Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Development of Wireless Patient’s Vital Sign Monitor Using Wireless LAN (IEEE.802.11.b/g) Protocol Achmad Rizal; Vera Suryani; Jondri Jondri; Sugondo Hadiyoso
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 6: December 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (563.464 KB)

Abstract

Vital sign monitor is typical medical instrument for basic physiological measurement. Medical practitioner assesses a patient’s health condition by observing measurement results shown in display. In this research, we designed low cost, wireless, PC-based vital sign monitor. Signals captured in designed vital sign monitor are electrocardiogram (ECG), photoplethysmogram (PPG), and body temperature. Captured data are transmitted via wireless LAN module so that medical practitioner is able to monitor patient’s condition remotely from another room or place. The system worked well for maximum transmission distance about 45 meters for LOS condition and 20 meter for NLOS condition.DOI:http://dx.doi.org/10.11591/ijece.v4i6.6429
Trust-Based Privacy for Internet of Things Vera Suryani; Selo Sulistyo; Widyawan Widyawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.138 KB) | DOI: 10.11591/ijece.v6i5.pp2396-2402

Abstract

Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.