.  Policies created by the patient's assigned doctor and propagated through the system.  Extend system to support patient monitoring models defined using Bayesian classifiers.  Bayesian classifiers will allow for the training of agents to make decisions by reasoning over the variations in expected readings of monitored parameters, and the actual readings.
  • 5. FT: Wireless Technologies  Wireless Sensor Network  Used in a wide range of fields for monitoring objects of interest.  Can be setup in a number of configurations easily.  When configured for ad-hoc environments are susceptible to frequent network failures and are also unreliable.  Failures are not acceptable in a healthcare setting, where critical information about the patient is being transmitted.  Wireless Mesh Networks (WMN)  an extension of Local Area Networks (LANs).  far better range and also use a limited amount of cabling.  Wireless Sensor Mesh Network (WSMN)  an integration of wireless sensors and mesh networks. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 5
  • 6. FT: Radio Frequency Identification  Radio Frequency Identification is used to:  manage medical equipment  dangerous medical substances and drugs  inventory control  identify and locate patients  monitor patients’ physiological parameters August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 6
  • 7. FT: Intelligent Agents  Intelligent Agent Technology (IAT) was born from the field of Artificial Intelligence.  An agent is defined as “anything that can be viewed as perceiving its environment through sensors and acting upon that environment through effectors”.  IAT as been used for searching and making appointments at various healthcare facilities based on the patients current health condition. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 7
  • 8. FT: Cloud Computing  Cloud computing presents Information Technology (IT) resources to users as “Pay-Per-Use” services.  Currently, there are three (3) primary services available via the Cloud, namely:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS)  ICT Healthcare service are good candidates to leverage Cloud technology.  Cloud–based Healthcare services can be accessed by small clinics to multi-specialty hospital on a pay per use service. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 8
  • 9. Proposed System: Architecture August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 9
  • 10. Proposed System: Intelligent Agents  Patient Agent (PA)  Is located at the cluster head of the RFID-WBSMN of the patient  Queries the sensors for data  Transmits sensor data to the Aggregator Agent (AA).  Aggregator Agent (AA)  Is located at the Base Station  Checks for indications of anomalous readings sent by the PA  Initiates alerts to the Nurse and Doctor Agents of the on- duty medical staff and also the patient’s assigned doctor.  Transmits the patient’s data to the Cloud-based application server for final processing and storage in the database server. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 10
  • 11. Proposed System: Intelligent Agents  Nurse Agent (NA)  Is located on the smart handheld device for the on-duty nurse.  Provide alerts to the on-duty Nurse  Allows querying of patient’s status  which includes current and past sensor readings.  Doctor Agent (DA)  Is located on the smart handheld device for the:  on-duty doctor  patient’s assigned doctor  Provides alerts to the doctor  Allows querying of patient’s status August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 11
  • 12. Conclusion  We propose a way to improve outcomes in Jamaica.  We appreciate that there outstanding issues  Workflow  Security  Privacy  Engagement  We hope that the leveraging of RFID, Wireless and Cloud enables the speedy adoption and shortest time to impact. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 12
  • 13. THANK YOU August 14th, 2013 13 LACCEI Symposium of Health Informatics in Latin America and the Caribbean
  • 14. BACKUP August 14th, 2013 14 LACCEI Symposium of Health Informatics in Latin America and the Caribbean
  • 15. Proposed System: Architecture August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 15
  • 16. References Ahsan, K., Shah, H., and Kingston, P. (2010, January). “RFID Applications: An Introductory and Exploratory Study”. International Journal of Computer Science Issues (IJCSI), Vol. 7, No. 1, pp 1-7. Akyildiz, I. F., Wang, X., and Wang, W. (2005). “Wireless mesh networks: a survey”. Computer Networks, Vol. 47, pp 445-487. Benjamin, N. A., & Sankaranarayanan, S. (2009). “Performance of Wireless Body Sensor based Mesh Network for Health Application”. International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), pp 21-28. Castellani, A. P., Bui, N., Casari, P., Rossi, M., Shelby, Z., & Zorzi, M. (2010). “Architecture and protocols for the internet of things: A case study”. Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, pp. 678-683. Edwards, T., & Sankaranarayanan, S. (2011). “Applications of Intelligent Agents in Hospital Search and Appointment System”. International Journal of E-Services and Mobile Applications (IJESMA), Vol. 3, No. 4, pp 57-81. Fifah, B S.(2013) “NFC Enabled Patient appointment System”, Bachelor of Internet Computing (Hons) Project, Department of Computing and Information Systems, Institut Teknologi Brunei, Brunei. Horowitz, B T.(2012). Hospital Cloud Platform Sends Patient Data From Emergency Vehicles to ERs, http://www.eweek.com/c/a/Health- Care-IT/Hospital-Cloud-Platform-Sends-Patient-Data-From-Emergency-Vehicles-to-ERs-561382/, 04/11/13. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 16
  • 17. References Korkmaz, I., Atay, C., and Kyparisis, G. (2010). “A Mobile Patient Monitoring System Using RFID”. Latest Trends on Computers, Vol. 2, pp 726-732. Lefebvre, E., Castro, L., and Lefebvre, L. A. (2011). “Assessing the prevailing implementation issues of RFID in healthcare: A five-phase implementation model”. International Journal of Computers and Communications, Vol. 5, No. 2, pp 101-117. Mitrokotsa, A., and Douligeris, C. (2009). “Integrate RFID and Sensor Networks: Architectures and Applications”. RFID and Sensor Networks, pp 511-536. Morak, J., Schreier, G. (2012). “MHealth based on NFC Technology-Preliminary results from Medium Scale Proof of Concept Projects”, Proceedings of Ehealth 2012, Vienna, Austria. Rantzau, R. Kailing, K. Beier, S. Grandison, T. (2006). "Discovery Services Enabling RFID Traceability in EPCglobal Networks". Proceedings of the 13th International Conference on Management of Data (COMAD) 2006, Delhi, India. December 2006. Sankaranarayanan, S. (2008). “Policy based Agent Architecture for Sensor based Mesh Networks-Health Care Monitoring”. Proceedings of the International Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-08), Florida, USA: Curran Associates, Inc., pp. 75-81. Sankaranarayanan, S., and Ganesan, S. (2009). “A layered architecture for agent based wireless sensor mesh networks- applications in healthcare”. International Journal of Embedded System and Computer Engineering, Vol. 1, No. 1, pp 51-61. Singh, S. K., Singh, M. P., and Singh, D. K. (2010). “Routing Protocols in Wireless Sensor Networks – A Survey”. International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 1, No. 2, pp 63-83. August 14th, 2013LACCEI Symposium of Health Informatics in Latin America and the Caribbean 17