Downloads: 122 | Views: 297
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013 | Popularity: 6.3 / 10
Mobile Phone Sensing System for Health Monitoring
Snehal D. Nanhore, Mahip M. Bartere
Abstract: One of the most important device in our lives is a mobile phone. For now, it is a powerful computing platform equipped with various sensors. Embedded sensors can be used in multiple domains, such as environmental monitoring, social networks, safety and also healthcare. Sensor enabled mobile phones or smart phones are hovering to be at the center of a next revolution in social networks, green applications, global environmental monitoring, personal and community healthcare, sensor augmented gaming, virtual reality and smart transportation systems. Health monitoring is repeatedly mentioned as one of the main application areas for Pervasive computing. Mobile Health Care is the integration of mobile computing and health monitoring. It is the application of mobile computing technologies for improving communication among patients, physicians, and other health care workers. As mobile devices have become an inseparable part of our life it can integrate health care more seamlessly to our everyday life. In this paper we survey the main use cases of mobile phone sensors in mobile healthcare. We classify the proposed mHealth sensing applications according to sensor types they use and discuss the main advantages provided by these applications.
Keywords: Mobile Health Monitoring, Smartphone, Mobile phone sensing, Body sensor network, Smart phone sensors
Edition: Volume 2 Issue 4, April 2013
Pages: 252 - 255
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera