Mobile Phone Embedded With Medical and Security Applications
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: This paper introduces MOBILE PHONE EMBEDDED WITH ANDROID BASED EMERGENCY ALERT BUTTON AND MEDICAL TOOLS - a mobile phone can serve us with various functions of security applications and medical tools. This serves us with facilities of (1)ANDROID BASED EMERGENCY ALERT BUTTON, (2)ACCU-CHEK GLUCOMETER, (3)BODY MASS INDEX CALCULATOR, (4)BASAL METABOLIC RATE CALCULATOR, (5)BODY FAT CALCULATOR, (6)ACTIVITY CALCULATOR, (7)ANDROID BASED HOME SECURITY SYSTEM. Thus this embedded system will act like a self-doctor which can help us as medical equipment. Collectively the mobile phone can be used as a modern medical toolbox having all the facilities we can inherit and also it can use as for managing or analysing the daily common diseases. The application like home security system discussed here can be incorporated with mobile phones is sure to benefit every people who always have a doubt of their belongings being secure in the house in their absence. Most of the mobile devices that are manufactured nowadays in the market are ANDROID OS based. Taking this into interest the application can be developed in ANDROID and made user friendly, thereby making the applications highly robust across different mobile devices and variety of users.
Authors and Affiliations
Bhaskar Kamal Baishya
Ranking optimization approach enhancement of line-up algorithm
Abstract: Ranking is a technique to categorize & finding the best option in the market. When number of best option is available in the market so its difficult to getting the best option is always a problem. In this p...
Unique Identity / Unique Human Identity / Unique WorldIdentity / Unique Citizen Identity / Human Identity / CitizenIdentity – Number
Abstract: Unique Identity for every human and non-human entity on the earth is the crucial issue for the timebeing. Unique Identity means assigning numeric identity number to every human aged greater or equal to 0...
Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks
Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are...
A Trinity Construction for Web Extraction Using EfficientAlgorithm
Abstract: Trinity – An unconventional structure for automatically catch or extract the content from the websiteor the webpages by the source of internet. The basic applications are done by the trinity characteristi...
Data storage security in Cloud
Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale ind...