A User-Centric Pervasive Computing Services Model for Medical and Health-care

Author(s):  
Zhenmin Zhu ◽  
Xiaoli Su ◽  
Faqun Jiang ◽  
Jintao Li ◽  
Jian Ye
Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


2011 ◽  
Vol 2 (3) ◽  
pp. 31-47 ◽  
Author(s):  
Martín Serrano ◽  
Ahmed Elmisery ◽  
Mícheál Ó Foghlú ◽  
Willie Donnelly ◽  
Cristiano Storni ◽  
...  

This paper discusses pervasive computing work in the transition from traditional health care programs to personalised health systems (pHealth). A chronological guided transition survey is discussed to highlight trends in medicine describing their most recent developments about health care systems. Future trends in this interdisciplinary techno-medical area are described as research goals. Particularly, research and technological efforts concerning ICT’s and pervasive computing in healthcare and medical applications are presented to identify systems requirements supporting secure and reliable networks and services. The main objectives are to summarise both the pHealth systems requirements providing end-user applications and the necessary pervasive computing support to interconnect device-based health care applications and distributed information data systems in secure and reliable forms, highlighting the role pervasive computing plays in this process. A generic personalised healthcare scheme is introduced to provide guidance in the transition and can be used for multiple medical and health applications. An example is briefly introduced by using the generic scheme proposed.


Author(s):  
Jorge Vallejos ◽  
Elisa Gonzalez Boix ◽  
Engineer Bainomugisha ◽  
Pascal Costanza ◽  
Wolfgang De Meuter ◽  
...  

Author(s):  
Dr. Subarna Shakya

The diverse user demands in the system supported with the internet of things are often managed efficiently, using the computing system that is pervasive. Pervasive computing system in an integration of heterogeneous distributed network and communication technologies and other referred as the ubiquitous computing. All though it handles the user requirement properly. The ingenuousness in the conveyance of the information, in the standard of handling and extending the heterogeneity assistance for the dispersed clients are still under construction in the as it is very challenging in the pervasive computing system. In order to provide proper and a steadfast communication for the users using an IOT based wearable health care device the paper introduces the new dispersed and elastic computing model (DECM). The developed system utilizes the recurrent-learning for the examining the allocation of resources according to the requirements as well as the allotment aspects. Based on the determined requirements of the resources, the pervasive computing system provide services to the user in the end with minimized delay and enhanced rate of communication for the health care wearable devices. The developed system emphasis also on managing the mobility, apart from allocation of resources and distribution for proper data conveyance over the wearable health care device. The working of the laid out system is determined by the experimental analysis. The constancy of the model developed is demonstrated utilizing the metrics such as the failure of request, time of response, managed and backlogged requests, bandwidth as well as storage used. The developed model heightens the number of request managed properly (handled) along with the bandwidth and storage and minimizes the failure in requests, backlogs and the time taken for response.


2018 ◽  
Vol 12 (2) ◽  
pp. 100-114 ◽  
Author(s):  
Marjaana Lahtinen ◽  
Pia Sirola ◽  
Antti Peltokorpi ◽  
Leena Aalto ◽  
Riikka Kyrö ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document