Volume 13 , Issue 2 , PP: 245-255, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Amit Kumar Chandanan 1 * , Prabha Rani Sikdar 2 , C. Raja 3 , Saiyed Faiayaz Waris 4 , Manoj Kumar .T 5 , Kiran Bhopate 6
Doi: https://doi.org/10.54216/JISIoT.130220
When it comes to hospital administration, patient care, and medical data analysis, the Healthcare Internet of Things (HIoT) is nothing short of a paradigm revolution. We dive into this new paradigm to examine its far-reaching effects and revolutionary possibilities in the healthcare system. The context is established by introducing HIoT as a game-changing development in healthcare. Using the IoT to network several devices, this model paves the way for real-time patient monitoring, streamlined inventory management, and integrated telemedicine. The healthcare industry as we know it will be transformed by HIoT as it strives to improve resource allocation, simplify operations, and provide proactive patient care. Our investigation includes a thorough appraisal of how HIoT will affect many facets of medical treatment. We use many research approaches and quality indicators for this evaluation. We may evaluate the viability and scalability of HIoT solutions by testing them in experimental settings that mimic real-world healthcare settings. To provide a precise depiction of the healthcare system, dataset environments use well maintained medical data sources. The performance and efficacy of HIoT technologies may be evaluated using measurable criteria such as sensitivity (0.94), specificity (0.89), F1-Score (0.91), ROC-AUC (0.95), and cost savings ($150,000). To determine the relative importance of each part of the HIoT ecosystem, researchers undertake "ablation studies. Our findings provide a clear picture of the disruptive potential of HIoT. Better patient outcomes may be ensured via early interventions thanks to the improved accuracy (0.92), efficiency (9.2), and satisfaction (9.2) provided by the suggested HIoT technique for patient monitoring. When healthcare and telemedicine are combined, the success rate of remote consultations increases to 95%, response times decrease to 15 minutes, and more people have access to medical treatment.
Care , Data analysis , Healthcare , IoT , Management , Medicine , Patients , Paradigm shift , Technology all play a role in this exciting new field
[1] Praveen, G. Pandian, D. F., C. "IntelliCare: Integrating IoT and Machine Learning for Remote Patient Monitoring in Healthcare: A Comprehensive Framework," Journal of Journal of Cognitive Human-Computer Interaction, vol. 7, no. 2, pp. 50-59, 2024. DOI: https://doi.org/10.54216/JCHCI.070205
[2] G. Verma and S. Prakash, "Internet of Things for healthcare: research challenges and future prospects," Advances in Communication and Computational Technology, Springer, Singapore, 2021.
[3] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: a survey on enabling technologies, protocols, and applications," IEEE communications surveys & tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
[4] N. D., P. K., S. S., K. R., Y. G.V., K. "A Survey on IoT based Wearable Sensor for Covid-19 Pandemic," Journal of International Journal of Wireless and Ad Hoc Communication, vol. 2, no. 2, pp. 77-87, 2021. DOI: https://doi.org/10.54216/IJWAC.020203
[5] Shaymaa Adnan Abdulrahma , Abdel-Badeeh M. Salem, An efficient deep belief network for Detection of Coronavirus Disease COVID-19, Fusion: Practice and Applications, Vol. 2 , No. 1 , (2020) : 05-13 (Doi : https://doi.org/10.54216/FPA.020102)
[6] Shaymaa Adnan Abdulrahman , Rafah Amer Jaafar, Detection and Classification of Alcoholics Using Electroencephalogram Signal and Support Vector Machine, Fusion: Practice and Applications, Vol. 2 , No. 1 , (2020) : 14-21 (Doi : https://doi.org/10.54216/FPA.020103)
[7] A. Javaid, Q. Niyaz, W. Sun, and M. Alam, "A deep learning approach for network intrusion detection system," Eai Endorsed Transactions on Security and Safety, vol. 3, no. 9, p. e2, 2016.
[8] P. Mohamed Shakeel, S. Baskar, V. R. Sarma Dhulipala, S. Mishra, and M. M. Jaber, "Retracted article: maintaining security and privacy in health care system using learning based deep-Q-networks," Journal of Medical Systems, vol. 42, no. 10, p. 186, 2018.
[9] F. Alsubaei, A. Abuhussein, V. Shandilya, and S. Shiva, "IoMT-SAF: internet of medical things security assessment framework," Internet of Things, vol. 8, Article ID 100123, 2019.
[10] R. Kumar and M. P. Rajasekaran, "An IoT based patient monitoring system using Raspberry Pi," in Proceedings of the 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), pp. 1–4, IEEE, Kovilpatti, India, January 2016.
[11] Ehab Rushdy , Walid Khedr , Nihal Salah, Managing a Secure Refresh Token Implementation with JSON Web Token in REST API, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 1 , (2021) : 01-20 (Doi : https://doi.org/10.54216/IJWAC.020101)
[12] Xiaohui Yuan , Reem Atassi, Geological Landslide Disaster Monitoring Based on Wireless Network Technology, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 1 , (2021) : 21-32 (Doi : https://doi.org/10.54216/IJWAC.020102)
[13] V. Parashar et al., "Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)," Wireless Communications and Mobile Computing, vol. 2022, Article ID 4464447, pp. 1–11, 2022. [Online]. Available: https://doi.org/10.1155/2022/4464447
[14] I. Ahmed, G. Jeon, and F. Piccialli, "A deep-learning-based smart healthcare system for patient’s discomfort detection at the edge of Internet of Things," IEEE Internet of Things Journal, vol. 8, no. 13, Article ID 10318, 2021.
[15] S. Ahmad, S. Khan, M. Fahad et al., "Deep learning enabled disease diagnosis for secure Internet of Medical Things," Computers, Materials & Continua, vol. 73, no. 1, pp. 965–979, 2022.
[16] R. Kashyap, "Stochastic dilated residual ghost model for breast cancer detection," Journal of Digital Imaging, vol. 36, no. 2, pp. 562–573, 2022. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z
[17] V. Roy. "An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023 ,PP. 8-17.
[18] V. Roy. "Breast cancer Classification with Multi-Fusion Technique and Correlation Analysis" Fusion: Practice & Applications, Vol. 9, No. 2, 2023 , PP. 48-61.
[19] Esraa Mohamed, The Relationship between Artificial Intelligence and Internet of Things: A quick review, Journal of Cybersecurity and Information Management, Vol. 1 , No. 1 , (2020) : 30-34 (Doi : https://doi.org/10.54216/JCIM.010101)
[20] Dr. Ajay B. Gadicha , Dr. Vijay B. Gadicha, Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography, Journal of Cybersecurity and Information Management, Vol. 1 , No. 1 , (2020) : 5-16 (Doi : https://doi.org/10.54216/JCIM.010102)
[21] V. Roy and S. Shukla, "Image Denoising by Data Adaptive and Non-Data Adaptive Transform Domain Denoising Method Using EEG Signal," in Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012), V. Kumar and M. Bhatele (eds.), Lecture Notes in Bioengineering. Springer, India, 2013. https://doi.org/10.1007/978-81-322-0970-6_2.
[22] P. Kumar, A. Baliyan, K.R. Prasad, N. Sreekanth, P. Jawarkar, V. Roy, E.T. Amoatey, "Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks," Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, pp. 1-15, 2022. https://doi.org/10.1155/2022/5713092.
[23] Nirmal Kumar, K. Premika, L. Bhagyalakshmi and Sanjay Kumar Suman, “Smart Traffic Rescuer using IOT”, Journal of Pharmaceutical Science and Research, special issue 8, pp. 215-219, 2017
[24] Tamarah Alaa Diame, M. Abdul Jaleel M., Sajad Ali Ettyem, Raaid Alubady, Mohaned Adile, Mohd K. Abd Ghani, Hatıra Gunerhan, Data Management and Decision-Making Process Using Machine Learning Approach for Enterprises, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 1 , (2023) : 75-88 (Doi : https://doi.org/10.54216/JISIoT.080107)
[25] V. Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 42-52.
[26] Hatip, A. Olgun, N. Montajab, S. "Farmland Fertility Optimization with Deep Learning based COVID-19 Detection for Healthcare Decision Making," Journal of International Journal of Advances in Applied Computational Intelligence, vol. 5, no. 1, pp. 29-39, 2024. DOI: https://doi.org/10.54216/IJAACI.050103
[27] V. Pandimurugan, S. Rajasoundaran, S. Routray et al., "Detecting and Extracting Brain Hemorrhages from CT Images Using Generative Convolutional Imaging Scheme," Computational Intelligence and Neuroscience, 2022.
[28] S. Padhy, S. Dash, S. Routray, S. Ahmad, J. Nazeer, and A. Alam, "IoT-Based Hybrid Ensemble Machine Learning Model for Efficient Diabetes Mellitus Prediction," Computational Intelligence and Neuroscience, vol. 2022, Article ID 2389636, 11 pages, 2022.
[29] L. Sathish Kumar, S. Ahmad, S. Routray et al., "Modern energy optimization approach for efficient data communication in IoT-based wireless sensor networks," Wireless Communications and Mobile Computing, vol. 2022, Article ID 7901587, 13 pages, 2022.