2020
DOI: 10.1016/j.suscom.2020.100378
|View full text |Cite
|
Sign up to set email alerts
|

Integrated healthcare monitoring solutions for soldier using the internet of things with distributed computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…The framework, called FogCEPCare, used a set of custom services that work proactively using the complex event processing architecture of cloud computing. Bandopadhaya et al [38] presented an integrated health monitoring system based on IoT and distributed computing for deployed soldiers. The proposed IoT architecture was service-oriented in three layers, where the computing functionalities were distributed among all the layers in order to improve the security of the soldier and to obtain a fast response to any unexpected event Cost reduction and communication efficiency are also an extremely important purpose of many monitoring systems.…”
Section: State Of the Artmentioning
confidence: 99%
“…The framework, called FogCEPCare, used a set of custom services that work proactively using the complex event processing architecture of cloud computing. Bandopadhaya et al [38] presented an integrated health monitoring system based on IoT and distributed computing for deployed soldiers. The proposed IoT architecture was service-oriented in three layers, where the computing functionalities were distributed among all the layers in order to improve the security of the soldier and to obtain a fast response to any unexpected event Cost reduction and communication efficiency are also an extremely important purpose of many monitoring systems.…”
Section: State Of the Artmentioning
confidence: 99%
“…As shown in the results, cell (10) is ranked as the most suspicious cell in region 1 with a suspicion score of 0.8333 followed by cells (2,18,9,11,17,25,3). On the other hand, cell ( 23) is ranked as the top suspicious cell in region 2 with a suspicion score of 0.75 followed by cells (30,31,4,12,13,14,15,32,22). The regional manager then records the maximum reached suspicion rank (Ω) within its region (see Algorithm 1 (line 4)).…”
Section: Re-organization Within the Regionmentioning
confidence: 73%
“…The rapid developments in the area of the Internet of Things (IoT) and their integration with fog, edge, and cloud computing technologies provide an ideal platform for a new generation of advanced surveillance systems. To this end, several IoT-based surveillance systems were proposed in recent years (e.g., [7,11,12,46,49,50,53,58]). In these systems, IoT based sensors and other edge devices collect and initially process raw data.…”
Section: Iot-based Surveillance Systemsmentioning
confidence: 99%
“…Bandopadhaya et al [27] suggested a structured medical care checking response using the IoT with transmitted figures for warriors expressed in antagonistic ecological conditions. The e-care boundaries of each individual should be regularly monitored by these officers and the subsequent investigation of the dataset to be rendered with the lowest possible delay to start proper clinical assistance.…”
Section: Fog Computing-based Iot For Health Monitoringmentioning
confidence: 99%