WIRELESS HEALTHCARE APPLICATION DEVELOPM ENT FOR SITTING POSTURE MONITORING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 5
Abstract
In the development of wireless healthcare application , a newly posture monitoring system is proposed in this paper. It involves analysis and simulation study of pressure sensor & LAN communication with brief literature review. The analysis of proposed system is done with the h elp of kill simulation. Lastly, it concludes that the proposed systems is efficient and highly implemented and have great future scope.
Authors and Affiliations
Paymal Sneha B
LEARNING DIFFICULTIES IN MATHEMATICS OF THE SENIOR STUDENTS OF CATHEDRAL SCHOOL OF LA NAVAL
The study was conducted to determine the learning difficulties in Mathematics of the senior students of Cathedral School of La Naval, Naval, Biliran. This utilized a descriptive method of research. Different s...
A STUDY OF ACCELERATED LIFE TESTING DESIGN USING GEOMETRIC PROCESS FOR GENERALIZED EXPONENTIAL DISTRIBUTION USING TIME CONSTRAINT
This study deals with the utilization of Generalized Exponential geometric process model for the analysis of accelerated life testing under constant stress using type-I censored data. Assuming that the lifetimes o...
PERFORMANCE ANALYSIS OF OZONE LAYER FRIEN DLY REFRIGERENT AS A POSSIBLE REPLACEMENT OF R - 22 IN VAPOUR COMPRES SION REFRIGERATION SYSTEM
The Montreal protocol set out mandatory time table to phase out R - 22 by 2016. This paper hence discusses the alternative of R - 22 in vapor compression refrigeration system. R - 22 is replaced by a mixture of r...
Variation of Strength of OPC-Rice Husk Ash Cement Composites with WaterCement Ratio
This work investigated the variation of strength of OPC-RHA cement composites with water-cement ratio. 180 concrete cubes of 150mm x 150mm x 150mmwere produced with OPC and RHA using a constant mix ratio of 1:2:4...
QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major p...