A New Approach Towards IOT by Using Health care-IOT and Food Distribution IOT

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

A New Approach towards IOT by Using Health care-

IOT and Food distribution IOT


Shashi Bhushan Dr. Pramod kumar
CSE Department CSE Department
tyagi_shashi@yahoo.com Tula’s Institute, Dehradun, India
drpramoderp@live.com

Bhimsingh Bohara Vibhor Sharma


CSE Department CSE Department
bj.bohara@gmail.com Tula’s Institute, Dehradun, India
vibhor087@gmail.com

Abstract— Many areas of today’s living standard are covered by


global sensing techniques using wireless sensor network I. INTRODUCTION
approaches. It is the network that consist physical objects Many of the researches which are situated around us, may be
embedded with software, sensors, electronics. It provides on two form. One may be on the network and another may be
connectivity that is used to enable things to exchange data with
in the example of internet of things. To resolve this problem,
the manufacturer and other operator device which is based on
the international global standards. It creates the capability to
approaches using sensing devices and RFID (Radio Frequency
compute, conclude and understand environmental measure, from Identification) can be used in to which systems situated in the
elegant ecologies. We can create IoT by distributing the work of distributed way and information are included in the
devices in the communicating network. Using this approach we environment virtually. Internet of Things is very useful in
can get the way to combine actuators and sensing devices in a storing, processing the huge amount of data in the efficient
smooth way and common operating picture (COP) are developed and reliable way which can be easily interpreted. Virtual
by sharing information over the platforms. In this paper we show infrastructure provided by global computing environment can
the vision, provocation, possible usage scenarios and the steps to be used to mix the devices used for storage, monitoring, and
build the Internet of Things. IP stacks and web servers
analysis and platform visualization for efficient client
technological developments are used for smart every day objects.
This paper describes how IOT can be implemented in the
delivery. Using the concept of centralized cloud computing,
realistic way to invoke the vision. users can access the applications from anywhere at any time
The contents which we can use in IOT can come into picture and end-to-end service for business can be easily enabled. For
from a big area of devices such as heart monitoring implants, connecting the existing networks and distributed computing
biochip transponders, electric clams in coastal water automobiles devices, the network resources of internet of things are used.
with the help of built in sensors among them. If we want to
develop a fully integrated future internet then IOT is steeped out Now a day with the popularity of 4G-LTE and Wi-Fi wireless
by enable and using the technologies which is based on wireless access, here is the invoke for global information and network
such as RFID tokens and attached from nodes of actuator and
communication which is clearly visible.
sensing devices. If we talk about the present scenario then the
present generation of technology of the Internet-of-Things (IoT)
Here are some points which are help us to understand about
offers two applications Distribution of Food hierarchy and the technology, the IoT demands,
Healthcare to involve human health and well-being. These two 1. To understand what is distributed in a situation with
applications show the technologies and architectures of the IoT its users and their mechanism.
and to solve the problems arisen in the wireless sensor network 2. Some architectures related for software and
architectures and the architectures to integrate the system. At the communication network can be used for processing
system level, we have improved integration of distributed devices and passing the contextual information and,
and their technologies; we also have EIS and integration of 3. For independent processing, we have to use some
information in architectures such as prediction of shelf life and
tools of Internet of Things.
real time distribution hierarchy for food distribution IOT and
distribution of health care at home. So by above three basic problems, connectivity of
smart object and context computation can be
acquired.
Keywords— IOT, WSN, IOS, FSC, IHH
Kevin Ashton was searched the internet of things in the
relation of distribution hierarchy management

978-1-5090-3480-2/16/$31.00 ©2016 IEEE


[1] Here we consider that definition of internet of things
covers wide range of varities.
[2] Now as internet of things definition has changed because
of technology evolution. So making of computer sense
information without human intervention are the same this is
the main goal of IOT.
If we study advances in microelectronics, communications and
information technology then The Internet of Things vision is
useful for the predictable future. Embedded communication
and information technology would have the potential to
revolutionize the utility of these objects, for this purpose
Smart” objects play a key role in the Internet of Things vision.
By using sensor, these techniques are able to receive their
context to communicate with each other via internet access in
networking capabilities. If we want to determine state of
network then internet connectivity articles is used by which Fig 1: Communication through Smart Phone
we can get the up to date information on physical objects and 1.2. Trends
can proceed further this process in other application domain. For identification of internet of things as emerging technology
So at negligible cost we can attain the real world object in IT then Hype cycle is used shown in fig [2].
aspects. It would not allow only the level of underlying If we want to represent the emergence, maturity and impact on
process but also important for control management. applications of specific technology then hype cycle is used.
If we use IOT as a for market adoption then it will take 5-10
years. If we talk about different paradigm then popularity will
A. GLOBAL COMPUTING IN THE NEXT DECADE
depend upon time.
With the help of researcher to create a human interface, the We can show the web search popularity, as measured by the
objective of global computing is to embed the technologies Google search trends during the last 10 years for the terms
into the human life. Now a day we are using so much smart Internet of Things, Wireless Sensor Networks and global
phones and other smart devices to make the environment more Computing.
interactive and informative. Mark Weiser, the forefather of After IOT existence search volume is consistently increasing
Ubiquitous Computing (ubicomp), defined a smart with the falling trend for Wireless Sensor Networks. We can
environment [4] as ‘‘the physical world that is connected with also show in fig 3 As per Google’s search forecast this trend is
sensors and displays, and computational element is embedded likely to continue as other enabling technologies converge to
smoothly in lives objects and is connected through a form a genuine Internet of Things.
continuous network’’. We mark the creation of internet to
achieve global computing vision which enables individual
devices to communicate with any other device in the world.

B. DEFINITIONS, TRENDS AND ELEMENTS


1.1. Definitions
Internet of Things can be realized in three paradigms—
internet-oriented (middleware), things oriented (sensors) and
semantic-oriented (knowledge). This description is required
due to the interdisciplinary nature of the subject. If these three
paradigms intersect then IOT is useful in application domain.
The RFID group defines the Internet of Thing as
• The worldwide network of interconnected objects uniquely Fig 2: RFID Communication
addressable based on standard communication protocols.
• To interact and communicate among themselves and with the 1.3. IOT elements
environment by exchanging data and information sensed about
the environment, IOT is used as active, while reacting Requirement of component for IOT from high level
autonomously to the real/physical world events and perspective we present taxonomy.
influencing it by running processes that trigger actions and There are three IOT components which enables seamless
create services with or without direct human intervention. global computing:
(1) Hardware that is made up of sensors and embedded
communication hardware.
(2) Middleware that is on demand storage and computing tools 1.3.3. Addressing schemes
for data analytics. If we need Success of IOT then it is not easy to uniquely
(3) Presentation it is used to understand visualization and identify the things, it is possible to control remote device
interpretation which can be designed for different application. through the internet. If we want to create unique identification
then we can include: Uniqueness, persistence, reliability and
scalability. After unique identification element can be
1.3.1. Radio Frequency Identification (RFID)
uniquely identified and it is used for connection.
To enable design of microchips for wireless data
We use IPV4 that support cohabiting device for identified
communication RFID technology is important in the
sensor nodes geographically but not indivually. IPV6can also
embedded communication paradigm.[4]
alleviate the identification problem. Persistent network
They help in the automatic identification of anything they are
Functioning is another aspect of IOT.TCP/IP is also used for
attached to acting as an electronic barcode. RFID use the
sensing the wireless network in IOT.
power of the reader’s interrogation signal to communicate the
ID to the RFID reader, so we can say that passive RFID tags
1.3.4. Data storage and analytics
are not battery powered. This has been resulted in many
Data storage is important feature for this technology, if data is
applications particularly in retail and supply chain
expired and owed by some then this can be a critical issue
management. Transportation and access control these
.The internet consumes up to 5% of the total energy generated
applications are used.The RFID passive tags are used in many
today and with these types of demands, it is surely given up to
bank cards and road toll tags. Active RFID readers have their
further. IF we want to do smart monitoring and actuation data-
own supply which is used to initiate communication network.
types then data should be stored intelligently.[4] We can
The main application of RFID tags are port containers that is
develop artificial intelligence algorithm which could be
used for monitoring cargo.
centralized or distributed based upon the need .Now for
storing data cloud base systemic used increasingly and it is
1.3.2. Wireless Sensor Networks (WSN)
popular for data storages.
By using technological advances in low power circuits and
wireless communication have been made available efficient
1.3.5. Visualization
and low cost. If we combine all these factors then this improve
Visualization allows the interaction of the user with the
the reliability of sensing network and these networks consist
environment so it is critical for IOT.
of large number of useful sensors and used for enabling the
Now a day many new technologies such as touch screen, smart
communication and processing in a wireless environment. We
tablets and phones have become very intuitive. What we get
can use active RFID because it is same as the lower end WSN
from the IOT revolution is really beneficial for human being,
nodes with limited processing capability and storage. If we
easy to understand visualization has to be created.
want to improve WSN potentential then it should be
Now we are moving from 2D to 3D generation so many of the
substantial and multi disciplinary in nature. Sensor details
information can be provided in meaningful ways for
shared by sensor nodes and it can be sent to a distributed or
consumers. It is useful to convert data into knowledge which
centralized system for analytics. WSN monitoring network
is used for decision making.[14]
include:
1.4. Applications:
(1) WSN hardware—it contains processing units, sensor
For emerging IOT we use several application domains. These
interface, and power supply. They compromise with the
applications can be classified based on the type of network
multiple A/D converters for sensor interface. These modern
such as presentation, scale, complexity, accessibility.
sensor nodes have the capability to communicate with the use
We can divide the application into 4 application domain:
of one frequency band it makes so versatile sensor network.
1) Home Based application
(2) WSN communication stack— WE can develop the nodes
2) Enterprises based application
in ad-hoc manner for more application. It is typical to design
3) Application that use utilities
appropriate topology, routing and Mac Layer for the Deployed
4) Mobile based application
network. Nodes that are used in WSN network can
We can see in FIG 1 which represents personal and home
communicate themselves to transmit data in a single or multi-
IOT at the scale of home networks
hop to a base station. Nodes that is drop out for lifetime are
We want to scale IOT then utility IOT is used .Mobile
frequent in nature.
IOT is used to check the scale of a network in
(3) WSN Middleware— It is a Mechanism to combine Cyber
environment.
infrastructure with a service oriented architecture and sensor
network to access a heterogeneous resources in an
1.4.1. Personal and home:
independent network.[15]
Global computing is used in health care so IOT gives a perfect
(4) Secure Data aggregation— it is required to ensure data is
platform to realize this vision.IOT is used as back end to
relevant that is collected from sensors and can be used for
upload data on servers.
lifetime.
Now day’s smart phones are used for communication along manner which is beneficial for user and user can trust the IOT
with several interfaces such as blue tooth and other devices field.
that measures various parameters. So there are many There are so many challenges that is used in the IOT frame
applications that measure this parameter for apple IOS, work
windows phone OS. For home based application if we want to a) Privacy
control home equipment such as A.C, Refrigerators, Washing b) Participatory sensing
machine then it will provide better home and energy c) Data analytics
management. d) GIS based Visualization
e) Cloud computing
1.4.2. Enterprise Apart from this WSN also includes open challenges such as
Enterprises based application is used in work environment for a) Energy
IOT. Owners can only use this collective information and the b) Efficiency
data may be released selectively. c) Security protocols
To keep track of the number of occupants and manage the d) Quality of services
utilities in a building block then environmental monitoring is
the main application. If we use sensors for this application WE can show open Challenges road map.
then it is the most important part for factory setup and it
provides security and climate control. We can replace these 1.6. Energy efficient sensing
applications by a wireless to make changes whenever it is Energy efficient sensing is used to complete demand of
required. IF IOT subnet is used for factory maintenance then it multiple sensing nodalities. It is used to implement on various
is useful.[14] types of nodalities issues such as
1) Network traffic
1.4.3. Utilities: 2) Data storage
In this application domain information from the network is 3) Energy utilization
used for service optimization. it is not used for consumer It encompasses fixed and mobile sensing infrastructure. It also
consumption. Information is used by utility companies for provides random and continuous sampling.
resource management to optimize cost. To provide utility
techniques we can use smart grid and smart metering that is 1.7. Secure reprogrammable networks and privacy
implemented around the world. Automatic behavior of If networks are deployed at a large scale then security is a
network is apart of the utility. It is also used to inform the major concern. Because if we do not provide proper security
analytics of agriculture in decision making. then system can be attacked by many ways such as disabling
the network availability, insert erroneous data into network
and any one can access the personal information. If security is
1.4.4 Mobile: not provided then there are three physical components that are
Due to the nature of data sharing smart transportation and vulnerable to such attacks such as RFID, WSN and Cloud.
smart logistics are used in a separate way, for this backbone
implementation is required. For mobile application the term 1.8. Quality of services
urban traffic is used that is use to control noise pollution and a By providing quality of services we use heterogeneous
major contributor to urban air quality degradation. If we can network because they provide muti- services and more than
not control traffic congestion then it directly imposes given one distinct application on network. Its only not provide
cost on economic and social activities in most domains.[15] multiple traffic type of services either it includes the ability of
a single network to support applications with out using quality
C. CLOUD CENTRIC INTERNET OF THINGS
of services so for controlled optimal approach to serve
There are two things by which we can see the vision of IOT different types of service quality of service is required. TO
1) Internet centric provide quality of services in wireless network is not easy but
2) Thing centric we can resource allocation mechanism to support quality of
If data is distributed to all the objects then internet centric services.
architecture will work. It involves internet services so that we
can provide all the view of internet by using IOT. If we want 1.9. Data mining
to take smart object at the center stage then object centric IT is used to extract information from a complex data base at
architecture is used. But in our work we will use internet different spatial and temporal resolutions. It is a challenging
centric approach. A conceptual frame work integrates the research problem that is used in artificial intelligence. It is also
global computing sensing devices. known as knowledge discovery in databases process. It is a
inter disciplinary field of computer science. It is the
1.5. Open Challenges and future directions: computation process of discovering patterns in large data sets.
The cloud centric vision gives an open architecture which can It includes artificial intelligence, machine learning, statistics
be used as a user centric view. It enables different application and database system. It is also useful in the field of IOT.
to interact in the IOT things. It allows interaction in a suitable
information and another is distribution. Now if we talk about
1.10. GIS based visualization IIIE, the work of it is to integrate the information for the
Now many of new technologies have been evolved so industry use.
visualization must be enabling. For example the visualization We are just concern over the three basic principles of the
from CRT to Plasma, LCD, and LED has given the highly BTCD structure and also for the solution of food-distribution
efficient data representation. So by using the touch interface IoT and Healthcare-IoT:
user is able to get data in new form.
We can use IoT solution by crossing the boundaries for
The term information system used to describe the information making integration rather than a closed system. By using this
that integrates stores, edit, analyzes, shares and display solution we not only integrate the information among the
geographic information. GIS applications are the tools that boundaries but also across the boundaries which implies that
allow users to create interactive queries. So GIS based interoperability and security has to be checked carefully
visualization is used in IOT to provide interactive environment before implementation.
to user. The other way to integrate the information is that we can use
sensor node and cloud. Sensors can be used for the series of
1.11 Cloud Computing data processing and cloud be used with the help of gateway
Cloud computing focus on maximize the effectiveness of and server. The major issue comes under this is about to
shared resources .cloud resources are not only static that is control the traffic load and computational load along with the
used or shared by the user but also used dynamically to create hardware capacity of different-different modules.
or allocate the resources per demand. IT can work to We can also take the use of clusters in this. By using clusters,
allocating resources to users. It refers to the practice of we have to make different- different classes of same type of
transpositioning computer services. IOT and cloud computing entities. So by this it is easy to maintain the security and
is used for creating the smart environment. It combines interoperability
services that are offered by the multiple users. It supports a
large number of users to work in a reliable environment.
III. RESULTS ANALYSIS
II. PROPOSED WORK
3.1 Use of IoT system for food distribution hierarchy:
2.1 Business Innovation
We have already seen a lot of efforts towards food
The main concern of business innovation is business model
distribution-IoT. But after going through many research
design since the innovation of Internet of Things. Continuous
papers we saw that we are having a scattered patterns which
research and development have been done to design a business
create a gap between the real business and obstacles of
model but it didn’t give any proper solution so far. Thus the
business application. For this I prefer to use WSN
main goal is to find the knowledge gap between business and
Technologies for Internet of Things Services.
engineering. For bridging this gap, we implement the BTCD
If we want to solve these types of challenges, we have to go
approach. There are many methodologies of business
through BTCD framework. Now the vision of up-to-date FSC
modeling which are based on many types of classification like
in coverage of IoT is changed into modern model. The
activities for earning profit, innovation degree, economic
working of this model is based upon the process analysis of
control degree, degree of integration etc. There is another
the research for business and also for his management of EIS.
technique for innovating business i.e. stakeholder analysis. In
After doing this, we have to summarize and extract the value
this technique, a scoring matrix is used for quantizing
portion by the stakeholder supervision. So now we have to
satisfaction, influences and interests of stakeholders. Many
design logic for the distribution and creation of the values we
stakeholders are there in this hierarchy of Internet of Things.
get.
After getting the information about food distribution-Internet
Now wireless sensor network comes into picture for detecting
of Things and healthcare-Internet of Things, we can invent
the reasons for food spoilage, we have to design logic for the
better technologies for designing the business models.
distribution and creation of the values we get. Now by using
wireless sensor network, the engineer first has to decide the
field deployment sensor nodes and required hardware for
2.2 EIS and IIIE
implementation.
The research in Enterprise Information System (EIS) and
So now finally by doing above process, we are able to
Industrial Information Integration Engineering (IIIE) area has
integrate the information by using architecture to fulfill the
provided many useful approaches for solving many problems
needs for future EIS. To complete this we are having the data
like Management of business processes, workflow
processing and data mining algorithms. Our Food distribution-
management and service oriented architecture. For extending
IoT is now having better security and integrity with the help of
and integrating the processes of business across the outskirts
BTCD. This whole proposed work is all about the manual
of business’ processes at both among the organizations and in
working and we can take it as manual instructions for IoT
between modules of an organization. There are two ways to
answers for FSCs
transfer and collection of any information, one is share the
Fig 3.2 development of Health-IoT
Fig 3.1 development of Food-IoT
III. CONCLUSION AND FUTURE WORK
3.2 Use of IoT System for distribution of Healthcare at home Firstly, the provided devices and enabled technologies will be
As we have done food distribution-IoT, the ongoing research listed generation by generation like as what has been
is also for Healthcare- IoT is also having scattered patterns implemented before. Wireless power transmission technology
which create a gap between the real business and obstacles of will be used to design a pharmaceutical packaging by
business application. So the major task is to make a bridge inquiring the feasibility. Enabled devices will be work in
between home and the backend services an In-Home hasher scenario by enhancing the mechanical structure of the
Healthcare Station (IHHS) is required to depend on such devices for interference protection of industries. Power
services and device integration. consumption of WSN devices will also be optimized by
With the use of BTCD methodology, an action required for purifying the design’s implementation and new approaches
solution that is for healthcare-IoT. For this first we have to will be introduced to the protocol.
check the data-usage connection of mobile, and also we have The solution that is presented for food distribution hierarchy
to collect information from the traditional healthcare. Next the and distribution of health care at home will also be refined and
basic three things we have to invoke i.e. The Devices and another trial will be performed out in more real approaches.
Services Integration Architectures (DSIA) and Information Like, we will check the possibility to mix some algorithms on
System Architectures (ISIAs). site. We will also check the possibility to mix some service
Some of the basic requirements are not up-to the point as oriented architecture to both the provided solutions. At the
compare to pure technology, but they are having the capability same moment, many other applications will also be developed
for optimum solution with the help of BTCD framework. which will be based on the platform that is currently being
These basic requirements includes the reuse of 3G technology, used. We will make the process of checking design
letter from extension health, connection between modules of a methodologies and models required for the system in
system and also between systems, secure and valid software continuity.
distribution, we have to use standard and secure handling of
HER, Effective and efficient data methodology.
REFERENCES
Now we are having a proposed solution which is developed
with the help of BTCD for providing secure and efficient 1. Adelmann, R., Langheinrich, M., Floerkemeier, C.: A Toolkit for Bar
work. The result shows that our creation of Food Distribution- Code Recognition and Resolving on Camera Phones – Jump-Starting
IoT and Healthcare-IoT are shown in Figure-2-1 and figure-2- the Internet of Things. Proc. Workshop Mobile and Embedded
2 respectively. Interactive Systems. In: Hochberger, C., Liskowsky, R. (eds.)
Informatik 2006 – GI Lecture Notes in Informatics (LNI) 94, pp. 366–
373 (2006)
2. Ashton, K.: That ‘Internet of Things’ Thing. RFID Journal,
www.rfidjournal.com/article/ print/4986 (2009
3. Coroama, V.: The Smart Tachograph – Individual Accounting of Traffic
Costs and its Implications. In: Fishkin, K.P., Schiele, B., Nixon, P.,
Quigley, A.J. (eds.) Proc. Pervasive 2006, LNCS 3968, Springer, pp.
135–152 (2006)
4. Duquennoy, S., Grimaud, G., Vandewalle, J.-J.: Smews: Smart and
Mobile Embedded Web Server. Proc. Int. Conf. on Complex, Intelligent
and Software Intensive Systems, pp. 571– 576 (2009)
5. S. R. Das, C. E. Perkins, E. M. Royer and M. K. Marina,” Performance
Comparison of Two On-demand Routing Protocols for Ad Hoc
Networks,” IEEE Personal Communications Magazine, special issue on
Mobile Ad Hoc Networks, Vol. 8, No. 1, pp. 16-29, Feb 2001
6. Akan, O.B.; Isik, M.T.; Baykal, B.; (2009). Wireless passive sensor
networks. IEEE Communications Magazine, Vol.47, Iss.8, pp:92–99.
Akerberg, J.; Gidlund, M.; Bjorkman, M. (2011). Future research
challenges in wireless sensor and actuator networks targeting industrial
automation. IEEE Int. Con. on Industrial Informatics (INDIN), 410-415
7. Akyildiz, I.F. ; Su, W.; Sankarasubramaniam, Y.; Cayirci, E.; (2002).
Wireless sensor networks: a survey. Computer Networks, 38(2002)
393–422.
8. Angeles, R. (2010). Moderated Regression: Effects of IT Infrastructure
Integration and Supply Chain Process Integration on the Relationships
between RFID Adoption Attributes and System Deployment Outcomes.
In J.E. Quintela Varajão et al. (Eds.): CENTERIS 2010, Part II, CCIS
110, pp. 406–415, 2010. Berlin Heidelberg, Springer-Verlag.
9. Edmonds, N.; Stark, D.; Davis, J. (2005). “MASS: modular architecture
for sensor systems”. Int. Sym. Information Processing in Sensor
Networks (IPSN), 393-397.
10. He, T.; Ho, W.; Xu, X.F. (2010). A value-oriented model for managing
service supply chains. 2010 IEEE International Conference on Industrial
Engineering and Engineering Management (IEEM), 2010 , Page(s):
193- 197
11. ITU (2005). The Internet of Things-Executive Summary [online].
Available from: www.itu.int/osg/spu/ publications/internet of things
[Accessed 17 Oct 2012].
12. Zhibo Pang, Qiang Chen, Lirong Zheng. “Content-Extraction-Based
Compression of Acceleration Data for Mobile Wireless Sensors”, IEEE
Sensors Conference 2012, Oct 2012, Taipei, Taiwan.
13. Zhibo Pang, Kan Yu, Johan Åkerberg, Mikael Gidlund, “An RTOS-
based Architecture for Industrial Wireless Sensor Network Stacks with
Multi-ProcessorSupport”, IEEE International Conference on Industrial
Technology (ICIT2013), Feb 2013, Cape Town, South Africa.
14. Zhibo Pang, Qiang Chen, Lirong Zheng. “Value creation, Sensor
Portfolio and Information Fusion of Internet-of-Things Solutions for
Food Supply Chains”, Information Systems Frontiers, Aug 2012, DOI:
10.1007/s10796-012-9374-9.
15. Zhibo Pang, Lirong Zheng, Junzhe Tian, Sharon Kao-Walter, Elena
Dubrova , Qiang Chen. “Design of a Terminal Solution for Integration
of In-home Healthcare Devices and Services towards the Internet-of-
Things”, Enterprise Information Systems,
DOI:10.1080/17517575.2013.776118, April 2013.
16. Cypak AB, (2008). The Compliancy Connection: Standard solution for
medicationmonitoring. [on-line] http://www.cypak.com/ [accessed Dec
1, 2012].Dalgaard, P., Buch, P., Silberg, S. (2002). Seafood Spoilage
Predictor—developmentand distribution of a product specific
application software. International Journal ofFood Microbiology, 73(2-
3), 343-349.
17. De Capua, C.; Meduri, A.; Morello, R. (2010). A Smart ECG
Measurement SystemBased on Web-Service-Oriented Architecture for
Telemedicine Applications. IEEETransactions on Instrumentation and
Measurement, 59(10), 2530-2538.
18. Delmastro, F. (2012). Pervasive communications in healthcare.
Computer Communications, 35(11), 1284-1295.

You might also like