Smart mobile medical computing systems (SMDCSes), e.g., mobile medical applications use context information from the environment. To provide useful and often critical healthcare services such as continuous monitoring and control of blood glucose levels by infusion of insulin. Given the unsupervised nature of operation of SMDCSes, context changes that are unaccounted for can cause unprecedented faults leading to violation of requirements such as safety, energy sustainability and reliability. Analysis of SMDCSes for testing requirements violations necessitates consideration of context dependent interactions between the SMDCS software, Represented by discrete operating modes and its environment, represented by non-linear partial differential equations over space and time. An intractable number of context change sequence and lack of closed form solutions to differential equations makes the requirements analysis of SMDCSes a challenging task.
In this module, each mobile medical user’s personal health information (PHI), can be first collected by BSN, and then aggregated by smart phone via Bluetooth. Finally, they are further transmitted to the remote healthcare center via 3G networks. Based on these collected PHI data, medical professionals at healthcare center can continuously monitor medical users’ health conditions. As well quickly react to users’ life-threatening situations and save their lives by dispatching ambulance and medical personnel to an emergency location in a timely fashion.
In this module, Body area network (BAN), wireless body area network (WBAN) or body sensor network (BSN) are terms used to describe the application of wearable computing devices. This will enable wireless communication between several miniaturized body sensor units (BSU) and a single body central unit (BCU) worn at the human body. Deploy wearable sensors on the bodies of patients in a residential setting. Continuously monitor physiological signals (such as ECG, blood oxygen levels) and other health related information (such as physical activity)
In this Module to develop a secure and privacy-preserving opportunistic computing framework to provide high reliability of PHI process and transmission while minimizing PHI privacy disclosure in m-Healthcare emergency. Apply opportunistic computing in m-Healthcare emergency to achieve high-reliability of PHI process and transmission; and Develop user-centric privacy access control to minimize the PHI privacy disclosure
The average number of qualified helpers (NQH), which indicates how many qualified helpers can participate in the opportunistic computing within a given time period. The average resource consumption ratio (RCR), which is defined as the fraction of the resources consumed by the medical user in emergency to the total resources consumed in opportunistic computing for PHI process within a given time period.
In this module, Health care center generate crystal report from the database collection for future reference.
Existing MBE techniques can effectively analyze each of the SMDCS components individually; however, they are inadequate for analyzing the effects of dynamic context changes on the safety and sustainability of the whole SMDCS system. MBE techniques have been used individually for the four components of SMDCS
We have demonstrated a tractable randomized methodology for analyzing the effects of dynamic context changes on the interaction of SMDCS computing infrastructure with their environment. The randomized analysis can evaluate the safety and sustainability of smart mobile apps under highly probable context change sequences in polynomial time. An important extension of this work is to consider security analysis of SMDCS.
We have demonstrated a tractable randomized methodology for analyzing the effects of dynamic context changes on the interaction of SMDCS computing infrastructure with their environment. The randomized analysis can evaluate the safety and sustainability of smart mobile apps under highly probable context change sequences in polynomial time. An important extension of this work is to consider security analysis of SMDCS. We have performed initial studies on SMDCS security and will consider developing a comprehensive safety, security, and sustain-ability analysis tool.