technology

Remote Patient Monitoring Using Mobile and Cloud Computing

INTRODUCTION

The Internet of Things (IoT) is the next paradigm shift, where sensors are connected to the Internet, which collect data for analysis to make our planet more instrumented, interconnected and intelligent. A typical person carries on average one or two mobile devices nowadays. Hence, by leveraging the increasing presence of mobile devices the cost of equipment can be reduced significantly in many industries.

A. Motivation

The ECG iOS application presented in this paper focuses on the health care domain of IoT. With the advancements in embedded information and communication technologies, we can provide intensified healthcare support of senior citizens at homes and retirement homes. This type of technology would be helpful to be providing ECG monitoring facility to senior citizens, athletes and common people. By providing the facility to use these technologies in the home, citizens would be able to live independently for a longer period of time, helping to reduce costs of medical equipment Healthcare is currently facing the challenge of large amount of data that is unstructured, diverse and growing at an exponential rate. Data is constantly streamed through sensors, monitors and instruments in real time that is faster than the medical personnel can keep up with. The advanced techniques and high capacities of cloud computing, processing of a large amount of data can be performed more efficiently support big data analytics.

B. Problem statement

In the healthcare domain of IoT, patients will not have to make as many trips to the doctor anymore, since they can upload the collected data from the sensors to the cloud. This can be achieved for an ECG monitoring application on the mobile device, which will collect the bio-signal data using sensors and then upload to the cloud for keeping a record of the unstructured data. This will reduce the waiting time for the triage at the hospitals and minimize visits and reducing the cost of personnel and administrative operations. This convenience increases the quality of life for the patients as they can enjoy other activities instead of spending time commuting to the hospital/clinic and waiting in long triage queues.

C. Proposed solution

In addition to medical knowledge, various SSE Technologies are involved in IoT based healthcare applications, including microcontroller and sensor technologies, signal processing, communication protocols, system and software design (using well documented design patterns), DBMS, web services, data analysis, and cloud techniques. Such an infrastructure should not only satisfy the basic functional requirements, but also address some key non-functional quality requirements, such as Performance, privacy/security, portability, scalability, flexibility, and cost. Using the idea of IoT and cloud techniques, this paper presents a solution to use an ADC and microcontroller board, which obtains the bio-signal data from a person using sensors and sends it to the mobile device wirelessly using Bluetooth technology. When monitoring the ECG of the patient, the monitored data associated with the ECG waves being displayed on the mobile app is stored in the form of a binary file on the secure digital (SD) card of the …

Continue reading »

Link Building – Defining Importance and Evaluating Strategies for 2015

Link building helps to relate search strings to web pages and is an effective strategy for the popularity of a website. Links provide direction to search engine to help users search the content they are looking for on web. Search engines constantly redefine the algorithms and use link data to perform site assessment with respect to a search query.

Although links form a part of the entire gamut of SEO related activity, experts attribute links as an important determinant of search engine’s algorithm to relate to links. Links provide a foundation for search engines to evaluate the popularity of pages. Links provide the benchmarks for assessment of websites based on trustworthiness, spammy nature and ranking (depending on authority). As provided by Hiltop Algorithm, links act on an authority model to refer the most expert pages related to a given subject. (1)

Process Management

Link building should follow the best practices as per Google guidelines and needs to be done the correct way to harness maximum benefit for SEO. Creative strategies need to be developed in a manner that the target audience is compelled to get engaged with the website link. The process should be systematic, scientific and creative.

Link building strategy involves understanding the client website thoroughly. It involves understanding specific elements; its unique selling point, industry vertical, market presence, inherent value, area of operation, nature of target audience and various products/service segments. All of these can be treated as linkable assets.

By comparing and contrasting various elements a strategy can be devised which relates the target audience to these elements through links as a medium, assessed the effectiveness of the strategy and make modifications depending on results.(2)

Link building – Marketer’s View

Link building is getting the grasp of the website and target audience from a marketing perspective. It involves understanding why the website should be valued by the target audience, why any user would want to visit it, and why it is worth linking to. An applicable marketing strategy here is compelling in nature and has a credible and influential outreach. The exercise aims to obtain the contact between the client’s website and the target audience by specifying the importance and value of the client’s website for them and what unique benefit might the users obtain by visiting the particular website. If implemented correctly link building can act as immensely helpful marketing strategy for creating brand awareness, brand promotion, lead generation and lead conversion.(3)

Links serve as a marketer’s tool to indicate the relevancy and authority to Google and to the website’s unique audience group. It aims to foster trust between linked websites and enable Google to detect tactics which provide manipulative search results and extremely poor user experience. (4)

Link Building Strategies for 2015

With increased usage of internet as a medium to look out for information, products and services, link building would continue to remain popular with marketers aiming who use it as an opportunity to create brand awareness.

Search: Online presence for business is needed …

Continue reading »

Social Media Management: Your Key To More Sales And Happier Customers

Successful businesses today employ the Internet to create "brand awareness" among targeted customers, and convince them to purchase products and services. In this era of Internet exploitation, the web site has become the ideal medium through which your messages cost-effectively may reach targeted customers.

Instead of relying on television, magazines, or newspapers, you may deliver profitable messages in a matter of minutes – versus hours, days, or even weeks appealing to customers via the other media. However, to make certain your business communications are strong and convey the right benefits and urges to purchase, you will need to employ a well-organized social media management plan. Such a discipline helps you ensure your promotions via business web sites are effective, and enhance your client base and brand popularity.

By implementing effective social media management, you avoid posting messages that do not elicit the desired responses. In this manner, you carefully manage advertising and marketing strategies on social web sites, and prevent messages being ignored. With this in mind, social media "analytics" will help you determine the behavior, attitudes, and likings of your target customers. By examining key web sites – Facebook, Twitter, and LinkedIn – you'll learn which are frequented most often by your prospective customers, and discover what they think about your products or services.

This provides insight into your brand response rates, and also informs you about any grievances customers may express. When you are completely aware of your target customers' preferences and choices, you're better equipped to alter your brand and resolve any complaints customers may have noted. You also will recognize that effective social media management will increase the popularity of your brand, as well as the size of your customer base. In short, efficient social media management ensures you enjoy the best promotional advantages of business web sites.

In another vein, you've probably learned that promoting oneself or one's company is time-consuming, especially when it comes to accessing Facebook and Twitter; Two of the most heavily-trafficked web sites on the Internet. Many who try to employ these sites for business have no knowledge of how to use them appropriately, and often are frustrated and give up trying. However, once again there's an approach that helps with this dilemma, and it's as simple as employing someone to "shepherd" your Facebook and Twitter accounts through social media management.

Effective social media management guides your business and that individual, and also helps with the design and development of interactive web pages for sites such as Facebook and Twitter. Social media management also helps you obtain fans and pals with what to communicate as well as assist with every day communications with one's "followers." Additionally, it will relieve you from creating daily posts and tweets, and serve as an excellent time saver.

A social media management provider also may create advertising and marketing techniques that support your Facebook and Twitter accounts, and explode into the "viral realm of achievement." He or she will offer suggestions on how best to promote …

Continue reading »

How to Protect Your Passwords Properly

Looking back at last 20 years (I am writing this in 2014), use of systems and passwords has become an unwanted but unavoidable requirement in our daily life. We always require to stay atop of many forms and layers of online protection of our sensitive data. Some examples where we need to use passwords, pass phrases, identifiable pictures etc. Are banks, schools, credit cards, emails, work login, work search, kids account, entertainment, communications, and more and more. As far as the number goes, all these requirements are increasing and as far as complication goes, they are becoming increasingly complicated in nature to use and manage.

20 years back, I had only two account passwords that I had to manage. One email and one bank account. Today I manage over 200 online safety memory chips including for me and for my family! (Wow writing this makes me feel safe! Really ..?)

Again, 20 years back I could put in 6 alphabets or numbers and it was considered a safe, secure password. Today, I have to use alphabets in lower and upper case, numbers and special characters with the strength indicators showing strength of the password as we are typing it to understand how strong and safe the password is (in case case is a cyber crime to crack Down the passwords.) Many companies will not let me use the parts of my name in the password. Then I have to associate my account to an image and keep the image in mind. Further I have to answer some security questions (typically from 3 to 5). To add even more, every now and then I need to associate and confirm my account with a cell phone number! Then there is separate 4 digit pin for bank ATM's etc. Even my voice mail has a 6 digit pass-code!

Talk about complexity! Talk about memorizing!

Is the technology helpful to protect our sensitive data? Yes! Has the technology complicated the issue and pushed us way more to manage in terms of passwords, security etc.? Yes!

So how to manage these complications. Here are some do's and don'ts for it.

Do's

1. Use long complex passwords.

2. Generate and use random passwords yourself.

3. Keep your passwords in an isolated safe file. Write if you want. Even better is to spend a few bucks to have a dedicated drive, USB etc.

4. Use limited login attempts at all the allowed institutions. It basically means after 3 or 2 or 4 (whatever the set number is) unsuccessful log in attempts, your account will be automatically disabled and you will have to go either personally or call to prove your ID and then get your account reinstated. It seems annoying in the beginning but it is a great tool to protect your ID in the long run.

5. Answer security questions in a non traditional manner. Example; Name of the first dog. Traditional answer: whiskey. Non traditional answer: Ihadnodog.

6. Always keep the current back up out …

Continue reading »

Advantages of Lamp Server for Web Hosting

Dedicated website hosting is termed as using one web server utilizing all of its resources in order to handle sheer amounts of data of a single website. High traffic and million hits per day touching websites like Freelancer, Odesk, eBay, Amazon, & Microsoft etc. use dedicated servers for hosting their online businesses. As an online businessman, there is a definite need of having dedicated LAMP server for website hosting. Sadly speaking many people still entrepreneurs still try to save their costs and forget about getting dedicated LAMP server hosting for their e-commerce business.

When you are getting thousands of hits per day, it indicates that your website is doing pretty good in terms of attracting visitors. It’s however this very same traffic could become quite a big pain in the beck if not handled properly. Handling high volumes of traffic with sheer amounts of data is virtually impossible with shared web hosting or cheap dedicated web hosting packages. This results in servers getting crashed leading to important files being missed and data lost. As a result here you would need services of professional and dedicated web hosting services in order to handle high traffic in the long run.

LAMP server is backbone of any e-commerce related business. LAMP server is a combination of Linux OS, Apache web server, MySQL database management system, and PHP/Perl/Python web programming languages. For any business, hiring dedicated services for web hosting is a hefty cost to be paid but looking for long term benefits, it is definitely going to pay off. Linux is the best operating system to be used for hosting web sites. It is fast, secure and improves pages’ loading times even when there is high traffic on your website. Apache is a web serve used for hosting websites that has crossed 100 million mark of website hosting on its server. MySQL is the most popular, free and open source database management system that is used to handle customer records and various other data for every website. PHP/Perl/Python are three programing languages and either one of these could be used in order to complete the LAMP server configuration.

In order for proper functioning of your website, you need to be sure that the LAMP server dedicated web hosting services are reliable enough. Check the company’s previous performance based on customer reviews. Some web hosts require system reboots after software updates or minor installations. While this is something normal for a server to take place, but the ecommerce business hosted on that server would get a big shock of loss in revenues and profits. No visitor would be able to browse the website when server is down, restarted or crashed.

Hence it is very important to note that the server has minimum rebooting so that the website is up and live on the internet. Dedicated LAMP server assures maximum performance, security and quick page loading times minimizing chances of server crashes. This protects attacks from malware, and malicious viruses.

When you are hosting your …

Continue reading »

Strengths and Weaknesses of Android Based Applications

The Android world has registered a remarkable development in terms of user base and applications. Some Android application and programming companies have evidently developed crackerjack applications on this platform. As compared to iOS, Android is the most widely used operating system. But many of the concepts are relatively new in this operating system and the developed applications are vulnerable to https defects. Where there is light there is also darkness, so there are many advantages and disadvantages of Android-based applications.

Advantages of Android based Applications

Multitasking: Android based application development is multitasking. So a user can use two or more than two applications at the same time. This makes streaming through the social accounts and listening to songs possible.

Alerts and notifications: There is no way an Android application is going to miss any news update. The reason behind is that notifications fall directly on the home screen. The missed calls are notified by the LED flash.

Open source applications: The Android world is full of lakhs of applications and they are absolutely free. Thousands of games entertainment apps come for free in the Android world.

More smartphones functioning on Android: Big smartphone giants, i.e., HTC, Motorola, Sony Ericsson are using the Android applications. The user can freely use the Android smartphone as per his choice. Whereas, iOS is limited to Apple only.

Simple to use functionalities: The ROM can be easily installed and modified of the Android-based smartphones. Besides the availability of customized ROMs, there are many easy to use functionalities in Android. Moreover, the Android operating systems interface is quite simple as compared to other operating systems.

Widgets: The widgets help in accessing a variety of settings from the home screen. This makes the ergonomics to maneuver the smartphone very strong.

Availability of Google services: Google provides an array of services like Google Reader, Google Drive, Gmail, Docs, which come as a part of the Android operating system. So reading emails, and checking documents become very easy.

Disadvantages

There are also many people who don’t agree with the notion that the Android services are better than iOS.

Uninterrupted Internet Connection is required: The Android applications might be cost effective but they need a continuous and uninterrupted internet connection. A lot of money needs to be spent on costly GPRS packets.

Advertisements: Being on open source platform has some downsides too. Too many ads are posted on the play store that further slows down the pace of this operating system.

Battery Zapper: It is always an Achilles’ heels for Android, a lot of processes running in the background consume a lot of energy. The Android-based smartphones face a lot of criticism for this strength zapping weakness.

Infectious Applications: An opens source operating system invites a lot of attacks. The Android-based applications are notoriously infamous for containing malicious viruses. Some of them to mention are Ground Force, Counter-Strike, etc. Apple iOS is proud that it thoroughly checks the integrity of applications before making them available.

Track Record of Some of …

Continue reading »

Different Types And Purposes Of A Website

There are different sorts of websites that you can find on the web, and they are published online for different purposes. Individuals, enterprises and other entities aspire to obtain online presence using websites containing textual and multimedia information for relaying their personal or corporate message across the internet. The contents and design usually reveal the purpose or function of a certain website and these commonly fall into several categories. Below are some of the key categories of websites:

Business

Nearly all businesses these days, whether big or small, are now anticipated to have a website. Even local businesses nowadays have their own website because modern consumers expect businesses to be present on the web. Consumers normally turn to internet when they want to learn information about a business they consider dealing with. Businesses that are engaged in selling products and services usually perform transactions through their websites. Besides, a website is a great tool for reaching out to a broader range of potential and existing customers.

Marketing

A lot of websites concentrate too much on marketing. For instance, many article-focused websites are chiefly designed for marketing products. Moreover, online advertising shows up in numerous sites and is utilized to generate money online. Businesses usually prefer having websites, blogs and social networking profiles as a supplement to their website with the intent to promote their brands to broader range of people.

Informative

There are countless of informative websites existing on the web today. Reputable news media organizations today already use website as one of their primary publishing portals. Other sorts of informative website include those intended for particular kinds of information, such as how to perform a certain task or project and online information sheet on a specific subject.

Creative

Websites and blogs are also used for publishing or showcasing creative material. Some of these are crafted by individuals and organizations. Independent or even published writers use websites to provide access to their work through the Web. Visual artist, painters, directors and designers also publish their works online to showcase their work to a global audience for minimal financial cost.

Personal

There are individuals who create websites for personal reasons. This type of website includes websites that provides information and contact details of individuals, links of materials that are related to such as websites they are affiliated with, projects they have finished or social networking accounts. Although some people use social networking services to obtain online presence, there are still people who prefer publishing their contents on their personal blog or website.…

Continue reading »

Computer History and Impact of Computers to the World

Personal computers have completely revolutionized the way the world, lives, works and conducts business. Strictly-speaking, computers arrived on the scene way back in 1936 when one Konrad Zuse produced what was then called the Z1 computer. This was a cumbersome machine that could perform simple calculations and also crunch simple data. This was not as sophisticated as what we have today but it served to set the foundation for further research and in 1944, John Atanasoff and Clifford Berry from Iowa University built on this model and produced several innovations of the computer which was capable of producing arithmetic calculations, parallel [processing, memory regeneration and other simple computing tasks. The research was taken further at Harvard University, then IBM, the business conglomerate joined the fray and in 1953 produced what was then the world’s first sophisticated computer. Even then, it was still large, occupying entire floors and consuming untold power.

As we have mentioned, computers have completely changed the way we live and work. Today, computers are in almost every office. There are still offices in some parts of the world which still don’t have computers but this is now rare because without computers, work is inefficient and cumbersome. Take for instance calculations. It would take days for companies to do simple calculations not to mention companies that deal with lots of material and inventory. Computers make this work simple and allow businesses to become more efficient on a day to day basis.

Another use of computers is communication. With computers has come the wondrous world of the Internet or what is called in other circles, the World Wide Web or Information Superhighway. As much as computer has changed the way we work, they have also revolutionized the way we communicate. The term “the world is a smaller place” or phrases like “global market place”. This is because the Internet has made communication so easy and seamless that there has people can communicate instantaneously regardless of what part of the globe they are located. The world of email, although it hasn’t completely resulted in the eradication of snail mail, has nevertheless caused a decline in visits to the post office or the purchase of stamps. All this is because people now sit behind a computer and email back and forth. To go even further, specialized Internet software run by many major companies such as Microsoft, Yahoo and Google has made it possible to chat in real time with someone on the other side of the globe. Video conferencing has also been made possible. This has completely changed the way we conduct meetings. Businesses can now even open branches in other countries faster because the top level management can communicate with lower management via video conferencing. People can actually see each other regardless of where they are located and all this is courtesy of the advent of computers and the Internet. Computers have evolved a lot since and are now in almost half of all US households and most offices in …

Continue reading »

The Negative Side Effects of Wireless Technology and How to Minimize Troublesome Symptoms

Wireless technology is making life increasingly convenient, but with all the upside, there is a downside that may be having a huge negative impact on your overall quality of life.

Restless sleep, foggy brain, memory problems, moodiness and unexplained aches and pains are just a few symptoms that can develop as the result of exposure to wireless technology. More and more studies are indicating that constant bombardment by the intense, high-frequency radio signals that are associated with WiFi and wireless devices might even be producing more serious consequences, such as cancer, autism, and immune system disorders. By taking the ten easy steps noted below, you can reduce your risk of harm from wireless radiations and minimize uncomfortable symptoms.

  1. If you have wireless internet service, turn off the power to your router/modem boxes when your computer is not in use. Some routers are contained inside the modem. In other cases, the modem connects to a router and then those two units connect to your computer. ALWAYS turn off the power to the router before you go to bed. Just turning off your computer will not stop the high-frequency, wireless signals, which are being broadcast from an antenna inside or on top of the router box, not your computer.
  2. Cable companies and even DSL suppliers are now regularly providing routers that convert the cable or DSL signals to a high frequency radio signal, and then broadcast the signal from a small antenna inside the router box. The antenna broadcasts in all directions, with a typical broadcast radius of 100 to 500 feet or more from the antenna. Having a high frequency radio wave transmitter in your environment is like having a miniature radio station in your home or office. These aerial “wireless” signals can be picked up by any computer within appropriate range that has wireless capability. This local area wireless networking is called WiFi, which means “wireless fidelity”.

    If a router is associated with your computer set-up, do not assume that just because your computer is plugged into a cable or a phone line, that you do not have wireless service. If you can access the internet from another computer in your home that is not connected directly to a cable or DSL line, your router is broadcasting a wireless signal. You will not be able to turn off the broadcast without turning off the power to the router or switching out the box to a type of router that does not have this wireless conversion capacity.

  3. On occasion, people find that even with no wireless router, they are still picking up a wireless signal. If you have a neighbor with wireless service and you are within 300 feet of their router, their wireless signals may be broadcasting through your space. A solution here could be ask the neighbor to turn off the power to their router before they go to bed, for your sake and theirs.
  4. Turn off your cellular telephone, iPhone and other wireless communication/multi-media devices, or set them
Continue reading »

The Broad Categories of Computer Networking

For some people, the computer itself could be a scary topic, considering the fact around how complicated the machine is. Talking about computer networking could give a heart attack to such people. However, it is not as scary as it may sound.

Computer networking could be understood by separating the two words in the term. A “computer” as we know is a complex machine that helps us to process information. “Networking” refers to linking or connecting. Hence computer networking would simply mean getting two or more computers connected. When we say the word “connected” in this reference, we mean that one computer could be accessed through the other.

Broadly speaking there are two ways of connecting two or more computers. The first one is called the wired network and the other one is called the wireless network. Both of these are huge subjects to study and understand. However, in layman’s language it could be said that when two or more computers are connected through wires it’s called the wired network. And when they are connected without the wires through wireless router, it is known as wireless network. As the wired networks are limited to the area wherein the wire web is installed, similarly the wireless has range limitations. The number of machines that are on a network would ensure the speed of the network. More machines in a network would mean a slow network.

The various computer network systems could be – Personal Area Network; Local Area Network; Campus Area Network; Metropolitan Area Network; Wide Area Network; Global Network and most importantly internet, intranet or the extranet. The names are given to the network depending upon the arena they have. Like for example the campus area would mean the machines that are in a given physically limited campus are connected through the computer networking. This could be wired or wireless networking.

Internet could be understood as a global network system.…

Continue reading »