Detection of Severity of Chronic Cough in Elders and Children using Machine Learning

Authors:

R.Velvizhi,P.Nandhini,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00029

Keywords:

IoT,Machine Learning,Bio patches,Classification and Regression Tree,

Abstract

Hack is a typical indication of numerous respiratory ailments. The assessment of its power and recurrence of event could give important clinical data in the appraisal of patients with endless cough. The MEMS vibration sensor is put in neck either as clumps or robes. The band-like sensor fix put on patient's body. Sensor is fueled by batteries which empowers versatility of the patient and is associated with a cell phone gadget. Cell phone transmits information to a cloud-based wellbeing stage which further conveys information and cautions restorative staff. The AI calculations gather and investigate the sound of the hacks to customize it to the client dependent on its pitch and sound profile, which is one of a kind to every individual dependent on the size and limit of his or her lungs. When hacking shows an approaching assault, the gadget transmits a message to the committed cloud-based programming through the closest cell interchanges tower. An instant message is then consequently dispatched to the cell phones of at least one guardians, cautioning them that the patient is hinting at early an assault. On the off chance that there are numerous overseers present, the first to react can utilize the cell phone to send an answer instant message to the majority of the others, informing them that the person is with or while in transit to the patient. The specialists could utilize chronicles of hacking to help analyze an ailment. [II][I]

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar J., Sriram M., “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download