With the aging of the population and the increasing patient preference for receiving care in their own homes, remote home care is one of the fastest growing areas of health care in Taiwan and many other countries. Many remote home- monitoring applications have been developed and implemented to enable both formal and informal caregivers to have remote access to patient data so that they can respond instantly to any abnormalities of in-home patients. The aim of this technology is to give both patients and relatives better control of the health care, reduce the burden on informal caregivers and reduce visits to hospitals and thus result in a better quality of life for both the patient and his/her family. To facilitate their widespread adoption, remote home- monitoring systems take advantage of the low-cost features and popularity of the Internet and PCs, but are inherently exposed to several security risks, such as virus and denial-of-service (DoS) attacks. These security threats exist as long as the in-home PC is directly accessible by remote-monitoring users over the Internet. The purpose of the study reported in this paper was to improve the security of such systems, with the proposed architecture aimed at increasing the system availability and confidentiality of patient information. A broker server is introduced between the remote-monitoring devices and the in-home PCs. This topology removes direct access to the in-home PC, and a firewall can be configured to deny all inbound connections while the remote home- monitoring application is operating. This architecture helps to transfer the security risks from the in-home PC to the managed broker server, on which more advanced security measures can be implemented. The pros and cons of this novel architecture design are also discussed and summariesd.
Table of Content
ABSTARCTII
CHAPTER 1: INTRODUCTIONS1
Problem Statement6
CHAPTER II: LITERATURE REVIEW18
REMOTE PATIENT MONITORING SYSTEM (RPMS) IN ORDER TO GIVE AN OBJECTIVE PICTURE OF A PATIENT STATUS18
Physicians18
Rehabilitation nurses19
Physical therapists19
Occupational and recreational therapists21
Speech-language pathologists22
Vocational therapists24
Hypertention25
Diabetes26
High blood cholesterol.27
Being overweight or obese.29
Atrial fibrillation33
Drinking more than the recommended amounts of alcohol35
CHAPTER III: METHODOLOGY36
C-ONTO Ontological Model36
FIG. 1 PARTIAL C-ONTO ONTOLOGICAL SCHEMA.38
SWRL Reasoning Sentences40
CHAPTER IV: RESULTS AND AANALYSIS43
Requirement analysis43
Design rationale for the development of user interfaces47
Complementary stationary device interface49
The mobile senSAVE®-Prototype49
Setup51
Development methodology52
Evaluation of scenarios54
Design alternatives58
Summative evaluation of design alternatives60
Evaluation of the information presentation61
Feel of the interface: Interaction design62
Overall ranking of the interface variants64
Additional user evaluation results about naming, icon and animation features66
Understandability67
Icon displays68
Understanding the alarm69
Activate buttons of the display70
Switching between the display modes of the application: Health, technical and clock70
CHAPTER V: RECOMMENDATIONS AND CONCLUSION73
REFERENCES80
Chapter 1: Introductions
Requirements engineering (RE) has arrive of age as a computer research control and esteem in spite of many considerations on “what precisely we technician in requirements”, or “how much is obligations technology a study discipline”. We have renowned for decades that we count on rightly extracted, appreciated, investigated, verified, acquiesced and article obligations, because they are the backbone of effectively applied programs systems. Unfortunately, obligations technology groups have not conceived a shiny projectile which could assurance that, if we present obligations investigation and obligations ...