A Systematic Review and Implementation of Iot-Based Pervasive Sensor-Enabled Tracking System for Dementia Patients

Total Page:16

File Type:pdf, Size:1020Kb

A Systematic Review and Implementation of Iot-Based Pervasive Sensor-Enabled Tracking System for Dementia Patients Journal of Medical Systems (2019) 43: 287 https://doi.org/10.1007/s10916-019-1417-z MOBILE & WIRELESS HEALTH A Systematic Review and Implementation of IoT-Based Pervasive Sensor-Enabled Tracking System for Dementia Patients Partha Pratim Ray1 & Dinesh Dash2 & Debashis De3 Received: 30 April 2019 /Accepted: 8 July 2019 /Published online: 17 July 2019 # Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract In today’s world, 46.8 million people suffer from brain related diseases. Dementia is most prevalent of all. In general scenario, a dementia patient lacks proper guidance in searching out the way to return back at his/her home. Thus, increasing the risk of getting damaged at individual-health level. Therefore, it is important to track their movement in more sophisticated manner as possible. With emergence of wearables, GPS sensors and Internet of Things (IoT), such devices have become available in public domain. Smartphone apps support caregiver to locate the dementia patients in real-time. RF, GSM, 3G, Wi-Fi and 4G technology fill the communication gap between patient and caregiver to bring them closer. In this paper, we incorporated 7 most popular wearables for investigation to seek appropriateness for dementia tracking in recent times in systematic manners. We performed an in-depth review of these wearables as per the cost, technology wise and application wise characteristics. A case novel study i.e. IoT-based Force Sensor Resistance enabled System-FSRIoT, has been proposed and implemented to validate the effectiveness of IoT in the domain of smarter dementia patient tracking in wearable form factor. The results show promising aspect of a whole new notion to leverage efficient assistive physio-medical healthcare to the dementia patients and the affected family members to reduce life risks and achieve a better social life. Keywords Dementia . Tracking . Sensor system . Wearables . IoT Introduction Several key symptoms are found among the dementia pa- tients. Sudden memory loss, wandering with time/place, poor Dementia refers to the set of symptoms that cause sudden loss judgement, issues in solving problems and difficulty in com- of memory and mental abilities among patients. It is mainly pleting familiar tasks are to name a few [2]. According to caused by sudden damage and improper functioning of brain Alzheimer’s association (i.e. alz.org), these symptoms are cells while resulting into improper functioning of coordination currently incurable but mostly manageable with proper and efficient communication among several brain-lobes [1]. medication and behavioral care. Around 46.8 million people Such prevalence of insufficient signaling among brain-cells are currently affected by various types of dementia in five hamper regular livelihood activities such as: judgement, think- main continents [3]. The number is expected to reach 74.7 ing, movement, feelings and remembering an incident. million and 131.5 million in 2030 and 2050, respectively. Developing nations of Asia are currently at the highest risk This article is part of the Topical Collection on Mobile & Wireless Health prone zone on the chart whereas African people are the least suffers. The graph in Fig. 1 shows these facts among Africa, * Partha Pratim Ray Europe, Americas (north and south) and Asia. [email protected] Till now, several medical causes have been identified which in turn help into the assimilation of dementia. ’ 1 Department of Computer Applications, Sikkim University, Alzheimer s is the most common cause of dementia which is Gangtok, India observed among the 60–80% of registered cases in the world. ’ 2 Department of Computer Science and Engineering, NIT Patna, Parkinson s disease is another serious cause of dementia, upon Patna, India whose occurrence, affected patient suffers from normal move- – 3 Department of Computer Science and Engineering, MAKAUT, ment related issues [4 7]. Patients having vascular disease, are Kolkata, India found to be lingering with decision making, planning or 287 Page 2 of 21 J Med Syst (2019) 43: 287 come out with novel products to track dementia patients. This article provides an overview of some of these devices being offered to keep track of dementia patients. All of the wearable devices discussed in this study are either currently in market or will be launched very soon. All of the information on device’s features are inherited from respective manufacturer and cur- rently available on their website. This survey is not to be meant for any sorts of device specific analysis. As such, no critical discussion is included of how each manufacturer was effective while development of respective tracking device. The aim of this study is to review existing wearables that help Fig. 1 Prevalence of dementia patients around continents [3] dementia patients to track back to own home by him/her self and by caregivers through in-depth and comprehensive review organizing any event. In mixed dementia cases, sudden mem- of all aspects of surveyed wearables [13–16]. ory loss acts as addendum to the symptoms of the vascular The main contributions of this paper are as follows: inappropriateness. In contrary to this, frontotemporal demen- tia patients are often found to be more susceptive toward get- & To systematically review the most popular smart wearable ting affected with patientality and behavioral changes. Patients tracking devices for dementia patients’ location tracking; who suffer from cause like Dementia with Lewy Bodies & To perform an in-depth comparative study of the surveyed (DLB), are more prone toward sleep disturbances, visual hal- wearable devices in terms of cost, application, supportive- lucinations, slowness and movement. On the other hand, ness, user experience and technological enrichment; Normal Pressure Hydrocephalus (NPH) compels the patient & To propose a novel, low power consuming and cost- to suffer from the walking disability and uncontrolled. effective IoT-based wearable sensor system i.e. FSRIoT Similarly, the Huntington’s disease takes place due to the ab- to validate the comparative analysis toward catering the normality in a single defective gene, while resulting into the needs of efficient dementia patient tracking in real-life e- occurrence of irritability, depression and mood change among healthcare scenario. the victims. The Wernicke-Korsakoff syndrome (WK) is a & To discusses current technological gap in the surveyed wear- special cause of dementia that is occasionally seen among ables for dementia patient tracking and provide recommen- the alcohol-misusers. Finally, in Creutzfeldt-Jakob Disease dation to further uplift the quality of service in such cases. (CJD), patients get affected with fatal brain disorders. Figure 2 shows different causes of dementia as discusses Rest of the paper is organized as follows. Section II [8–10]. presents the preface to tracking devices. Section III rep- As comprehended from above, three most prevalent and resents the feature description of tracking devices for major challenges for the dementia patients are found as: ab- dementia. Section IV elaborates the user interfaces and normal wandering, sudden memory loss and severe fluctua- services in dementia tracking devices. Section V pre- tion in behavior. Generally, such patients forget to perform sents the various tracking techniques used in the sur- regular livelihood-activities, thus attracting risks into their veyed popular tracking devices. Section VI propose lives. There has been much interest towards development and implements the FSRIoT system model as a proof- and dissemination of relevant technology that can tackle de- of-concept case study to validate the cost-effective mentia patients. Most commonly, tracking solutions for de- tracking device development for dementia patients. mentia patients have been worked upon [11, 12]. Existence Section VII discusses the important technology gaps of these technologies have enabled wearable market players to Fig. 2 Various causes of dementia Various Causes of Dementia DLB Vascular Alzheimer’s Parkinson's CJD Disease Disease Mixed NPH Huntington's Fronto- temporal WK Syndrome J Med Syst (2019) 43: 287 Page 3 of 21 287 and future recommendation to improve current state of Table 1 Wearable device pricing and availability dementia tracking devices. Section VIII concludes the Device Price* Availability article. GPS Smart Sole US$299.00 ξ Available now Freedom GPS Locator Watch US$599.99ϕ Available now Related works to tracking devices Safelink US$149.99 Available now US$199.99ψ ¥ Consumers have shown growing interest in e-health and Mindme Locate US$199.99 Available now – MX-LOCare™ US$129.99 Available now telecare services in recent past [17 31]. Advancement in € fields of Internet of Things (IoT), smart body sensors iTraq3 US$129.00 Pre-order £ and cloud platforms, has embarked into creation of a PocketFinder+ US$159.00 Available now – ξ wearables industry [32 39]. This industry has witnessed *Prices are retrieved from each manufacturer’s web site, US$29.95/ uplift in terms of offering from relatively new comer moth monitoring service extra, ϕ US$10.00 or 35.00 apply per month ψ such as Fitbit, alongside renowned companies like as airtime charge, GS-TRACK price, SL-12 price, ¥ monthly sub- € £ Apple, Sony, Motorola and Garmin [40–51]. Wearable scription US$20.00, monthly subscription US$5.90, monthly subscrip- tion US$12.95 products from these vendors allow consumers to gain knowledge of his/her health and fitness status in real- time. While, most of these
Recommended publications
  • Internet of Things Meets Brain-Computer Interface: a Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
    JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity Xiang Zhang, Student Member, IEEE, Lina Yao, Member, IEEE, Shuai Zhang, Student Member, IEEE, Salil Kanhere, Member, IEEE, Michael Sheng, Member, IEEE, and Yunhao Liu, Fellow, IEEE Abstract—A Brain-Computer Interface (BCI) acquires brain signals, analyzes and translates them into commands that are relayed to actuation devices for carrying out desired actions. With the widespread connectivity of everyday devices realized by the advent of the Internet of Things (IoT), BCI can empower individuals to directly control objects such as smart home appliances or assistive robots, directly via their thoughts. However, realization of this vision is faced with a number of challenges, most importantly being the issue of accurately interpreting the intent of the individual from the raw brain signals that are often of low fidelity and subject to noise. Moreover, pre-processing brain signals and the subsequent feature engineering are both time-consuming and highly reliant on human domain expertise. To address the aforementioned issues, in this paper, we propose a unified deep learning based framework that enables effective human-thing cognitive interactivity in order to bridge individuals and IoT objects. We design a reinforcement learning based Selective Attention Mechanism (SAM) to discover the distinctive features from the input brain signals. In addition, we propose a modified Long Short-Term Memory (LSTM) to distinguish the inter-dimensional information forwarded from the SAM. To evaluate the efficiency of the proposed framework, we conduct extensive real-world experiments and demonstrate that our model outperforms a number of competitive state-of-the-art baselines.
    [Show full text]
  • The Internet of Things (Iot): an Overview
    Updated February 12, 2020 The Internet of Things (IoT): An Overview The Internet of Things (IoT) is a system of interrelated incorporation of IIoT and analytics is viewed by experts as devices connected to a network and/or to one another, the Fourth Industrial Revolution, or 4IR. exchanging data without necessarily requiring human-to- machine interaction. In other words, IoT is a collection of Internet of Medical Things (IoMT): The healthcare field electronic devices that can share information among has begun incorporating IoT, creating the Internet of themselves. Examples include smart factories, smart home Medical Things (IoMT). These devices, such as heart devices, medical monitoring devices, wearable fitness monitors and pace makers, collect and send patient health trackers, smart city infrastructures, and vehicular statistics over various networks to healthcare providers for telematics. Potential issues for Congress include regulation, monitoring, analysis, and remote configuration. At a digital privacy, and data security as discussed below. personal health level, wearable IoT devices, such as fitness trackers and smart watches, can track a user’s physical IoT Characteristics activities, basic vital data, and sleeping patterns. According IoT devices are often called “smart” devices because they to a 2019 survey by Pew Research, about one-in-five have sensors and can conduct complex data analytics. IoT Americans uses a smart watch or fitness tracker. devices collect data using sensors and offer services to the user based on the analyses of that data and according to Smart Cities: IoT devices and systems in the utilities, user-defined parameters. For example, a smart refrigerator transportation, and infrastructure sectors may be grouped uses sensors (e.g., cameras) to inventory stored items and under the category of “smart city.” Utilities can use IoT to can alert the user when items run low based on image create “smart” grids and meters for electricity, water, and recognition analyses.
    [Show full text]
  • Fog Computing: a Platform for Internet of Things and Analytics
    Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R.
    [Show full text]
  • The Internet of Things: Impact on Public Safety Communications
    Cybersecurity and Infrastructure Security Agency The Internet of Things March 2019 The Internet of Things: Impact on Public Safety Communications The Internet of Things (IoT) is the network of physical devices and connectivity that enables objects to connect to one another, to the Internet, and exchange data amongst themselves.1, 2 IoT allows connected devices to be sensed or controlled remotely across network infrastructures, creating opportunities for more direct, cross-platform integration and improved efficiencies for the transfer of data between devices. IoT presents undeniable implications for public safety IoT goes beyond simply connecting communications. In turn, comprehensively addressing the objects to the Internet; it allows ever-growing IoT environment presents a unique challenge to physical objects to intelligently self- service providers, equipment manufacturers, and consumers. identify and communicate with other Harnessing network architecture changes and equipping devices, creating a new model of everyday objects to be IoT-enabled will allow public safety information sharing with a variety of stakeholders to maximize existing infrastructure investments potential applications. and provide near-real time decision support experiences that can change how they operate. IoT Benefits IoT-enabled devices can provide numerous benefits to public safety, as shown in Table 1. For example, a traffic accident response team could use the data collected from a variety of Internet-connected devices ― such as the involved vehicles (e.g.,
    [Show full text]
  • Home Automation System Using Google Assistant
    © 2021 JETIR June 2021, Volume 8, Issue 6 www.jetir.org (ISSN-2349-5162) HOME AUTOMATION SYSTEM USING GOOGLE ASSISTANT MUDASIR M, NEHA V, NIHAAL THATHIR K, PAVAN YADAV M, POLLARPU SREERAMULU, SMITHA PATIL B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India Assistant Professor, Department of Computer Science and Engineering, Presidency University, Bangalore, India Abstract: Nowadays Technology keeps on upgrading. The idea behind Google assistant-controlled Home automation is to control home devices with voice. On the market there are many devices available to do that, but making our own is awesome. In this project, the Google assistant requires voice commands. Adafruit account which is a cloud based free IoT web server used to create virtual switches, is linking to IFTTT website abbreviated as “If This Than That” which is used to create if else conditional statements. The voice commands for Google assistant have been added through IFTTT website. In this home automation, as the user gives commands to the Google assistant, Home appliances like Bulb, Fan and Motor etc., can be controlled accordingly. The commands given through the Google assistant are decoded and then sent to the microcontroller, the microcontroller in turn control the relays connected to it. The device connected to the respective relay can be turned ON or OFF as per the users request to the Google Assistant.
    [Show full text]
  • Smart Virtualization for Iot
    2018 IEEE International Conference on Smart Cloud Smart Virtualization for IoT Mayra Samaniego Cristian Espana Ralph Deters Department of Computer Science Department of Computer Science Department of Computer Science University of Saskatchewan University of Saskatchewan University of Saskatchewan Saskatoon, Canada Saskatoon, Canada Saskatoon, Canada [email protected] [email protected] [email protected] Abstract—Nowadays, the cloud hosts the majority of IoT directly handle requests from third parties efficiently, and the virtualizations. This approach depends on an active Internet cloud or fog layer is strictly accessed when needed. The connection. The question that emerges is how we can move those proposed architecture enables the provisioning of virtual virtualizations to the edge of IoT networks without losing the resources and services without depending on an Internet power and flexibility from the cloud but fulfilling the connection. requirements of constrained and pervasive environments. This research presents an architecture that integrates dew computing The remainder of the paper is structured as follows. Section to provision virtual resources at the edge level. This architecture 2 presents an introduction of cloud services for IoT proposes smart virtual resources deployed towards edge devices virtualization. Section 3 presents an introduction of to provide data views and IoT services to users. This approach virtualization at the edge of IoT networks. In section 4, we goes beyond traditional IoT virtualizations and builds distributed explain the architecture for smart virtualization in IoT. Finally, virtual systems that include the benefits of the cloud, fog, and section 5 presents conclusions and future work. dew computing to provide services directly at the edge level.
    [Show full text]
  • Predictive Analysis of 3D Reram-Based PUF for Securing the Internet of Things
    Predictive Analysis of 3D ReRAM-based PUF for Securing the Internet of Things Jeeson Kim Hussein Nili School of Engineering Electrical and Computer Engineering RMIT University University of California Santa Barbara Melbourne, Australia Santa Barbara, USA [email protected] [email protected] Gina C. Adam Nhan Duy Truong Electrical and Computer Engineering School of Engineering University of California Santa Barbara RMIT University Santa Barbara, USA Melbourne, Australia gina [email protected] [email protected] Dmitri B. Strukov Omid Kavehei Electrical and Computer Engineering Electrical and Information Engineering University of California Santa Barbara The University of Sydney Santa Barbara, USA Sydney, Australia [email protected] [email protected] Abstract—In recent years, an explosion of IoT devices challenge [2, 3]. Widely used traditional cryptographic and its use leads threats to the privacy and security solutions, for example, advanced encryption standard concerns of individual users and merchandises. As one (AES) and elliptic curve cryptography (ECC), can be of promising solutions, physical unclonable function (PUF) has been extensively studied. This paper investigates quality used for both the integrity and the authentication of of randomness in the first generation of 3D analog ReRAM exchanging data and messages. PUF primitives using measured and gathered data from IoT hardware anti-counterfeiting, integrated circuit fabricated ReRAM crossbars. This study is significant as (IC) trust and physical tampering are also critical the randomness quality of a PUF directly relates to its tasks [4]. In 2014, defense advanced research projects resilience against various model-building attacks, includ- ing machine learning attack.
    [Show full text]
  • Paving the Way for Self-Driving Vehicles”
    June 13, 2017 The Honorable John Thune, Chairman The Honorable Bill Nelson, Ranking Member U.S. Senate Committee on Commerce, Science & Transportation 512 Dirksen Senate Office Building Washington, DC 20510 RE: Hearing on “Paving the Way for Self-Driving Vehicles” Dear Chairman Thune and Ranking Member Nelson: We write to your regarding the upcoming hearing “Paving the Way for Self-Driving Vehicles,”1 on the privacy and safety risks of connected and autonomous vehicles. For more than a decade, the Electronic Privacy Information Center (“EPIC”) has warned federal agencies and Congress about the growing risks to privacy resulting from the increasing collection and use of personal data concerning the operation of motor vehicles.2 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues. EPIC engages in a wide range of public policy and litigation activities. EPIC testified before the House of Representatives in 2015 on “the Internet of Cars.”3 Recently, EPIC 1 Paving the Way for Self-Driving Vehicles, 115th Cong. (2017), S. Comm. on Commerce, Science, and Transportation, https://www.commerce.senate.gov/public/index.cfm/pressreleases?ID=B7164253-4A43- 4B70-8A73-68BFFE9EAD1A (June 14, 2017). 2 See generally EPIC, “Automobile Event Data Recorders (Black Boxes) and Privacy,” https://epic.org/privacy/edrs/. See also EPIC, Comments, Docket No. NHTSA-2002-13546 (Feb. 28, 2003), available at https://epic.org/privacy/drivers/edr_comments.pdf (“There need to be clear guidelines for how the data can be accessed and processed by third parties following the use limitation and openness or transparency principles.”); EPIC, Comments on Federal Motor Vehicle Safety Standards; V2V Communications, Docket No.
    [Show full text]
  • Internet of Things
    INTERNET OF THINGS Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world. WHY SHOULD WE CARE? • Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits. • New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever. • The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks. • With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives. SIMPLE TIPS TO OWN IT. • Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read the Creating a Password Tip Sheet for more information.
    [Show full text]
  • Scalable Distributed Computing Hierarchy: Cloud, Fog and Dew Computing∗
    c 2015 by the authors; licensee RonPub, Lubeck,¨ Germany. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). Open Access Open Journal of Cloud Computing (OJCC) Volume 2, Issue 1, 2015 http://www.ronpub.com/ojcc ISSN 2199-1987 Scalable Distributed Computing Hierarchy: Cloud, Fog and Dew Computing∗ Karolj SkalaA, Davor Davidovic´A, Enis AfganA;B, Ivan Sovic´A, Zorislav Sojatˇ A A Centre for Informatics and Computing, Rudjer Boskoviˇ c´ Institute, Bijenckaˇ cesta 54, 10000 Zagreb, Croatia, fskala, ddavid, isovic, eafgan, [email protected] B Johns Hopkins University, 3400 N. Charles Street, Baltimore, MD 21218, USA, [email protected] ABSTRACT The paper considers the conceptual approach for organization of the vertical hierarchical links between the scalable distributed computing paradigms: Cloud Computing, Fog Computing and Dew Computing. In this paper, the Dew Computing is described and recognized as a new structural layer in the existing distributed computing hierarchy. In the existing computing hierarchy, the Dew computing is positioned as the ground level for the Cloud and Fog computing paradigms. Vertical, complementary, hierarchical division from Cloud to Dew Computing satisfies the needs of high- and low-end computing demands in everyday life and work. These new computing paradigms lower the cost and improve the performance, particularly for concepts and applications such as the Internet of Things (IoT) and the Internet of Everything (IoE). In addition, the Dew computing paradigm will require new programming models that will efficiently reduce the complexity and improve the productivity and usability of scalable distributed computing, following the principles of High-Productivity computing.
    [Show full text]
  • Iot Based Drips Monitoring System in Hospitals
    ISSN (Online) 2321-2004 IJIREEICE ISSN (Print) 2321-5526 International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering Vol. 9, Issue 4, April 2021 DOI 10.17148/IJIREEICE.2021.9408 IoT based drips monitoring system in hospitals Mrs.B.Kiruthiga1, Babithasri S2, Gayathri U3, Nandhini S4 Assistant Professor, Velammal College Of Engineering and Technology, Madurai1 Department of EEE, Velammal College of Engineering and Technology, Madurai, India2-4 Abstract: Saline, one among the foremost popular intravenous (IV) therapies plays a serious role within the management of patients who are critically ill. Surveillance of saline bottle level is extremely important because when the bottle is emptied and therefore the needle isn't faraway from the vein then the blood flows outward into the bottle. In hospitals, the nurses or caretakers are liable for monitoring the saline bottle level. Mostly, thanks to negligence and any unusual condition, the precise timing of removing the needle from the patient's vein is ignored which causes a significant casualty and should lead to death as well. Furthermore, remote monitoring may be a got to provide telehealth services. To prevent the accident due to the ignorance of caretakers and to provide remote surveillance in telehealth services, we have proposed the cost-effective smart saline level.monitoring device which includes the mixture of sensor and Internet of Things (IOT) technologies. We have built this system by using load sensor and ultra-low power low cost Arduino micro controller. The load sensor converts the load of the bottle to a selected voltage. The ESP8266 micro controller generates and publishes a specific message based on the voltage received from the sensor.
    [Show full text]
  • Internet of Things Innovation Landscape Brief © Irena 2019
    INTERNET OF THINGS INNOVATION LANDSCAPE BRIEF © IRENA 2019 Unless otherwise stated, material in this publication may be freely used, shared, copied, reproduced, printed and/or stored, provided that appropriate acknowledgement is given of IRENA as the source and copyright holder. Material in this publication that is attributed to third parties may be subject to separate terms of use and restrictions, and appropriate permissions from these third parties may need to be secured before any use of such material. ISBN 978-92-9260-142-3 Citation: IRENA (2019), Innovation landscape brief: Internet of Things, International Renewable Energy Agency, Abu Dhabi. ACKNOWLEDGEMENTS This report was prepared by the Innovation team at IRENA’s Innovation and Technology Centre (IITC) with text authored by Sean Ratka, Arina Anisie, Francisco Boshell and Nadeem Goussous. This report benefited from the input and review of experts: Tiago Maouras (EDP), Stephen Woodhouse and Tom Ingelse (Poyry), Jaideep Sandhu (Engie), along with Emanuele Taibi, Elena Ocenic, Nina Litman-Roventa and Paul Komor (IRENA). Report available online: www.irena.org/publications For questions or to provide feedback: [email protected] DISCLAIMER This publication and the material herein are provided “as is”. All reasonable precautions have been taken by IRENA to verify the reliability of the material in this publication. However, neither IRENA nor any of its officials, agents, data or other third- party content providers provides a warranty of any kind, either expressed or implied, and they accept no responsibility or liability for any consequence of use of the publication or material herein. The information contained herein does not necessarily represent the views of all Members of IRENA.
    [Show full text]