Implementation of Health Care Monitoring System using low power MCU’s and ARM CORTEX A8
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
The present common goal in the medical information technology is the design and implementation of telemedicine solutions, which provides a reliable and quality of services to patients. With the advent of recent development in sensors, low-power integrated circuits (IC’s), and wireless communications have brought the design of miniature, low-cost, and intelligent body sensor modules. These modules are capable of measuring, processing, communicating one or more physiological parameters, and can be integrated into a wireless personal area network. In this paper, we proposed a wireless body sensor module, based on low power microcontrollers and RF devices that perform the measurements and transmit the different bio sensors data to a Local Sensor Network server. Local Sensor Network (LSN) server will run a signal monitor application which receives the information from wireless sensor module and draw the signal graph on the display according to received data and further updated to central health care surveillance centre. The LSN server should be able to connect all the nearby sensor modules through wireless media and update its data periodically. Any sudden urge found in the signal will alarm the corresponding doctor. In order to handle such more number of sensor module connections, the Local sensor network server should be implemented with high performance processor. In this paper, the ARM Cortex A8 processor is one of the best choices to meet all the requirements of the LSN server.
Authors and Affiliations
R. V. V. Krishna| Associate Professor, P.G Student Department of Electronics and Communication Engineering Sri Sai Aditya Institute of Science and Technology, R. Gnana Vargin| Associate Professor, P.G Student Department of Electronics and Communication Engineering Sri Sai Aditya Institute of Science and Technology
A Novel Approach To Recognize Malicious Application In Face Book- FRAppE
Our key commitment is in creating FRAppEseemingly the main apparatus concentrated on recognizing malicious applications on Facebook. To create FRAppE, we utilize data gathered by watching the posting conduct of 111K...
Enhancing Performance of Data Access by using Cooperative Caching in Disruption Tolerant Networks
An interruption tolerant system (DTN) is a system outlined so that transitory or irregular correspondences issues, restrictions and peculiarities have the slightest conceivable antagonistic effect Disruption tolerant...
Tweet Mining from General Elections of a Country
In previous election of a country for its democratic elections in which social media was targeted as a way to convince the social media users to attract their votes, an analysis of BigData on these elections tweets is...
A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate
Of late, rapid growth observed in the cloud technology. Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud sto...
We show another fine-grained two-factor Authentication (2FA) get the opportunity to control system for electronic conveyed processing organizations. Specifically, in our proposed 2FA access control structure, a quali...