Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

WiSPH: A Wireless Sensor Network-Based Home Care Monitoring System

Identifieur interne : 000547 ( Pmc/Corpus ); précédent : 000546; suivant : 000548

WiSPH: A Wireless Sensor Network-Based Home Care Monitoring System

Auteurs : Pedro Maga A-Espinoza ; Raúl Aquino-Santos ; Néstor Cárdenas-Benítez ; José Aguilar-Velasco ; César Buenrostro-Segura ; Arthur Edwards-Block ; Aldo Medina-Cass

Source :

RBID : PMC:4029648

Abstract

This paper presents a system based on WSN technology capable of monitoring heart rate and the rate of motion of seniors within their homes. The system is capable of remotely alerting specialists, caretakers or family members via a smartphone of rapid physiological changes due to falls, tachycardia or bradycardia. This work was carried out using our workgroup's WiSe platform, which we previously developed for use in WSNs. The proposed WSN architecture is flexible, allowing for greater scalability to better allow event-based monitoring. The architecture also provides security mechanisms to assure that the monitored and/or stored data can only be accessed by authorized individuals or devices. The aforementioned characteristics provide the network versatility and solidity required for use in health applications.


Url:
DOI: 10.3390/s140407096
PubMed: 24759112
PubMed Central: 4029648

Links to Exploration step

PMC:4029648

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">WiSPH: A Wireless Sensor Network-Based Home Care Monitoring System</title>
<author>
<name sortKey="Maga A Espinoza, Pedro" sort="Maga A Espinoza, Pedro" uniqKey="Maga A Espinoza P" first="Pedro" last="Maga A-Espinoza">Pedro Maga A-Espinoza</name>
<affiliation>
<nlm:aff id="af1-sensors-14-07096"> College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Aquino Santos, Raul" sort="Aquino Santos, Raul" uniqKey="Aquino Santos R" first="Raúl" last="Aquino-Santos">Raúl Aquino-Santos</name>
<affiliation>
<nlm:aff id="af1-sensors-14-07096"> College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Cardenas Benitez, Nestor" sort="Cardenas Benitez, Nestor" uniqKey="Cardenas Benitez N" first="Néstor" last="Cárdenas-Benítez">Néstor Cárdenas-Benítez</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Aguilar Velasco, Jose" sort="Aguilar Velasco, Jose" uniqKey="Aguilar Velasco J" first="José" last="Aguilar-Velasco">José Aguilar-Velasco</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Buenrostro Segura, Cesar" sort="Buenrostro Segura, Cesar" uniqKey="Buenrostro Segura C" first="César" last="Buenrostro-Segura">César Buenrostro-Segura</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Edwards Block, Arthur" sort="Edwards Block, Arthur" uniqKey="Edwards Block A" first="Arthur" last="Edwards-Block">Arthur Edwards-Block</name>
<affiliation>
<nlm:aff id="af1-sensors-14-07096"> College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Medina Cass, Aldo" sort="Medina Cass, Aldo" uniqKey="Medina Cass A" first="Aldo" last="Medina-Cass">Aldo Medina-Cass</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">24759112</idno>
<idno type="pmc">4029648</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029648</idno>
<idno type="RBID">PMC:4029648</idno>
<idno type="doi">10.3390/s140407096</idno>
<date when="2014">2014</date>
<idno type="wicri:Area/Pmc/Corpus">000547</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000547</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">WiSPH: A Wireless Sensor Network-Based Home Care Monitoring System</title>
<author>
<name sortKey="Maga A Espinoza, Pedro" sort="Maga A Espinoza, Pedro" uniqKey="Maga A Espinoza P" first="Pedro" last="Maga A-Espinoza">Pedro Maga A-Espinoza</name>
<affiliation>
<nlm:aff id="af1-sensors-14-07096"> College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Aquino Santos, Raul" sort="Aquino Santos, Raul" uniqKey="Aquino Santos R" first="Raúl" last="Aquino-Santos">Raúl Aquino-Santos</name>
<affiliation>
<nlm:aff id="af1-sensors-14-07096"> College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Cardenas Benitez, Nestor" sort="Cardenas Benitez, Nestor" uniqKey="Cardenas Benitez N" first="Néstor" last="Cárdenas-Benítez">Néstor Cárdenas-Benítez</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Aguilar Velasco, Jose" sort="Aguilar Velasco, Jose" uniqKey="Aguilar Velasco J" first="José" last="Aguilar-Velasco">José Aguilar-Velasco</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Buenrostro Segura, Cesar" sort="Buenrostro Segura, Cesar" uniqKey="Buenrostro Segura C" first="César" last="Buenrostro-Segura">César Buenrostro-Segura</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Edwards Block, Arthur" sort="Edwards Block, Arthur" uniqKey="Edwards Block A" first="Arthur" last="Edwards-Block">Arthur Edwards-Block</name>
<affiliation>
<nlm:aff id="af1-sensors-14-07096"> College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Medina Cass, Aldo" sort="Medina Cass, Aldo" uniqKey="Medina Cass A" first="Aldo" last="Medina-Cass">Aldo Medina-Cass</name>
<affiliation>
<nlm:aff id="af2-sensors-14-07096"> Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</nlm:aff>
</affiliation>
</author>
</analytic>
<series>
<title level="j">Sensors (Basel, Switzerland)</title>
<idno type="eISSN">1424-8220</idno>
<imprint>
<date when="2014">2014</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>This paper presents a system based on WSN technology capable of monitoring heart rate and the rate of motion of seniors within their homes. The system is capable of remotely alerting specialists, caretakers or family members via a smartphone of rapid physiological changes due to falls, tachycardia or bradycardia. This work was carried out using our workgroup's WiSe platform, which we previously developed for use in WSNs. The proposed WSN architecture is flexible, allowing for greater scalability to better allow event-based monitoring. The architecture also provides security mechanisms to assure that the monitored and/or stored data can only be accessed by authorized individuals or devices. The aforementioned characteristics provide the network versatility and solidity required for use in health applications.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Boonyarattaphan, A" uniqKey="Boonyarattaphan A">A. Boonyarattaphan</name>
</author>
<author>
<name sortKey="Yan, B" uniqKey="Yan B">B. Yan</name>
</author>
<author>
<name sortKey="Sam, C" uniqKey="Sam C">C. Sam</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tan, O" uniqKey="Tan O">O. Tan</name>
</author>
<author>
<name sortKey="Wei Kiat, K" uniqKey="Wei Kiat K">K. Wei Kiat</name>
</author>
<author>
<name sortKey="Jamie, N" uniqKey="Jamie N">N. Jamie</name>
</author>
<author>
<name sortKey="Wong, A" uniqKey="Wong A">A. Wong</name>
</author>
<author>
<name sortKey="Tay, Z" uniqKey="Tay Z">Z. Tay</name>
</author>
<author>
<name sortKey="Helander, M G" uniqKey="Helander M">M.G. Helander</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Alemdar, H" uniqKey="Alemdar H">H. Alemdar</name>
</author>
<author>
<name sortKey="Ersoy, C" uniqKey="Ersoy C">C. Ersoy</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lu, C H" uniqKey="Lu C">C.-H. Lu</name>
</author>
<author>
<name sortKey="Fu, L C" uniqKey="Fu L">L.-C. Fu</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Philipose, M" uniqKey="Philipose M">M. Philipose</name>
</author>
<author>
<name sortKey="Consolvo, S" uniqKey="Consolvo S">S. Consolvo</name>
</author>
<author>
<name sortKey="Fishkin, K" uniqKey="Fishkin K">K. Fishkin</name>
</author>
<author>
<name sortKey="Smith, P I" uniqKey="Smith P">P.I. Smith</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tabar, A M" uniqKey="Tabar A">A.M. Tabar</name>
</author>
<author>
<name sortKey="Keshavarz, A" uniqKey="Keshavarz A">A. Keshavarz</name>
</author>
<author>
<name sortKey="Aghajan, H" uniqKey="Aghajan H">H. Aghajan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wang, C C" uniqKey="Wang C">C.-C. Wang</name>
</author>
<author>
<name sortKey="Chiang, C Y" uniqKey="Chiang C">C.-Y. Chiang</name>
</author>
<author>
<name sortKey="Lin, P Y" uniqKey="Lin P">P.-Y. Lin</name>
</author>
<author>
<name sortKey="Chou, Y C" uniqKey="Chou Y">Y.-C. Chou</name>
</author>
<author>
<name sortKey="Kuo, I T" uniqKey="Kuo I">I.T. Kuo</name>
</author>
<author>
<name sortKey="Huang, C N" uniqKey="Huang C">C.-N. Huang</name>
</author>
<author>
<name sortKey="Chan, C T" uniqKey="Chan C">C.-T. Chan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Yan, H" uniqKey="Yan H">H. Yan</name>
</author>
<author>
<name sortKey="Xu, Y" uniqKey="Xu Y">Y. Xu</name>
</author>
<author>
<name sortKey="Gidlund, M" uniqKey="Gidlund M">M. Gidlund</name>
</author>
<author>
<name sortKey="Nohr, R" uniqKey="Nohr R">R. Nohr</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Marco, A" uniqKey="Marco A">A. Marco</name>
</author>
<author>
<name sortKey="Casas, R" uniqKey="Casas R">R. Casas</name>
</author>
<author>
<name sortKey="Falco, J" uniqKey="Falco J">J. Falco</name>
</author>
<author>
<name sortKey="Gracia, H" uniqKey="Gracia H">H. Gracia</name>
</author>
<author>
<name sortKey="Artigas, J I" uniqKey="Artigas J">J.I. Artigas</name>
</author>
<author>
<name sortKey="Roy, A" uniqKey="Roy A">A. Roy</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lopez Nores, M" uniqKey="Lopez Nores M">M. Lopez-Nores</name>
</author>
<author>
<name sortKey="Pazos Arias, J" uniqKey="Pazos Arias J">J. Pazos-arias</name>
</author>
<author>
<name sortKey="Garcia Duque, J" uniqKey="Garcia Duque J">J. Garcia-Duque</name>
</author>
<author>
<name sortKey="Blanco Fernandez, Y" uniqKey="Blanco Fernandez Y">Y. Blanco-Fernandez</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pang, Z" uniqKey="Pang Z">Z. Pang</name>
</author>
<author>
<name sortKey="Chen, Q" uniqKey="Chen Q">Q. Chen</name>
</author>
<author>
<name sortKey="Zheng, L" uniqKey="Zheng L">L. Zheng</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wood, A" uniqKey="Wood A">A. Wood</name>
</author>
<author>
<name sortKey="Stankovic, J A" uniqKey="Stankovic J">J.A. Stankovic</name>
</author>
<author>
<name sortKey="Virone, G" uniqKey="Virone G">G. Virone</name>
</author>
<author>
<name sortKey="Selavo, L" uniqKey="Selavo L">L. Selavo</name>
</author>
<author>
<name sortKey="He, Z" uniqKey="He Z">Z. He</name>
</author>
<author>
<name sortKey="Cao, Q" uniqKey="Cao Q">Q. Cao</name>
</author>
<author>
<name sortKey="Thao, D" uniqKey="Thao D">D. Thao</name>
</author>
<author>
<name sortKey="Wu, Y" uniqKey="Wu Y">Y. Wu</name>
</author>
<author>
<name sortKey="Fang, L" uniqKey="Fang L">L. Fang</name>
</author>
<author>
<name sortKey="Stoleru, R" uniqKey="Stoleru R">R. Stoleru</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Baker, C R" uniqKey="Baker C">C.R. Baker</name>
</author>
<author>
<name sortKey="Armijo, K" uniqKey="Armijo K">K. Armijo</name>
</author>
<author>
<name sortKey="Belka, S" uniqKey="Belka S">S. Belka</name>
</author>
<author>
<name sortKey="Benhabib, M" uniqKey="Benhabib M">M. Benhabib</name>
</author>
<author>
<name sortKey="Bhargava, V" uniqKey="Bhargava V">V. Bhargava</name>
</author>
<author>
<name sortKey="Burkhart, N" uniqKey="Burkhart N">N. Burkhart</name>
</author>
<author>
<name sortKey="Der Minassians, A" uniqKey="Der Minassians A">A. Der Minassians</name>
</author>
<author>
<name sortKey="Dervisoglu, G" uniqKey="Dervisoglu G">G. Dervisoglu</name>
</author>
<author>
<name sortKey="Gutnik, L" uniqKey="Gutnik L">L. Gutnik</name>
</author>
<author>
<name sortKey="Haick, M B" uniqKey="Haick M">M.B. Haick</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jimenez, V P G" uniqKey="Jimenez V">V.P.G. Jiménez</name>
</author>
<author>
<name sortKey="Armada, A G" uniqKey="Armada A">A.G. Armada</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Egbogah, E E" uniqKey="Egbogah E">E.E. Egbogah</name>
</author>
<author>
<name sortKey="Fapojuwo, A O" uniqKey="Fapojuwo A">A.O. Fapojuwo</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gonzalez, A" uniqKey="Gonzalez A">A. González</name>
</author>
<author>
<name sortKey="Aquino, R" uniqKey="Aquino R">R. Aquino</name>
</author>
<author>
<name sortKey="Mata, W" uniqKey="Mata W">W. Mata</name>
</author>
<author>
<name sortKey="Ochoa, A" uniqKey="Ochoa A">A. Ochoa</name>
</author>
<author>
<name sortKey="Salda A, P" uniqKey="Salda A P">P. Saldaña</name>
</author>
<author>
<name sortKey="Edwards, A" uniqKey="Edwards A">A. Edwards</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Malan, D" uniqKey="Malan D">D. Malan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ko, J" uniqKey="Ko J">J. Ko</name>
</author>
<author>
<name sortKey="Lim, J H" uniqKey="Lim J">J.H. Lim</name>
</author>
<author>
<name sortKey="Chen, Y" uniqKey="Chen Y">Y. Chen</name>
</author>
<author>
<name sortKey="Rv Zvan Musvaloiu E, Z" uniqKey="Rv Zvan Musvaloiu E Z">Z. Rvăzvan Musvaloiu-E</name>
</author>
<author>
<name sortKey="Terzis, A" uniqKey="Terzis A">A. Terzis</name>
</author>
<author>
<name sortKey="Masson, G M" uniqKey="Masson G">G.M. Masson</name>
</author>
<author>
<name sortKey="Gao, T" uniqKey="Gao T">T. Gao</name>
</author>
<author>
<name sortKey="Destler, W" uniqKey="Destler W">W. Destler</name>
</author>
<author>
<name sortKey="Selavo, L" uniqKey="Selavo L">L. Selavo</name>
</author>
<author>
<name sortKey="Dutton, R P" uniqKey="Dutton R">R.P. Dutton</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hu, F" uniqKey="Hu F">F. Hu</name>
</author>
<author>
<name sortKey="Jiang, M" uniqKey="Jiang M">M. Jiang</name>
</author>
<author>
<name sortKey="Celentano, L" uniqKey="Celentano L">L. Celentano</name>
</author>
<author>
<name sortKey="Xiao, Y" uniqKey="Xiao Y">Y. Xiao</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mitra, U" uniqKey="Mitra U">U. Mitra</name>
</author>
<author>
<name sortKey="Emken, B A" uniqKey="Emken B">B.A. Emken</name>
</author>
<author>
<name sortKey="Sangwon, L" uniqKey="Sangwon L">L. Sangwon</name>
</author>
<author>
<name sortKey="Ming, L" uniqKey="Ming L">L. Ming</name>
</author>
<author>
<name sortKey="Rozgic, V" uniqKey="Rozgic V">V. Rozgic</name>
</author>
<author>
<name sortKey="Thatte, G" uniqKey="Thatte G">G. Thatte</name>
</author>
<author>
<name sortKey="Vathsangam, H" uniqKey="Vathsangam H">H. Vathsangam</name>
</author>
<author>
<name sortKey="Zois, D" uniqKey="Zois D">D. Zois</name>
</author>
<author>
<name sortKey="Annavaram, M" uniqKey="Annavaram M">M. Annavaram</name>
</author>
<author>
<name sortKey="Narayanan, S" uniqKey="Narayanan S">S. Narayanan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Custodio, V" uniqKey="Custodio V">V. Custodio</name>
</author>
<author>
<name sortKey="Herrera, F" uniqKey="Herrera F">F. Herrera</name>
</author>
<author>
<name sortKey="L Pez, G" uniqKey="L Pez G">G. López</name>
</author>
<author>
<name sortKey="Moreno, J" uniqKey="Moreno J">J. Moreno</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tarng, W" uniqKey="Tarng W">W. Tarng</name>
</author>
<author>
<name sortKey="Lin, C H" uniqKey="Lin C">C.-H. Lin</name>
</author>
<author>
<name sortKey="Liou, H H" uniqKey="Liou H">H.-H. Liou</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Karantonis, D M" uniqKey="Karantonis D">D.M. Karantonis</name>
</author>
<author>
<name sortKey="Narayanan, M R" uniqKey="Narayanan M">M.R. Narayanan</name>
</author>
<author>
<name sortKey="Mathie, M" uniqKey="Mathie M">M. Mathie</name>
</author>
<author>
<name sortKey="Lovell, N H" uniqKey="Lovell N">N.H. Lovell</name>
</author>
<author>
<name sortKey="Celler, B G" uniqKey="Celler B">B.G. Celler</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Agruss, N S" uniqKey="Agruss N">N.S. Agruss</name>
</author>
<author>
<name sortKey="Rosin, E Y" uniqKey="Rosin E">E.Y. Rosin</name>
</author>
<author>
<name sortKey="Adolph, R J" uniqKey="Adolph R">R.J. Adolph</name>
</author>
<author>
<name sortKey="Fowler, N O" uniqKey="Fowler N">N.O. Fowler</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Budzikowski, A" uniqKey="Budzikowski A">A. Budzikowski</name>
</author>
<author>
<name sortKey="Cho, C" uniqKey="Cho C">C. Cho</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kumar, P" uniqKey="Kumar P">P. Kumar</name>
</author>
<author>
<name sortKey="Lee, H J" uniqKey="Lee H">H.-J. Lee</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">Sensors (Basel)</journal-id>
<journal-id journal-id-type="iso-abbrev">Sensors (Basel)</journal-id>
<journal-title-group>
<journal-title>Sensors (Basel, Switzerland)</journal-title>
</journal-title-group>
<issn pub-type="epub">1424-8220</issn>
<publisher>
<publisher-name>MDPI</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">24759112</article-id>
<article-id pub-id-type="pmc">4029648</article-id>
<article-id pub-id-type="doi">10.3390/s140407096</article-id>
<article-id pub-id-type="publisher-id">sensors-14-07096</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>WiSPH: A Wireless Sensor Network-Based Home Care Monitoring System</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Magaña-Espinoza</surname>
<given-names>Pedro</given-names>
</name>
<xref ref-type="aff" rid="af1-sensors-14-07096">
<sup>1</sup>
</xref>
<xref rid="c1-sensors-14-07096" ref-type="corresp">
<sup>*</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Aquino-Santos</surname>
<given-names>Raúl</given-names>
</name>
<xref ref-type="aff" rid="af1-sensors-14-07096">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Cárdenas-Benítez</surname>
<given-names>Néstor</given-names>
</name>
<xref ref-type="aff" rid="af2-sensors-14-07096">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Aguilar-Velasco</surname>
<given-names>José</given-names>
</name>
<xref ref-type="aff" rid="af2-sensors-14-07096">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Buenrostro-Segura</surname>
<given-names>César</given-names>
</name>
<xref ref-type="aff" rid="af2-sensors-14-07096">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Edwards-Block</surname>
<given-names>Arthur</given-names>
</name>
<xref ref-type="aff" rid="af1-sensors-14-07096">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Medina-Cass</surname>
<given-names>Aldo</given-names>
</name>
<xref ref-type="aff" rid="af2-sensors-14-07096">
<sup>2</sup>
</xref>
</contrib>
</contrib-group>
<aff id="af1-sensors-14-07096">
<label>1</label>
College of Telematics, University of Colima, Avenida Universidad 333, C.P. 28045 Colima, Col., Mexico; E-Mails:
<email>aquinor@ucol.mx</email>
(R.A.-S.);
<email>arted@ucol.mx</email>
(A.E.-B.)</aff>
<aff id="af2-sensors-14-07096">
<label>2</label>
Department of Innovation and Technological Development, Siteldi Solutions S.A. de C.V., 111 Canario Street, C.P. 28017 Colima, Col., Mexico; E-Mails:
<email>nestor.cardenas@siteldisolutions.mx</email>
(N.C.-B.);
<email>jose.aguilar@siteldisolutions.mx</email>
(J.A.-V.);
<email>cesar.buenrostro@corporativostr.com</email>
(C.B.-S.);
<email>aldo.medina@corporativostr.com</email>
(A.M.-C.)</aff>
<author-notes>
<corresp id="c1-sensors-14-07096">
<label>*</label>
Author to whom correspondence should be addressed; E-Mail:
<email>pedro_magana@ucol.mx</email>
; Tel.: +52-312-316-1075.</corresp>
</author-notes>
<pub-date pub-type="collection">
<month>4</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>22</day>
<month>4</month>
<year>2014</year>
</pub-date>
<volume>14</volume>
<issue>4</issue>
<fpage>7096</fpage>
<lpage>7119</lpage>
<history>
<date date-type="received">
<day>19</day>
<month>3</month>
<year>2014</year>
</date>
<date date-type="rev-recd">
<day>11</day>
<month>4</month>
<year>2014</year>
</date>
<date date-type="accepted">
<day>11</day>
<month>4</month>
<year>2014</year>
</date>
</history>
<permissions>
<copyright-statement>© 2014 by the authors; licensee MDPI, Basel, Switzerland.</copyright-statement>
<copyright-year>2014</copyright-year>
<license>
<license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (
<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/3.0/">http://creativecommons.org/licenses/by/3.0/</ext-link>
).</license-p>
</license>
</permissions>
<abstract>
<p>This paper presents a system based on WSN technology capable of monitoring heart rate and the rate of motion of seniors within their homes. The system is capable of remotely alerting specialists, caretakers or family members via a smartphone of rapid physiological changes due to falls, tachycardia or bradycardia. This work was carried out using our workgroup's WiSe platform, which we previously developed for use in WSNs. The proposed WSN architecture is flexible, allowing for greater scalability to better allow event-based monitoring. The architecture also provides security mechanisms to assure that the monitored and/or stored data can only be accessed by authorized individuals or devices. The aforementioned characteristics provide the network versatility and solidity required for use in health applications.</p>
</abstract>
<kwd-group>
<kwd>wireless sensor networks</kwd>
<kwd>WiSPH</kwd>
<kwd>home care monitoring systems</kwd>
<kwd>fall detection</kwd>
<kwd>e-Health</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec sec-type="intro">
<label>1.</label>
<title>Introduction</title>
<sec>
<label>1.1.</label>
<title>Research Background and Motivation</title>
<p>Globally, an aging population provides a good indicator of how health services have progressed in both developed and developing countries. However, to better provide these benefits, a series of challenges must first be met. One extremely important challenge is to train much needed healthcare professionals who specialize in providing care to seniors who often suffer from a variety of chronic diseases associated with aging, and design environments that incorporate wireless technologies and communications systems adapted to the needs of the geriatric community [
<xref rid="b1-sensors-14-07096" ref-type="bibr">1</xref>
]. Projections show that between 2000 and 2050 the number of people above the age of 60 will increase from 11% to 22% worldwide, meaning that persons in this age group will number approximately 2 billion [
<xref rid="b2-sensors-14-07096" ref-type="bibr">2</xref>
].</p>
<p>Aging presents a series of challenges for the entire world population, primarily because seniors slowly lose their ability to be self-sufficient due to chronic diseases, physical and/or mental disabilities, or the general frailty that characterizes the aging process [
<xref rid="b2-sensors-14-07096" ref-type="bibr">2</xref>
]. Any of these conditions represent factors that limit the elderly or endanger their lives, even within the confines of their homes. Consequently, 24-hour-a-day monitoring of the elderly can improve attention provided for chronic or acute health concerns, accidents such as falls, as well as a series of other conditions that can detrimentally affect the elderly. For example, falls represent the second most common cause of death by accident among the aged, making persons over the age of 60 the most vulnerable population group. Additionally, non-fatal falls by the elderly can severely compromise quality of life and/or represent considerable medical expenditures (
<italic>i.e.</italic>
, in Finland $3,611 dollars per injury, in Australia $1,049 dollars per injury) [
<xref rid="b3-sensors-14-07096" ref-type="bibr">3</xref>
].</p>
<p>Providing remote healthcare monitoring and services presents a series of important challenges; therefore, it is important to generate remote monitoring strategies to provide primary healthcare services and mechanisms that allow seniors to receive long-term assistance. To better meet the needs of the aging population, research has significantly advanced both the theory and application of e-Health technologies; largely because their application can reduce costs generated by patient monitoring and provide a variety of advanced services [
<xref rid="b4-sensors-14-07096" ref-type="bibr">4</xref>
]. Importantly, studies show that the elderly generally accept e-Health technologies and consider them beneficial [
<xref rid="b5-sensors-14-07096" ref-type="bibr">5</xref>
].</p>
</sec>
<sec>
<label>1.2.</label>
<title>Research Objective</title>
<p>The main objective of this research was to design, develop and implement a system (WiSPH) in conjunction with IEEE 802.15.4 to detect and alert trained professionals about persons falling to the ground, as well as event-based monitoring to report tachycardia and bradycardia [
<xref rid="b3-sensors-14-07096" ref-type="bibr">3</xref>
]. The objectives of this work include:
<list list-type="order">
<list-item>
<p>developing a fall detection algorithm to handle data transmitted from an accelerometer;</p>
</list-item>
<list-item>
<p>generating an event-based, reliable and scalable network algorithm;</p>
</list-item>
<list-item>
<p>employing a reliable data encryption scheme (AES) for use within the WSN;</p>
</list-item>
<list-item>
<p>creating a domestic WSN infrastructure which allows patients freedom of movement without losing communication;</p>
</list-item>
<list-item>
<p>programming a mobile application and Web page for easy access to live monitoring and information access;</p>
</list-item>
<list-item>
<p>transmitting
<italic>push notifications</italic>
of abnormal events to be relayed to caretakers, doctors or family members.</p>
</list-item>
</list>
</p>
</sec>
</sec>
<sec>
<label>2.</label>
<title>Related Work</title>
<sec>
<label>2.1.</label>
<title>E-Health Applications</title>
<p>E-Health applications are gaining popularity and greater acceptance because of their versatility and reduction of care-taking costs. Nowadays diverse systems and health-centered applications are being developed, which according to their application can be categorized in: daily living activities, fall and movement detection, location tracking, medication intake and medical status monitoring [
<xref rid="b6-sensors-14-07096" ref-type="bibr">6</xref>
]. Applications for daily living activities focus on monitoring the activities of individuals within a predetermined space. One important example of this type of project is
<italic>AICO</italic>
, which utilizes a sophisticated combined Bayesian network that includes the input from a series of environmental parameters that can create an approximation of the activities being carried out by an individual [
<xref rid="b7-sensors-14-07096" ref-type="bibr">7</xref>
]. Another application of this kind is
<italic>Caregiver's Assistant</italic>
, which employs RFID cards and a database that includes 38,000 human activities and a fast inference mechanism that allows persons to identify the actions of others remotely within a given space [
<xref rid="b8-sensors-14-07096" ref-type="bibr">8</xref>
].</p>
<p>Applications that focus on fall and movement detection focus on following user movements and detecting falls. One example of this kind of service is
<italic>Smart HCN</italic>
, which consists of a WSN that monitors the posture of the subject and images taken by cameras to alert a specialist if the subject has suffered an accident [
<xref rid="b9-sensors-14-07096" ref-type="bibr">9</xref>
]. Another example of an application that focuses on fall and movement detection is presented in work done by [
<xref rid="b10-sensors-14-07096" ref-type="bibr">10</xref>
], which uses an accelerometer located at head-height to transmit data that can detect a fall and send a notification to a mobile personal digital assistant.</p>
<p>Location tracking applications are based mainly on the principle of identifying the location of users and analyzing their behavior. One example of this kind of application is presented in work done by [
<xref rid="b11-sensors-14-07096" ref-type="bibr">11</xref>
]. This system employs a WSN to obtain RSSI values, which, through an algorithm, can locate the location of users within their homes.
<italic>ZUPS</italic>
is also an application that centers on location tracking for aged and/or disabled people. This project uses a ZigBee network and ultrasound-positioning systems, which allows caregivers to not only locate individuals within a specified space, but to also provide assistance for persons moving from one place to another beyond the confines of their home [
<xref rid="b12-sensors-14-07096" ref-type="bibr">12</xref>
].</p>
<p>Medication intake applications consist mainly in monitoring the intake of the patient's drugs.
<italic>iCabiNET</italic>
provides a solution that employs a smart medicine manager that can notify patients via SMS or audio alarms at home to remind patients about their medications, as well as dosages and times [
<xref rid="b13-sensors-14-07096" ref-type="bibr">13</xref>
]. Another medication intake application by the name of
<italic>iPackage</italic>
consists of medication wrappers with RFID tags which can be detected by an RFID sensor at the moment of ingestion, allowing caregivers to remotely monitor whether or not a patient is adhering to instructions [
<xref rid="b14-sensors-14-07096" ref-type="bibr">14</xref>
].</p>
<p>Finally, medical status monitoring collects clinical variables (
<italic>i.e.</italic>
, heart rate, glucose monitoring, pulse,
<italic>etc.</italic>
), elaborates a current-state diagnosis of the patient and provides the information to caretakers. If any abnormality is detected, it can be immediately communicated to either family members or caretakers.
<italic>AlarmNet</italic>
is an application that monitors a series of physiological variables, storing the data and processing the information to detect any abnormalities. If an abnormality is found, it notifies a mobile assistant [
<xref rid="b15-sensors-14-07096" ref-type="bibr">15</xref>
].
<italic>Baby Glove</italic>
is an application that monitors vital signs of newborn babies, such as their body temperature. The data is gathered through the baby's romper and then transmitted to a WSN, which constantly supervises important physiological variables and notifies caregivers if there is reading beyond the programmed limits in real time [
<xref rid="b16-sensors-14-07096" ref-type="bibr">16</xref>
].</p>
<p>Although there are many e-Health applications available today, this work focuses on developing a hybrid application that focuses on fall and movement detection and on medical status monitoring in a controlled environment, based on a WSN, to detect falls, tachycardia and bradycardia for the elderly population. To achieve this, this research focused on the use of an accelerometer and a heart rate sensor, connected to a previously developed mobile monitoring node to collect data and send it to the WSN Infrastructure, only when abnormal readings are detected.</p>
</sec>
<sec>
<label>2.2.</label>
<title>E-Health Platforms</title>
<p>E-Health applications can have different classifications, depending on their specific objective (fall detection, activity monitoring, localization,
<italic>etc.</italic>
). Several authors [
<xref rid="b17-sensors-14-07096" ref-type="bibr">17</xref>
,
<xref rid="b18-sensors-14-07096" ref-type="bibr">18</xref>
] have identified a series of requirements for healthcare applications that are based on wireless technologies, including:
<list list-type="order">
<list-item>
<p>Reliability: the transmission of precise data, which involves preventing the duplication of information, by implementing an efficient Quality of Service (QoS) which insures a high Packet Delivery Ratio (PDR) and reduces the Packet Loss Rate (PLR).</p>
</list-item>
<list-item>
<p>Energetic efficiency: the development or use of an energy-saving algorithm or technology to reduce the consumption of energy in devices, because this helps extend the life span of the network.</p>
</list-item>
<list-item>
<p>Data routing: the use of an efficient communication protocol that provides scalability, failure tolerance and best possible route selection, among others.</p>
</list-item>
<list-item>
<p>Node mobility: the ability of free moving wireless nodes to move within an indoor area, always maintaining optimum connectivity.</p>
</list-item>
<list-item>
<p>Security: the use of efficient security mechanisms to protect the data and privacy of highly sensible patient information, including its robbery or corruption.</p>
</list-item>
</list>
</p>
<p>Taking into account the proposed requirements for the development of a robust e-Health,
<xref rid="t1-sensors-14-07096" ref-type="table">Table 1</xref>
shows a comparative among the developed systems and platforms. Considering the requirements an e-Health solution, and taking into account the characteristics already existing platforms, our workgroup selected WiSe [
<xref rid="b19-sensors-14-07096" ref-type="bibr">19</xref>
] (primarily because of its low energy consumption) with the goal of developing a robust, reliable system that integrates the best characteristics of the platforms/systems depicted in
<xref rid="t1-sensors-14-07096" ref-type="table">Table 1</xref>
.</p>
</sec>
</sec>
<sec>
<label>3.</label>
<title>Proposal Architecture</title>
<p>This section describes the proposed network architecture.
<xref rid="f1-sensors-14-07096" ref-type="fig">Figure 1</xref>
illustrates the general system. The proposed system architecture consists of: (a) Mobile monitoring node; (b) WSN Infrastructure; (c) SINK; (d) Remote monitoring and alert interfaces.</p>
<sec>
<label>3.1.</label>
<title>Architecture</title>
<p>The mobile monitoring node receives, processes and forwards the data pertaining to tachycardia, bradycardia and falls throughout the networks. The WSN Infrastructure consists of a group of nodes placed throughout the home. These nodes are capable of establishing a hierarchical network, receiving information from the mobile nodes and routing the information to a computer with reduced computational capabilities and an 802.15.4 radio. The SINK is a computational device that picks up and stores the information it receives from the WSN infrastructure, permitting either local or remote access to the data. Finally, the Remote Monitoring and Alert Interface is an application to serve mobile devices and a standard website, both of which can receive notifications of important events and consult the patient's history and other personal information.</p>
</sec>
<sec>
<label>3.2.</label>
<title>Mobile Monitoring Node</title>
<p>The mobile monitoring node consists of an LCP2148 ARM7 micro controller, a radio that is 802.15.4 compatible and a radio that is 802.15.1 compatible, an energy module and a pair of sensors (accelerometer and heart rate sensor). The node is programmed to constantly monitor the values of the heart rate sensor and the accelerometer to detect abnormal values which could indicate an event that may compromise the user's safety.
<xref rid="f2-sensors-14-07096" ref-type="fig">Figure 2</xref>
illustrates the Mobile Monitoring Node.</p>
<p>The triple axis accelerometer contained in the mobile device is used to detect rapid accelerations. These sensors are normally fabricated with small margins of error, which can be compensated for by means of software [
<xref rid="b25-sensors-14-07096" ref-type="bibr">25</xref>
]. To calibrate each axis of the accelerometer, it is necessary to apply a different compensation value (offset) for each axis, (
<italic>a
<sub>x</sub>
</italic>
= 1 g,
<italic>a
<sub>y</sub>
</italic>
= 0 g,
<italic>a
<sub>z</sub>
</italic>
= 0 g), (
<italic>a
<sub>x</sub>
</italic>
= 0 g,
<italic>a
<sub>y</sub>
</italic>
= 1 g,
<italic>a
<sub>z</sub>
</italic>
= 0 g), (
<italic>a
<sub>x</sub>
</italic>
= 0 g,
<italic>a
<sub>y</sub>
</italic>
= 0 g,
<italic>a
<sub>z</sub>
</italic>
= 1 g). In order to deliver these samples, the micro-controller's Analogical to Digital Converter (ADC) is configured to 4.5 MHz with a 10-bit resolution, which obtains the 3 axes at a 10 ms frequency and stores them. In order to calculate the offset, the X, Y and Z-axes were fixed at 0 g. The value of the ADC in the Y-axis when the acceleration is equal to 0 g is 505; the value of the ADC in the X-axis when the value is 0 g is of 510; the value of the ADC in the Z-axis with a 0 g acceleration is 515. Consequently, the three-axes of the accelerometer and the ADC values of each axis can be adjusted using the following formulas.</p>
<p>The calibration formula for the Y-axis is:
<disp-formula id="FD1">
<label>(1)</label>
<mml:math id="mm1">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>y</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>y</mml:mi>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:mn>3.3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1024</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo></mml:mo>
<mml:mn>1.63</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0.33</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>The calibration formula for the X-axis is:
<disp-formula id="FD2">
<label>(2)</label>
<mml:math id="mm2">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:mn>3.3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1024</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo></mml:mo>
<mml:mn>1.64</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0.33</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>The calibration formula for the Z-axis is:
<disp-formula id="FD3">
<label>(3)</label>
<mml:math id="mm3">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>z</mml:mi>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>z</mml:mi>
</mml:msub>
<mml:mo>×</mml:mo>
<mml:mn>3.3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1024</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo></mml:mo>
<mml:mn>1.65</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0.33</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>The Signal Magnitude Vector (SMV) was calculated to detect a possible fall, which, according to [
<xref rid="b26-sensors-14-07096" ref-type="bibr">26</xref>
], is SMV > 1.8 g.</p>
<p>The formula to calculate the SMV is:
<disp-formula id="FD4">
<label>(4)</label>
<mml:math id="mm4">
<mml:mrow>
<mml:mtext mathvariant="italic">SMV</mml:mtext>
<mml:mo>=</mml:mo>
<mml:msqrt>
<mml:mrow>
<mml:msubsup>
<mml:mi>a</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:msubsup>
<mml:mi>a</mml:mi>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:msubsup>
<mml:mi>a</mml:mi>
<mml:mi>z</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>Once a possible fall has been detected, the PNR algorithm determines if a fall has actually occurred. The PNR algorithm is shown in
<xref rid="f3-sensors-14-07096" ref-type="fig">Figure 3</xref>
. The PNR algorithm activates when the SMV readings average 1 g to determine if the individual is on the floor and hurt due to an accident before it transmits a distress signal. Wang's algorithm, [
<xref rid="b10-sensors-14-07096" ref-type="bibr">10</xref>
] which was used to validate falls, uses a sample rate of 60 SMV entries and compares each incoming entry with the 59 preceding samples. If the product of these samples is not above or the same as 0.13 g, a value that is easily surpassed if the user stands up or walks normally, an alert will be sent to the network.</p>
<p>To detect abnormalities in the user's heart rate, a monitoring threshold was established based on beats per minute (BPM) measurements. One common heart rate abnormality is bradycardia, which is lower than 60 BPM for individuals at rest, although this condition may vary with age and daily habits of the individual. Older people, in particular, have bradycardia if their value drops below 50 BPM because the heart weakens and the heartbeat slows as persons age [
<xref rid="b27-sensors-14-07096" ref-type="bibr">27</xref>
].</p>
<p>Another common heart beat abnormality is tachycardia. Adults with tachycardia have over 100 BPM [
<xref rid="b28-sensors-14-07096" ref-type="bibr">28</xref>
]. As with bradycardia, a series of habits and age influence the values; however, these factors do not require in-depth study. Based on other research, the acceptable limits for tachycardia and bradycardia were set at 100 BPM and 60 BPM, respectively. Any values above or below the established limits would activate the alarm.</p>
</sec>
<sec>
<label>3.3.</label>
<title>WSN Infrastructure</title>
<p>The network used for the detection and transmission of data was developed using WiSe nodes; therefore, the nodes have a low energy consumption rate [
<xref rid="b19-sensors-14-07096" ref-type="bibr">19</xref>
]. Low energy consumption is a very important consideration because the network life, integrity and security for health applications requires exceptional reliability [
<xref rid="b17-sensors-14-07096" ref-type="bibr">17</xref>
].For these reasons, the WSN infrastructure employs a 128-bit AES encryption algorithm to protect network integrity and security, ensuring that the information is not intercepted by nodes that do not belong to the network [
<xref rid="b29-sensors-14-07096" ref-type="bibr">29</xref>
].</p>
<p>A hybrid routing protocol that is dynamic, scalable, destination-centered, with a hierarchical structure was developed for the network. The system is based on IEEE 802.15.4, which contemplates the use of mobile nodes that form the network infrastructure. The infrastructure nodes handle the Received Signal Strength Indication (RSSI) to proactively create the network and can serve as: Cluster Head (CH), End Devices (ED) and SINK. On the other hand, the mobile node only sends data when an event occurs (either and increased or decreased heart rate, or a fall). Therefore, the information is sent to a single network node that immediately reacts to the alert and finds the event destination. To cover this and other functions, the proposed routing algorithm uses a series of network packets which are described in
<xref rid="t2-sensors-14-07096" ref-type="table">Table 2</xref>
.</p>
<p>To create the network's structure, the nodes begin in an undefined state, except for the SINK. Each node periodically sends HELLO packets to localize any possible neighboring nodes. The HELLO packets are then broadcast and received by all of the immediate neighbors and is not retransmitted, this to prevent network flooding. Once the undefined nodes receive an answer (HACK packet) from a defined structure node (CH, ED or SINK), it will change its status (ED) and will stop transmitting the HELLO packets; then it will select the best link based on the Received Signal Strength Indication (RSSI). The functions of the nodes (ED) are to send DATA packets from a mobile node to its respective (CH) and reply to the HELLO packets received from undefined nodes. When a node (ED) is connected to another infrastructure node, it creates and stores its new neighbor in a routing table; afterwards, it assumes the role (CH). The (CH) then routes the information received from the (ED and mobile nodes), maintaining the network nodes connected and replying to HELLO packets to the undefined infrastructure nodes. On the other hand, mobile nodes are already defined before joining the network. The primary purpose of a mobile node is to monitor user variables, discover the destination of the information monitored for each event and send DATA packets to the network.</p>
<p>The routing of DATA packets is carried out by a hybrid mechanism. A mobile node must first reactively identify its destination by broadcasting a TOKEN packet. Only upon receiving a (TACK) unicast reply from a network node will the mobile node send a return DATA package. Importantly, the DATA routing in infrastructure nodes is proactive because each node knows its route by default because the information is kept and actualized in its routing table.
<xref rid="f4-sensors-14-07096" ref-type="fig">Figure 4</xref>
illustrates the proposed routing protocol for WSN.</p>
</sec>
<sec>
<label>3.4.</label>
<title>SINK</title>
<p>The SINK is comprised of electronic devices that have a greater processing capacity than the rest of the devices of the WSN Infrastructure, because it is where all the information compiled by the WSN is sent [
<xref rid="b30-sensors-14-07096" ref-type="bibr">30</xref>
]. The SINK not only collects data, but communicates it through the Internet to the application that controls the database. The behavior of the data collector is shown in
<xref rid="f5-sensors-14-07096" ref-type="fig">Figure 5</xref>
. The behavior of the SINK is completely reactive as it waits for the arrival of any packet to be processed. When a new package is received, the type of packet must be analyzed. If it is a HELLO packet, the SINK creates a reply HACK packet, which contains information about the packet type, its origin (SINK ID), its destination (obtained from the transmitting node) and its role (role of the SINK). If the SINK receives a TOKEN packet, it sends a TACK packet to the transmitting node. If the SINK receives a DATA packet, it analyzes and classifies the packet content in order to store it in its database.</p>
</sec>
<sec>
<label>3.5.</label>
<title>Remote Monitoring and Alert Interface</title>
<p>The web monitoring system consists of a front-end application which continually analyses every new entry sent to the database server. The system, in real time, can show a user's heart rate, possible and real falls, and can interpret the information and send notifications to caretakers in case of emergency.
<xref rid="f6-sensors-14-07096" ref-type="fig">Figure 6</xref>
illustrates the interface functions.</p>
<p>The monitoring system functions reactively because it must first analyze the status of the database before it determines if the entry it is receiving is new. If the system does not detect any changes, an inactivity counter initializes and will compare the counter's reported values with previously set limits for inactivity. If the inactivity counter reports data that are below the established limit, it reinitializes. Importantly, if the inactivity counter reports are equal to the already established values, the system sends an alert message to the user to report a possible network error, because the system is not receiving new entries. In this way, the user can more easily determine if any problem exists. If the entry is new, the counter will automatically reset the counter and identify all the information to be displayed on the mobile or web interface.</p>
<p>Besides the alerts mentioned previously, the system also sends alerts relative to situations that may place the user's physical integrity, making it possible to notify those who are concerned for the patient's wellbeing about a potential fall or a bradycardia or tachycardia event. The alerts are generated upon analyzing any new entries received and recorded in the database. After receiving a new entry, the application analyzes it and validates the type of registry (fall or heart rate). Upon determining the type of registry, the alert counter resets, activating the alert mode and displaying the existing alert on the mobile device or Web page. After resetting, if there are no new entries registered in the database, the alert counter increases. Once the counter increases, the application compares the alert counter with the pre-established counter limits. If the entries surpass the alert counter limits, the alert mode is deactivated. This is an important safety measure as it prevents repeated and unnecessary alerts, or prolonged periods of system alerts.</p>
</sec>
</sec>
<sec>
<label>4.</label>
<title>Proof of Concept</title>
<p>As a proof of concept for the proposed architecture, five WiSe nodes and one Mobile Node were deployed in a 14 m × 20 m home, in order to mount a WSN infrastructure and ensure coverage throughout the entire home. A 128-bit AES encrypting mechanism was also used to secure all data transmitted throughout the network.</p>
<p>A total of 40 falls were carried out to validate the fall detection algorithm. The 40 falls were equally represented by 10 falls backwards, 10 falls forward, 10 falls to each side (five falls to the left and five falls to the right) and 10 falls to the knees, as shown in
<xref rid="f7-sensors-14-07096" ref-type="fig">Figure 7</xref>
.</p>
<p>A mobile node was programed to send the events (DATA) to the WSN. The monitored data sent to the WSN was also sent to a second computer possessing graph processing software every 500 ms or upon occurrence of an event, which came first. This was done in order to validate the data actually received with the values of the proposed algorithm. To validate the established values for heart rates, 10 stress-related tests were conducted, all of which generated events that were sent throughout the network and stored in the monitoring and alert interface.
<xref rid="f8-sensors-14-07096" ref-type="fig">Figure 8</xref>
presents the scenario in which the test was performed.</p>
</sec>
<sec sec-type="results">
<label>5.</label>
<title>Results</title>
<p>This section provides the results of the proof of concept for the WiSPH system, which included:
<list list-type="simple">
<list-item>
<label>(a)</label>
<p>the PNR algorithm's ability to detect falls;</p>
</list-item>
<list-item>
<label>(b)</label>
<p>the software's ability to detect abnormal heart rates;</p>
</list-item>
<list-item>
<label>(c)</label>
<p>network metric results (RSSI, packet loss and hops).</p>
</list-item>
</list>
</p>
<sec>
<label>5.1.</label>
<title>Results of the PNR Algorithm for Fall Detection</title>
<p>Data was transmitted throughout the network and to monitoring software after each event. However, the mobile node only relayed the values provided by the accelerometer to the monitoring software every 500 ms.
<xref rid="f9-sensors-14-07096" ref-type="fig">Figure 9</xref>
provides the results obtained from the 40 falls, where the four types of falls (the two types of side falls were categorized as one) captured by the monitoring software are shown. The monitoring software was reset for each kind of fall to assure more precise data. The tests reveal that the mobile node transmitted a total of 1,446 entries for the four types of falls to the monitoring software, which were then processed, analyzed and graphed. The black line in the graph reveals that the SMV remains lower than 1.8 g for normal everyday activities (walking, standing, standing up, sitting down,
<italic>etc.</italic>
). However, when the user falls, the line rises to levels above 1.8 g, which causes the mobile to alert both the network and the monitoring software of a possible fall. After the simulated fall, subjects remained immobile on the ground, simulating being hurt. This was reported by the high peak of the black line in the graph. Significantly, when the black line does not exceed 0.13 g between entries for more than 30 s the mobile device sends a critical fall alert to both the network and the monitoring software.</p>
<p>In total, 56 possible falls and 41 critical falls were detected in the four tests, meaning that a total of 97 events were created. These events were then relayed across the network to the fall detection software. Only one false alarm occurred, which means that the PNR algorithm identified falls within the margin of error of 2.5%.
<xref rid="t3-sensors-14-07096" ref-type="table">Table 3</xref>
shows the generated DATA packets by falls.</p>
<p>For each possible fall, alerts were generated and delivered to the caregivers by means of the application we developed for mobile devices, via push notifications.
<xref rid="f10-sensors-14-07096" ref-type="fig">Figure 10</xref>
illustrates the mobile device interface.</p>
</sec>
<sec>
<label>5.2.</label>
<title>Results from the Detection of Abnormalities in Heart Rate</title>
<p>As was previously mentioned in Section 3.2, [
<xref rid="b27-sensors-14-07096" ref-type="bibr">27</xref>
] and [
<xref rid="b28-sensors-14-07096" ref-type="bibr">28</xref>
] established a monitoring threshold to detect heart rate abnormalities (bradycardia and tachycardia). They established a minimum value of 60 BPM and maximum value of 100 BPM. Based on the abovementioned criteria, we programmed the mobile node to set off an event alarm if it received a value above 100 BPM or 60 BPM, respectively.</p>
<p>Subjects participating in the study were asked to totally relax in order to lower their BPM, establish baselines and to try to activate the alarm. The subjects registered no readings below 60 BMP under normal relaxed circumstances. Unlike, we were able to validate the 100 BPM criteria by having each subject exercise on an elliptical treadmill for 10, 3-minute periods. This permitted the subjects' heart rates to surpass the 100 BPM value, which was consistently achieves as was predicted. Importantly, each time the subjects' heart rates exceeded the 100 BPM limit, the events were transmitted to the network and received by the SINK. The data were then uploaded by the web application to the interface shown in
<xref rid="f11-sensors-14-07096" ref-type="fig">Figure 11</xref>
.</p>
<p>All heart rate event alerts reach the mobile by means of push notifications. These push notifications are then handled by the software application to be visualized.
<xref rid="f12-sensors-14-07096" ref-type="fig">Figure 12</xref>
shows the alert notification as viewed on a mobile device.</p>
<p>The results reported in Sections 5.1 and 5.2 involving patient monitoring were carried out under the supervision of the head of the geriatric department of the Institute of Safety and Social Services for State Workers (ISSSTE) of the state of Colima, Mexico.</p>
</sec>
<sec>
<label>5.3.</label>
<title>Network Results</title>
<p>As far as the network is concerned, both the mobile device and the WSN employ a 128-bit AES encrypting mechanism. Two tests were performed to validate the safety device. Two tests were performed to validate the safety device. The first test consisted in introducing an unknown node from an outside network, which in contrast with network nodes, does not have its AES encrypting mechanism enabled. The second test consisted in introducing another unknown node that had an AES key enabled, but which did not correspond to the one used by the WSN. In both cases, the external nodes try to capture HELLO packets transmitted within the WSN.
<xref rid="t4-sensors-14-07096" ref-type="table">Table 4</xref>
shows the structure of packets collected by a network node within the WSN. Each packet begins with an identical byte of information. This is then followed by two bytes to indicate the packet length. The next byte defines the frame type which corresponds to the IEEE 802.15.4 standard (0 × 81-R × 16 indicator), followed by 2 bytes for the source address, 1 byte for the RSSI, and 1 byte for the method sent (0 × 00 for unicast, 0 × 02 for broadcast), which, in this case, is broadcast mode. Finally, each packet contains a 2-byte payload and a 1-byte checksum to verify the integrity of the packet.</p>
<p>
<xref rid="f13-sensors-14-07096" ref-type="fig">Figure 13a</xref>
provides the results of the first security test. Results show that HELLO packets generated by a network node (left terminal) cannot be intercepted (right terminal) because the unknown node does not share the same AES mechanism.
<xref rid="f13-sensors-14-07096" ref-type="fig">Figure 13b</xref>
provides results that show that an unknown node can receive HELLO packets, but cannot decipher the 11-byte packets as originally sent because they do not possess the same key. An analysis of the packet received by the right terminal external device shows that the first byte is a packet start character (0 × 7E). The following two bytes provide the packet length (0 × 000F), which in this case is 15 bytes, excluding the start bytes, length and checksum. The next byte indicates the frame type, which corresponds to the IEEE 802.15.4 standard 4 (0 × 80) that defines the MAC address used (64 bits). For this reason, the next 8 bytes of the frame contain the physical address of the source node (0 × 0013A20040905DA6). The next byte of the frame indicates the packet's RSSI (0 × 24). The subsequent byte (0 × 02) whether the packet was transmitted by unicast or broadcast, which in this case was broadcast. The following 4 bytes (0 × A6FB643C) provide the packet payload. Lastly, the final byte provides the checksum (0 × 90). A comparison of the original data with the information acquired by the unknown node shows that it could properly get the starting character of the packet, its RSSI, the broadcast mode and the checksum. However, it could not obtain packet information corresponding to the length, frame type, source address and payload correctly. The unknown node cannot acquire this information because it does not possess the network encryption key. Experimental results show, in sum, that critical information regarding network information cannot be successfully obtained by a node that does not form part of the network.</p>
<p>Once we tested the security of the WSN network, we proceeded to analyze and validate the functioning of the network. As mentioned previously, five infrastructure nodes were installed in the home to form a network which could communicate remotely to a mobile node, employing the routing protocol our team developed.
<xref rid="f14-sensors-14-07096" ref-type="fig">Figure 14</xref>
illustrates the network configuration employed in our proposed network architecture, which employs two Cluster Head devices (ID16 and ID 64), two End Devices (ID 24 and ID 40), a mobile node (ID 32) and a SINK (ID 8).</p>
<p>Once the network is formed, communication between the mobile node and the infrastructure can begin and data can be sent. In this test, a person representing a mobile node moved freely throughout the home to determine the number of hops and RSSI. To do this, data packets were generated and routed to the SINK, as shown in
<xref rid="t5-sensors-14-07096" ref-type="table">Table 5</xref>
.</p>
<p>A total of 50 events (40 different falls and 10 tachycardia events) were simulated under test conditions using healthy subjects. Each even generated packets that possessed a sequence number and an event identifier. Adding these values to the DATA packets allowed us to identifying the totality number of packets that were generated and received. From this data set, it was possible to determent the percentage of lost packets and the number of packets corresponding to each event. Specific information is provided by
<xref rid="t6-sensors-14-07096" ref-type="table">Table 6</xref>
.</p>
<p>According to the information provided by
<xref rid="t6-sensors-14-07096" ref-type="table">Table 6</xref>
, of the 109 DATA packets received, 97 were attributable to fall events, 10 to heart rate events and only two packets were lost, which represents a 1.83% rate of error.</p>
</sec>
</sec>
<sec>
<label>6.</label>
<title>Conclusions and Future Work</title>
<p>This paper has presented a Home Care Monitoring System (WiSPH), which represents a potentially valuable tool to assist caretakers, family members or health care practitioners to monitor the heart rate and potentially dangerous falls of elderly patients who can still live independent, but assisted lifestyles. The proof of concept testing presented in this work permits us to conclude:
<list list-type="bullet">
<list-item>
<p>WiSPH implements a security mechanism (AES) that does not allow nodes from outside the network to decipher data.</p>
</list-item>
<list-item>
<p>The routing algorithm, based on the IEEE 802.15.4 standard, functions efficiently in health applications as only two of the 109 DATA packets that were generated in this study were lost, representing less than a 1.8% of the packets sent.</p>
</list-item>
<list-item>
<p>An efficient algorithm was developed to detect falls which correctly reported 100% of serious falls.</p>
</list-item>
<list-item>
<p>The already established value for tachycardia made it possible to efficiently identify the 10 events that were programmed in this test, resulting in a 100% success rate. In contrast, the value for a low heart rate (bradycardia) could not be validated because subjects could not lower their heart rates below the 70 BPM criteria.</p>
</list-item>
<list-item>
<p>The monitoring function of the network and alert interface worked well in conjunction. Of a total of 109 push notifications, caretakers 100% of the real-time alerts.</p>
</list-item>
</list>
</p>
<p>In sum, WiSPH employs important features from various platforms/systems that have been previously compared in this work. WiSPH implements an effective security mechanism and has relatively low power consumption. Our system combines these two characteristics with an efficient fall detection algorithm and an accurate means to detect established thresholds for bradycardia and tachycardia. WiSPH also possesses the flexibility and scalability to add other sensors because the routing algorithm provides the necessary QoS. The abovementioned characteristics not only permit WiSPH to be used by geriatric patients living at home, but with a wide variety of health care scenarios where mobile monitoring of different physiological variables is necessary. In conclusion, the variety of parameters WiSPH effectively monitors and reports on favorably compares to systems that are presently available in the marketplace.</p>
<p>Future work will include in-depth simulations to validate the system performance, in particular to simulate multiple nodes in different spatial areas to confirm its scalability. These simulations will provide the antecedents before performing large-scale real-world implementation inside a regional hospital. Additionally, subsequent work will include optimizing the PNR algorithm to detect different the severity of falls by means of combining enhanced accelerometer data with the accompanying heart rate changes. Another area of work in the future is to optimize the system to include greater personalization according to a patient's specific physiological variables, including amount of nutrition, age, weight, body fat, triglycerides, cholesterol
<italic>etc.</italic>
Other parameters can include stress test results to set a baseline for elderly patients that can be introduced into the system.</p>
</sec>
</body>
<back>
<ack>
<p>The authors wish to thank all the partners involved with the development of the system, especially to Jorge Landín Delgado for his perspective on the provision of remote health care and Siteldi Solutions (
<ext-link ext-link-type="uri" xlink:href="www.siteldisolutions.mx">www.siteldisolutions.mx</ext-link>
) and financial support from CONACYT, project number 209240.</p>
</ack>
<notes>
<title>Author Contributions</title>
<p>Pedro Magaña Espinoza designed the experiments, and drafted the manuscript. Raúl Aquino Santos provided useful suggestions and edited the draft. Néstor Cárdenas Benítez deployed the WSN Infrastructure. Jose Aguilar Velasco programmed the SINK. César Buenrostro Segura programmed the mobile application. Arthur Edwards Block provided English grammar corrections and edited the draft. Aldo Medina Cass provided English grammar suggestions.</p>
</notes>
<notes>
<title>Conflicts of Interest</title>
<p>The authors declare no conflict of interest.</p>
</notes>
<ref-list>
<title>References</title>
<ref id="b1-sensors-14-07096">
<label>1.</label>
<element-citation publication-type="webpage">
<collab>WHO Website</collab>
<article-title>10 Facts on Ageing and the Life Course</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.who.int/features/factfiles/ageing/es/index.html">http://www.who.int/features/factfiles/ageing/es/index.html</ext-link>
</comment>
<date-in-citation>(accessed on 23 December 2013)</date-in-citation>
</element-citation>
</ref>
<ref id="b2-sensors-14-07096">
<label>2.</label>
<element-citation publication-type="webpage">
<collab>WHO Website</collab>
<article-title>Interesting Facts about Ageing</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.who.int/ageing/about/facts/en/index.html">http://www.who.int/ageing/about/facts/en/index.html</ext-link>
</comment>
<date-in-citation>(accessed on 23 December 2013)</date-in-citation>
</element-citation>
</ref>
<ref id="b3-sensors-14-07096">
<label>3.</label>
<element-citation publication-type="webpage">
<collab>WHO Website</collab>
<article-title>Falls</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.who.int/mediacentre/factsheets/fs344/en/index.html">http://www.who.int/mediacentre/factsheets/fs344/en/index.html</ext-link>
</comment>
<date-in-citation>(accessed on 28 December 2013)</date-in-citation>
</element-citation>
</ref>
<ref id="b4-sensors-14-07096">
<label>4.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Boonyarattaphan</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Sam</surname>
<given-names>C.</given-names>
</name>
</person-group>
<article-title>A security framework for e-health service authentication and e-health data transmission</article-title>
<conf-name>Proceedings of the 9th International Symposium on Communications and Information Technology (ISCIT 2009)</conf-name>
<conf-loc>Incheon, Korea</conf-loc>
<conf-date>28–30 September 2009</conf-date>
<fpage>1213</fpage>
<lpage>1218</lpage>
</element-citation>
</ref>
<ref id="b5-sensors-14-07096">
<label>5.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Tan</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Wei Kiat</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Jamie</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Wong</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Tay</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Helander</surname>
<given-names>M.G.</given-names>
</name>
</person-group>
<article-title>Are working adults ready to accept e-health at home?</article-title>
<conf-name>Proceedings of the 11th International Conference on e-Health Networking, Applications and Services (Healthcom 2009)</conf-name>
<conf-loc>Sidney, Australia</conf-loc>
<conf-date>16–18 December 2009</conf-date>
<fpage>54</fpage>
<lpage>59</lpage>
</element-citation>
</ref>
<ref id="b6-sensors-14-07096">
<label>6.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alemdar</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Ersoy</surname>
<given-names>C.</given-names>
</name>
</person-group>
<article-title>Wireless sensor networks for healthcare: A survey</article-title>
<source>Comput. Netw.</source>
<year>2010</year>
<volume>54</volume>
<fpage>2688</fpage>
<lpage>2710</lpage>
</element-citation>
</ref>
<ref id="b7-sensors-14-07096">
<label>7.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lu</surname>
<given-names>C.-H.</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>L.-C.</given-names>
</name>
</person-group>
<article-title>Robust location-aware activity recognition using wireless sensor network in an attentive home</article-title>
<source>IEEE Trans. Autom. Sci. Eng.</source>
<year>2009</year>
<volume>6</volume>
<fpage>598</fpage>
<lpage>609</lpage>
</element-citation>
</ref>
<ref id="b8-sensors-14-07096">
<label>8.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Philipose</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Consolvo</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Fishkin</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Smith</surname>
<given-names>P.I.</given-names>
</name>
</person-group>
<article-title>Fast, detailed inference of diverse daily human activities</article-title>
<conf-name>Proceedings of the Sixth International Conference on Ubiquitous Computing</conf-name>
<conf-loc>Nottingham, UK</conf-loc>
<conf-date>7–10 September 2004.</conf-date>
</element-citation>
</ref>
<ref id="b9-sensors-14-07096">
<label>9.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Tabar</surname>
<given-names>A.M.</given-names>
</name>
<name>
<surname>Keshavarz</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Aghajan</surname>
<given-names>H.</given-names>
</name>
</person-group>
<article-title>Smart home care network using sensor fusion and distributed vision-based reasoning</article-title>
<conf-name>Proceedings of the 4th ACM International Workshop on Video Surveillance and Sensor Networks</conf-name>
<conf-loc>Santa Barbara, CA, USA</conf-loc>
<conf-date>27 October 2006</conf-date>
<publisher-name>ACM</publisher-name>
<publisher-loc>Santa Barbara, CA, USA</publisher-loc>
<year>2006</year>
<fpage>145</fpage>
<lpage>154</lpage>
</element-citation>
</ref>
<ref id="b10-sensors-14-07096">
<label>10.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>C.-C.</given-names>
</name>
<name>
<surname>Chiang</surname>
<given-names>C.-Y.</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>P.-Y.</given-names>
</name>
<name>
<surname>Chou</surname>
<given-names>Y.-C.</given-names>
</name>
<name>
<surname>Kuo</surname>
<given-names>I.T.</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>C.-N.</given-names>
</name>
<name>
<surname>Chan</surname>
<given-names>C.-T.</given-names>
</name>
</person-group>
<article-title>Development of a fall detecting system for the elderly residents</article-title>
<conf-name>Proceedings of the 2nd International Conference on Bioinformatics and Biomedical Engineering (ICBBE 2008)</conf-name>
<conf-loc>Shanghai, China</conf-loc>
<conf-date>16–18 May 2008</conf-date>
<fpage>1359</fpage>
<lpage>1362</lpage>
</element-citation>
</ref>
<ref id="b11-sensors-14-07096">
<label>11.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Gidlund</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Nohr</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>An experimental study on home-wireless passive positioning</article-title>
<conf-name>Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM'08)</conf-name>
<conf-loc>Cap Esterel, France</conf-loc>
<conf-date>25––31 August 2008</conf-date>
<fpage>223</fpage>
<lpage>228</lpage>
</element-citation>
</ref>
<ref id="b12-sensors-14-07096">
<label>12.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marco</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Casas</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Falco</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Gracia</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Artigas</surname>
<given-names>J.I.</given-names>
</name>
<name>
<surname>Roy</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Location-based services for elderly and disabled people</article-title>
<source>Comput. Commun.</source>
<year>2008</year>
<volume>31</volume>
<fpage>1055</fpage>
<lpage>1066</lpage>
</element-citation>
</ref>
<ref id="b13-sensors-14-07096">
<label>13.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Lopez-Nores</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Pazos-arias</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Garcia-Duque</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Blanco-Fernandez</surname>
<given-names>Y.</given-names>
</name>
</person-group>
<article-title>Monitoring medicine intake in the networked home: The icabinet solution</article-title>
<conf-name>Proceedings of the Second International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008)</conf-name>
<conf-loc>Tampere, Finland</conf-loc>
<conf-date>30 January–1 February 2008</conf-date>
<fpage>116</fpage>
<lpage>117</lpage>
</element-citation>
</ref>
<ref id="b14-sensors-14-07096">
<label>14.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Pang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>L.</given-names>
</name>
</person-group>
<article-title>A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring</article-title>
<conf-name>Proceedings of the 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2009)</conf-name>
<conf-loc>Bratislava, Slovakia</conf-loc>
<conf-date>24–27 November 2009</conf-date>
<fpage>1</fpage>
<lpage>6</lpage>
</element-citation>
</ref>
<ref id="b15-sensors-14-07096">
<label>15.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wood</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Stankovic</surname>
<given-names>J.A.</given-names>
</name>
<name>
<surname>Virone</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Selavo</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Thao</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Fang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Stoleru</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Context-aware wireless sensor networks for assisted living and residential monitoring</article-title>
<source>IEEE Netw.</source>
<year>2008</year>
<volume>22</volume>
<fpage>26</fpage>
<lpage>33</lpage>
</element-citation>
</ref>
<ref id="b16-sensors-14-07096">
<label>16.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Baker</surname>
<given-names>C.R.</given-names>
</name>
<name>
<surname>Armijo</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Belka</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Benhabib</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Bhargava</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Burkhart</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Der Minassians</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Dervisoglu</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Gutnik</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Haick</surname>
<given-names>M.B.</given-names>
</name>
<etal></etal>
</person-group>
<article-title>Wireless sensor networks for home health care</article-title>
<conf-name>Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)</conf-name>
<conf-loc>Ontario, ON, Canada</conf-loc>
<conf-date>21–23 May 2007</conf-date>
<fpage>832</fpage>
<lpage>837</lpage>
</element-citation>
</ref>
<ref id="b17-sensors-14-07096">
<label>17.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jiménez</surname>
<given-names>V.P.G.</given-names>
</name>
<name>
<surname>Armada</surname>
<given-names>A.G.</given-names>
</name>
</person-group>
<article-title>Field measurements and guidelines for the application of wireless sensor networks to the environment and security</article-title>
<source>Sensors</source>
<year>2009</year>
<volume>9</volume>
<fpage>10309</fpage>
<lpage>10325</lpage>
<pub-id pub-id-type="pmid">22303175</pub-id>
</element-citation>
</ref>
<ref id="b18-sensors-14-07096">
<label>18.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Egbogah</surname>
<given-names>E.E.</given-names>
</name>
<name>
<surname>Fapojuwo</surname>
<given-names>A.O.</given-names>
</name>
</person-group>
<article-title>A survey of system architecture requirements for health care-based wireless sensor networks</article-title>
<source>Sensors</source>
<year>2011</year>
<volume>11</volume>
<fpage>4875</fpage>
<lpage>4898</lpage>
<pub-id pub-id-type="pmid">22163881</pub-id>
</element-citation>
</ref>
<ref id="b19-sensors-14-07096">
<label>19.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>González</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Aquino</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Mata</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Ochoa</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Saldaña</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Edwards</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Open-wise: A solar powered wireless sensor network platform</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>8204</fpage>
<lpage>8217</lpage>
<pub-id pub-id-type="pmid">22969396</pub-id>
</element-citation>
</ref>
<ref id="b20-sensors-14-07096">
<label>20.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Malan</surname>
<given-names>D.</given-names>
</name>
</person-group>
<article-title>Codeblue: An
<italic>ad hoc</italic>
sensor network infrastructure for emergency medical care</article-title>
<conf-name>Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES 2004)</conf-name>
<conf-loc>Boston, MA, USA</conf-loc>
<conf-date>6 June 2004</conf-date>
</element-citation>
</ref>
<ref id="b21-sensors-14-07096">
<label>21.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ko</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Lim</surname>
<given-names>J.H.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Rvăzvan Musvaloiu-E</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Terzis</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Masson</surname>
<given-names>G.M.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Destler</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Selavo</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Dutton</surname>
<given-names>R.P.</given-names>
</name>
</person-group>
<article-title>Medisn: Medical emergency detection in sensor networks</article-title>
<source>ACM Trans. Embed. Comput. Syst.</source>
<year>2010</year>
<volume>10</volume>
<fpage>1</fpage>
<lpage>29</lpage>
</element-citation>
</ref>
<ref id="b22-sensors-14-07096">
<label>22.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Celentano</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>Y.</given-names>
</name>
</person-group>
<article-title>Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining</article-title>
<source>Ad Hoc Netw.</source>
<year>2008</year>
<volume>6</volume>
<fpage>986</fpage>
<lpage>1012</lpage>
</element-citation>
</ref>
<ref id="b23-sensors-14-07096">
<label>23.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mitra</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Emken</surname>
<given-names>B.A.</given-names>
</name>
<name>
<surname>Sangwon</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Ming</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Rozgic</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Thatte</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Vathsangam</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zois</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Annavaram</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Narayanan</surname>
<given-names>S.</given-names>
</name>
<etal></etal>
</person-group>
<article-title>Knowme: A case study in wireless body area sensor network design</article-title>
<source>IEEE Commun. Mag.</source>
<year>2012</year>
<volume>50</volume>
<fpage>116</fpage>
<lpage>125</lpage>
</element-citation>
</ref>
<ref id="b24-sensors-14-07096">
<label>24.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Custodio</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Herrera</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>López</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Moreno</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>A review on architectures and communications technologies for wearable health-monitoring systems</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>13907</fpage>
<lpage>13946</lpage>
<pub-id pub-id-type="pmid">23202028</pub-id>
</element-citation>
</ref>
<ref id="b25-sensors-14-07096">
<label>25.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tarng</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>C.-H.</given-names>
</name>
<name>
<surname>Liou</surname>
<given-names>H.-H.</given-names>
</name>
</person-group>
<article-title>Applications do wireless sensor networks in fall detection for senior people</article-title>
<source>Int. J. Comput. Sci. Inf. Technol.</source>
<year>2012</year>
<volume>4</volume>
<fpage>79</fpage>
<lpage>95</lpage>
</element-citation>
</ref>
<ref id="b26-sensors-14-07096">
<label>26.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Karantonis</surname>
<given-names>D.M.</given-names>
</name>
<name>
<surname>Narayanan</surname>
<given-names>M.R.</given-names>
</name>
<name>
<surname>Mathie</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Lovell</surname>
<given-names>N.H.</given-names>
</name>
<name>
<surname>Celler</surname>
<given-names>B.G.</given-names>
</name>
</person-group>
<article-title>Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring</article-title>
<source>IEEE Trans. Inf. Technol. Biomed.</source>
<year>2006</year>
<volume>10</volume>
<fpage>156</fpage>
<lpage>167</lpage>
<pub-id pub-id-type="pmid">16445260</pub-id>
</element-citation>
</ref>
<ref id="b27-sensors-14-07096">
<label>27.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Agruss</surname>
<given-names>N.S.</given-names>
</name>
<name>
<surname>Rosin</surname>
<given-names>E.Y.</given-names>
</name>
<name>
<surname>Adolph</surname>
<given-names>R.J.</given-names>
</name>
<name>
<surname>Fowler</surname>
<given-names>N.O.</given-names>
</name>
</person-group>
<article-title>Significance of chronic sinus bradycardia in elderly people</article-title>
<source>Circulation</source>
<year>1972</year>
<volume>46</volume>
<fpage>924</fpage>
<lpage>930</lpage>
<pub-id pub-id-type="pmid">5081144</pub-id>
</element-citation>
</ref>
<ref id="b28-sensors-14-07096">
<label>28.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Budzikowski</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Cho</surname>
<given-names>C.</given-names>
</name>
</person-group>
<article-title>Atrial Tachycardia</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://emedicine.medscape.com/article/151456-overview">http://emedicine.medscape.com/article/151456-overview</ext-link>
</comment>
<date-in-citation>(accessed on 4 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b29-sensors-14-07096">
<label>29.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>H.-J.</given-names>
</name>
</person-group>
<article-title>Security issues in healthcare applications using wireless medical sensor networks: A survey</article-title>
<source>Sensors</source>
<year>2011</year>
<volume>12</volume>
<fpage>55</fpage>
<lpage>91</lpage>
<pub-id pub-id-type="pmid">22368458</pub-id>
</element-citation>
</ref>
<ref id="b30-sensors-14-07096">
<label>30.</label>
<element-citation publication-type="webpage">
<article-title>Raspberry Pi</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.raspberrypi.org/">http://www.raspberrypi.org/</ext-link>
</comment>
<date-in-citation>(accessed on 3 March 2014)</date-in-citation>
</element-citation>
</ref>
</ref-list>
</back>
<floats-group>
<fig id="f1-sensors-14-07096" position="float">
<label>Figure 1.</label>
<caption>
<p>The proposed system architecture.</p>
</caption>
<graphic xlink:href="sensors-14-07096f1"></graphic>
</fig>
<fig id="f2-sensors-14-07096" position="float">
<label>Figure 2.</label>
<caption>
<p>Block diagram of the Mobile Monitoring Node.</p>
</caption>
<graphic xlink:href="sensors-14-07096f2"></graphic>
</fig>
<fig id="f3-sensors-14-07096" position="float">
<label>Figure 3.</label>
<caption>
<p>(
<bold>a</bold>
) Fall detection algorithm (part 1); (
<bold>b</bold>
) Fall detection algorithm (part 2).</p>
</caption>
<graphic xlink:href="sensors-14-07096f3"></graphic>
</fig>
<fig id="f4-sensors-14-07096" position="float">
<label>Figure 4.</label>
<caption>
<p>(
<bold>a</bold>
) Routing Algorithm (part 1); (
<bold>b</bold>
) Routing Algorithm (part 2).</p>
</caption>
<graphic xlink:href="sensors-14-07096f4a"></graphic>
<graphic xlink:href="sensors-14-07096f4b"></graphic>
</fig>
<fig id="f5-sensors-14-07096" position="float">
<label>Figure 5.</label>
<caption>
<p>SINK processing algorithm.</p>
</caption>
<graphic xlink:href="sensors-14-07096f5"></graphic>
</fig>
<fig id="f6-sensors-14-07096" position="float">
<label>Figure 6.</label>
<caption>
<p>Web interface and alerts flow chart.</p>
</caption>
<graphic xlink:href="sensors-14-07096f6"></graphic>
</fig>
<fig id="f7-sensors-14-07096" position="float">
<label>Figure 7.</label>
<caption>
<p>Fall tests.</p>
</caption>
<graphic xlink:href="sensors-14-07096f7"></graphic>
</fig>
<fig id="f8-sensors-14-07096" position="float">
<label>Figure 8.</label>
<caption>
<p>Proof of concept scenario.</p>
</caption>
<graphic xlink:href="sensors-14-07096f8"></graphic>
</fig>
<fig id="f9-sensors-14-07096" position="float">
<label>Figure 9.</label>
<caption>
<p>(
<bold>a</bold>
) Results from backwards falls; (
<bold>b</bold>
) Results from side falls; (
<bold>c</bold>
) Results from forward falls; (
<bold>d</bold>
) Results from knee falls.</p>
</caption>
<graphic xlink:href="sensors-14-07096f9a"></graphic>
<graphic xlink:href="sensors-14-07096f9b"></graphic>
</fig>
<fig id="f10-sensors-14-07096" position="float">
<label>Figure 10.</label>
<caption>
<p>Push notifications from the generated events.</p>
</caption>
<graphic xlink:href="sensors-14-07096f10"></graphic>
</fig>
<fig id="f11-sensors-14-07096" position="float">
<label>Figure 11.</label>
<caption>
<p>Web System Alert Interface.</p>
</caption>
<graphic xlink:href="sensors-14-07096f11"></graphic>
</fig>
<fig id="f12-sensors-14-07096" position="float">
<label>Figure 12.</label>
<caption>
<p>Push notification generated for the heart rate event.</p>
</caption>
<graphic xlink:href="sensors-14-07096f12"></graphic>
</fig>
<fig id="f13-sensors-14-07096" position="float">
<label>Figure 13.</label>
<caption>
<p>(
<bold>a</bold>
) Security Test 1; (
<bold>b</bold>
) Security Test 2.</p>
</caption>
<graphic xlink:href="sensors-14-07096f13"></graphic>
</fig>
<fig id="f14-sensors-14-07096" position="float">
<label>Figure 14.</label>
<caption>
<p>Created network.</p>
</caption>
<graphic xlink:href="sensors-14-07096f14"></graphic>
</fig>
<table-wrap id="t1-sensors-14-07096" position="float">
<label>Table 1.</label>
<caption>
<p>E-Health Platform Comparison.</p>
</caption>
<table frame="box" rules="all">
<thead>
<tr>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Platforms/Requirements</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Code Blue [
<xref rid="b20-sensors-14-07096" ref-type="bibr">20</xref>
]</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>MEDiSN [
<xref rid="b21-sensors-14-07096" ref-type="bibr">21</xref>
]</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>MASN [
<xref rid="b22-sensors-14-07096" ref-type="bibr">22</xref>
]</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>KNOWME [
<xref rid="b23-sensors-14-07096" ref-type="bibr">23</xref>
]</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>LOBIN [
<xref rid="b24-sensors-14-07096" ref-type="bibr">24</xref>
]</bold>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Reliability Mechanism</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">None (Unreliable Multicast)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Two-Tier Architecture with Dedicated Wireless Backbone and Optimized Rate Control Protocols</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Dynamic Reliability Adaptation Scheme</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Multithreading collector</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Packet Loss Rate tolerance 2%</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Scheme for Energy Efficiency</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Not Provided</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Division of functionality between acquiring and relaying data</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Energy-aware cluster formation using energy level determination of sensor nodes</td>
<td align="center" valign="middle" rowspan="1" colspan="1">A combination of data buffering, adaptive sensor throttling, and dynamic selection of data transmission methods</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Assumes the loss of a small percentage of packets and compensates bandwidth restrictions of the IEEE 802.15.4 technology with a careful design of several communication protocols</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Routing Methodology</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Multicast and multi-hop routing</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Many-to-one and one-to-one communication</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Intra-Cluster and Inter-Cluster Data Relay</td>
<td align="center" valign="middle" rowspan="1" colspan="1">None. Star topology</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Dynamic Source Routing</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Techniques for Mobility Support</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Periodic Flooding for Route Discovery</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Physiological monitors, periodically select the best relay point to forward their data</td>
<td align="center" valign="middle" rowspan="1" colspan="1">None. Does not support real-time data collection under mobility conditions</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Nokia N95 capabilities on LAN/MAN (WiFi, 3G, EDGE)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Wireless Communications Infrastructure Subsystem</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Data Security</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Not Provided</td>
<td align="center" valign="middle" rowspan="1" colspan="1">128-bits AES encryption</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Only the source/destination can decipher the medical data through crypto-keys</td>
<td align="center" valign="middle" rowspan="1" colspan="1">End-to-end encryption</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Not Specified</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Supported Application</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Medical Care and Disaster Response</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Emergency Detection</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Real-time collection of ECG Data</td>
<td align="center" valign="middle" rowspan="1" colspan="1">General monitoring</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Real-time collection And Emergency Detection</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">
<bold>Sensor Scalability</bold>
</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Not Specified</td>
<td align="center" valign="middle" rowspan="1" colspan="1">supports motes with different sensor suites</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Yes, it can increase the number of sensors (Does not Specify which)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Not Specified</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Not Specified</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="t2-sensors-14-07096" position="float">
<label>Table 2.</label>
<caption>
<p>Packets generated by the routing protocol.</p>
</caption>
<table frame="hsides" rules="rows">
<thead>
<tr>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Type of Packet</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Length (Bytes)</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Description</bold>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">HELLO</td>
<td align="center" valign="middle" rowspan="1" colspan="1">11</td>
<td align="left" valign="middle" rowspan="1" colspan="1">The packet code is 0 × 48. The HELLO packet discovers the network.</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">HACK</td>
<td align="center" valign="middle" rowspan="1" colspan="1">11</td>
<td align="left" valign="middle" rowspan="1" colspan="1">The packet code is 0 × 58. The HACK packet confirms reception of the HELLO packet.</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">TOKEN</td>
<td align="center" valign="middle" rowspan="1" colspan="1">11</td>
<td align="left" valign="middle" rowspan="1" colspan="1">The packet code is 0 × 54. The TOKEN packet explores the network before sending a DATA packet.</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">TACK</td>
<td align="center" valign="middle" rowspan="1" colspan="1">11</td>
<td align="left" valign="middle" rowspan="1" colspan="1">The packet code is 0 × 4 B. The TACK packet confirms that the TOKEN packet was received.</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">DATA</td>
<td align="center" valign="middle" rowspan="1" colspan="1">19</td>
<td align="left" valign="middle" rowspan="1" colspan="1">The packet's code is 0 × 44. The DATA packet contains data about the information's origin, as well as the patient's heart rate, the event code, the number of hops and the packet counter. DATA packets, however, can be adapted to carry even more information.</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="t3-sensors-14-07096" position="float">
<label>Table 3.</label>
<caption>
<p>Generated DATA packets from falls.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Type of Fall</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Total of Programed Falls</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Total of Possible Falls</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Total of Detected Falls</bold>
</th>
<th align="center" valign="middle" rowspan="1" colspan="1">
<bold>Total of False Alarms</bold>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">Back</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">13</td>
<td align="center" valign="top" rowspan="1" colspan="1">11</td>
<td align="center" valign="top" rowspan="1" colspan="1">1</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">Side</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">17</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">0</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">Front</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">14</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">0</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">Knees</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">12</td>
<td align="center" valign="top" rowspan="1" colspan="1">10</td>
<td align="center" valign="top" rowspan="1" colspan="1">0</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="t4-sensors-14-07096" position="float">
<label>Table 4.</label>
<caption>
<p>HELLO Packet Structure.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th colspan="11" align="center" valign="middle" rowspan="1">
<bold>HELLO Packet Structure</bold>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Begin (1byte)</td>
<td colspan="2" align="center" valign="middle" rowspan="1">Length (2bytes)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">API (1byte)</td>
<td colspan="2" align="center" valign="middle" rowspan="1">Src. Address (2bytes)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">RSSI (1byte)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Opt. (1byte)</td>
<td colspan="2" align="center" valign="middle" rowspan="1">Payload (2 bytes)</td>
<td align="center" valign="middle" rowspan="1" colspan="1">CS (1byte)</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 7E</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 00</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 07</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 81</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 00</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 15</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 24</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 02</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 48</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × 01</td>
<td align="center" valign="middle" rowspan="1" colspan="1">0 × FF</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="t5-sensors-14-07096" position="float">
<label>Table 5.</label>
<caption>
<p>Scenario routing table.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>ID Node</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Trunk Destination</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Hops</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Link RSSI</bold>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">8</td>
<td align="center" valign="top" rowspan="1" colspan="1">D/A</td>
<td align="center" valign="top" rowspan="1" colspan="1">D/A</td>
<td align="center" valign="top" rowspan="1" colspan="1">D/A</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">16</td>
<td align="center" valign="top" rowspan="1" colspan="1">64</td>
<td align="center" valign="top" rowspan="1" colspan="1">2</td>
<td align="center" valign="top" rowspan="1" colspan="1">−64 dBm</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">24</td>
<td align="center" valign="top" rowspan="1" colspan="1">16</td>
<td align="center" valign="top" rowspan="1" colspan="1">3</td>
<td align="center" valign="top" rowspan="1" colspan="1">−57 dBm</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">32</td>
<td align="center" valign="top" rowspan="1" colspan="1">Dynamic</td>
<td align="center" valign="top" rowspan="1" colspan="1">Dynamic</td>
<td align="center" valign="top" rowspan="1" colspan="1">D/A</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">40</td>
<td align="center" valign="top" rowspan="1" colspan="1">16</td>
<td align="center" valign="top" rowspan="1" colspan="1">3</td>
<td align="center" valign="top" rowspan="1" colspan="1">−47 dBm</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="1" colspan="1">64</td>
<td align="center" valign="top" rowspan="1" colspan="1">8</td>
<td align="center" valign="top" rowspan="1" colspan="1">1</td>
<td align="center" valign="top" rowspan="1" colspan="1">−53 dBm</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="t6-sensors-14-07096" position="float">
<label>Table 6.</label>
<caption>
<p>Received DATA Packets.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Total Packets</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Fall DATA Packets</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Heart Rate DATA Packets</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Lost Packets</bold>
</th>
<th align="center" valign="bottom" rowspan="1" colspan="1">
<bold>Percent of DATA Lost Packets</bold>
</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="bottom" rowspan="1" colspan="1">109</td>
<td align="center" valign="bottom" rowspan="1" colspan="1">97</td>
<td align="center" valign="bottom" rowspan="1" colspan="1">10</td>
<td align="center" valign="bottom" rowspan="1" colspan="1">2</td>
<td align="center" valign="bottom" rowspan="1" colspan="1">1.83%</td>
</tr>
</tbody>
</table>
</table-wrap>
</floats-group>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000547 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000547 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     PMC:4029648
   |texte=   WiSPH: A Wireless Sensor Network-Based Home Care Monitoring System
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/RBID.i   -Sk "pubmed:24759112" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd   \
       | NlmPubMed2Wicri -a TelematiV1 

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024