Volume 13 , Issue 2 , PP: 212-222, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Kiran Sree Pokkuluri 1 , Vibha Tiwari 2 , Jyoti Uikey 3 , Prerna Mehta 4 * , Chopparapu Srinivasa Rao 5 , Annamaraju Thanuja 6
Doi: https://doi.org/10.54216/JISIoT.130217
Healthcare Internet of Things (IoT) initiatives that aim to integrate technology and medicine are shaking the sector to its foundations. The revolutionary potential of the proposed strategy is shown here as we investigate the far-reaching consequences of the Healthcare IoT on remote patient monitoring. The beginning sets the stage by underlining the significance of bridging the gap between technology and medicine. Our multi-pronged approach comprises Internet of Things (IoT) remote monitoring, cloud-based analysis, artificial intelligence (AI) integrated diagnostics, real-time alerts, and predictive analytics. Our study's results demonstrate that the proposed approach is superior to the status quo. The area of remote patient monitoring has profited considerably from the employment of traditional approaches, such as the fusion of data from wearable sensors, analysis in the cloud, diagnostics that utilize artificial intelligence, real-time monitoring, predictive modeling, and smart alarm systems. The suggested strategy, however, performs very well across all of the most important measures of assessment. Comparatively, the accuracy rate of the conventional wearable sensor fusion approach was only 76%, whereas our suggested method reached 89%. Our strategy was also more accurate than the standard approach (88% vs. 73%). When compared to the recall rate of 68% produced by conventional methods, our suggested strategy significantly outperformed the competition. It's a great option for hospitals and clinics since it improves diagnostic precision and speed without breaking the bank.
AI , Cloud Computing , Diagnostics , Healthcare , Internet of Things , Machine Learning , Remote Monitoring , Technology , Telemedicine , Wearables
[1] N. D., P. K., S. S., K. R., Y. G.V., K. "A Survey on IoT based Wearable Sensor for Covid-19 Pandemic," Journal of International Journal of Wireless and Ad Hoc Communication, vol. 2, no. 2, pp. 77-87, 2021. DOI: https://doi.org/10.54216/IJWAC.020203
[2] K. A. Al-Afandy, O. S. Faragallah, A. ELmhalawy, E.-S. M. El-Rabaie, and G. M. El-Banby, "High security data hiding using image cropping and LSB least significant bit steganography," in Proceedings of the 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400–404, IEEE, Tangier, Morocco, October 2016.
[3] A. Elhadad, S. Hamad, A. Khalifa, and A. Ghareeb, "High capacity information hiding for privacy protection in digital video files," Neural Computing & Applications, vol. 28, no. 1, pp. 91–95, 2017.
[4] Eyad, I. "Intelligent systems and AI techniques: Recent advances and Future directions," Journal of International Journal of Advances in Applied Computational Intelligence, vol. 1, no. 2, pp. 30-45, 2022. DOI: https://doi.org/10.54216/IJAACI.010202
[5] Vishal Dubey , Bhavya Takkar , Puneet Singh Lamba, Micro-Expression Recognition using 3D - CNN, Fusion: Practice and Applications, Vol. 1 , No. 1 , (2020) : 5-13 (Doi : https://doi.org/10.54216/FPA.010101)
[6] Surinder Kaur , Diksha Kumari , Vandana Kumari, Control of Enviornmental Parametrs in A Greenhouse, Fusion: Practice and Applications, Vol. 1 , No. 1 , (2020) : 14-21 (Doi : https://doi.org/10.54216/FPA.010102)
[7] C. Qin, W. Zhang, F. Cao, X. Zhang, and C.-C. Chang, "Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection," Signal Processing, vol. 153, pp. 109–122, and 2018.
[8] Q. Li, X. Liao, G. Chen, and L. Ding, "A novel game-theoretic model for content-adaptive image steganography," in Proceedings of the IEEE 37th International Conference on Distributed Computing Systems Workshops, pp. 232–237, ICDCSW, Atlanta, GA, USA, June 2017.
[9] Lobna Osman, A PSPICE Fast Model for the Single Electron Transistor, International Journal of Wireless and Ad Hoc Communication, Vol. 0 , No. 1 , (2019) : 8-23 (Doi : https://doi.org/10.54216/IJWAC.000101)
[10] K. Shankar, Recent Advances in Sensing Technologies for Smart Cities, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 05-15 (Doi : https://doi.org/10.54216/IJWAC.010101).
[11] V. Roy. "An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023, PP. 8-17.
[12] V. Roy. "Breast cancer Classification with Multi-Fusion Technique and Correlation Analysis" Fusion: Practice & Applications, Vol. 9, No. 2, 2023, PP. 48-61.
[13] Vimala, S. Krishnan, V. Raj, M. Kumar, A. Janakiraman, M. "Object Detection Using Deep Learning," Journal of Journal of Cognitive Human-Computer Interaction, vol. 6, no. 1, pp. 32-38, 2023. DOI: https://doi.org/10.54216/JCHCI.060103
[14] S. I. Nipanikar, V. Hima Deepthi, and N. Kulkarni, "A sparse representation based image steganography using particle swarm optimization and wavelet transform," Alexandria Engineering Journal, vol. 57, no. 4, pp. 2343–2356, 2018.
[15] G. Swain, "Adaptive and non-adaptive PVD steganography using overlapped pixel blocks," Arabian Journal for Science and Engineering, vol. 43, no. 12, pp. 7549–7562, 2018.
[16] Vaibhavi A. Bhagyalakshmi L., Porselvi S. and Sanjay Kumar Suman, “Review of Detecting Diabetes Mellitus and Diabetic Retinopathy Using Tongue Images and Its Features”, Research Journal of Pharmaceutical Biological and Chemical Sciences, vol. 8, no. 2, pp. 378-386, April 2017.
[17] Hisham Elhoseny , Hazem EL-Bakry, Utilizing Service Oriented Architecture (SOA) in IoT Smart Applications, Journal of Cybersecurity and Information Management, Vol. 0 , No. 1 , (2019) : 15-31 (Doi : https://doi.org/10.54216/JCIM.000102)
[18] Andino Maseleno, Design of Optimal Machine Learning based Cybersecurity Intrusion Detection Systems, Journal of Cybersecurity and Information Management, Vol. 0 , No. 1 , (2019) : 32-43 (Doi : https://doi.org/10.54216/JCIM.000103)
[19] G. Swain, "Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function," Optik, vol. 180, pp. 807–823, 2019.
[20] S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh, "SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images," Measurement, vol. 139, pp. 426–437, 2019.
[21] E. S. B. Hureib and A. A. Gutub, "Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography," International Journal of Bio-Medical Informatics and E-Health, vol. 20, no. 12, pp. 232–241, 2020.
[22] A. Anees, A. M. Siddiqui, J. Ahmed, and I. Hussain, "A technique for digital steganography using chaotic maps," Nonlinear Dynamics, vol. 75, no. 4, pp. 807–816, 2014.
[23] Abdullah Ali Salamai, An Approach Based on Decision-Making Algorithms for Qos-Aware Iot Services Composition, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 1 , (2023) : 08-16 (Doi : https://doi.org/10.54216/JISIoT.080101)
[24] Abedallah Zaid Abualkishik, Rasha Almajed, William Thompson, Intelligent Model for Customer Churn Prediction using Deep Learning Optimization Algorithms, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 1 , (2023) : 43-54 (Doi : https://doi.org/10.54216/JISIoT.080104)
[25] Bansal, "Steganography and classification of image steganography techniques," in Proceedings of the International Conference on Computing for Sustainable Global Development, pp. 870–875, IEEE, New Delhi, India, March 2014.
[26] V. Thanikaiselvan and P. Arulmozhivarman, "High security image steganography using IWT and graph theory," in Proceedings of the IEEE International Conference on Signal and Image Processing Applications, pp. 337–342, IEEE, Melaka, Malaysia, October 2013.
[27] V. Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021, PP. 42-52.