IOT BASED MULTIPATIENT HEALTH MONITORING SYSTEM

Main Author: Neealm Maurya,sonal ullewar,Jayshri Wadibhsme,Asmita Wasnik,Abhishek Kumar
Format: Article Journal
Terbitan: , 2018
Subjects:
Online Access: https://zenodo.org/record/1232189
Daftar Isi:
  • This paper illustrates the design and implementation of an health monitoring networked system. Statistics reveal that every minute a human is losing his/her life across the globe . More close in India, everyday many lives are affected by heart attacks and more importantly because the patients did not get timely and proper help. Care of critically ill patients, requires spontaneous & accurate decisions so that life-protecting & lifesavings therapy can be properly applied. The architecture for this system is based on smart devices and wireless sensor networks for real time analysis of various parameters of patients. This paper is based on monitoring of remote patients, after he is discharged from the hospital. Internet of Things (IoT) is the emerging paradigm, which contains huge amount of smart object and smart devices connected to the internet for communicating with each other. IoT devices are used in many fields which make the users' day to day life more comfortable. These smart devices are used to collect body temperature, heart rate, ECG, and EEG. etc., which are used to evaluate the health condition of the patient. Communicating the collected information to the doctor, making accurate decision on the data collected. we have designed and developed a low cost, reliable, energy efficient remote patient monitoring system. It is able to send parameters of patient in real time. The medical history of each patient including medications and medical reports are stored on cloud for easy access and processing for logistics and prognosis of future complications. Use of smartphones to relay data over internet reduces the total cost of the system. We have also considered the privacy and security aspects of the system keeping the provision for selective authority for patients and their relatives to access the cloud storage as wellas the possible threats to the system.