Enhancing Healthcare Facility in Rural Areas Using Internet of Things (IoT)
DOI:
https://doi.org/10.61841/pb3srf03Keywords:
Internet of Things (IoT), Wearable Sensor, Radio-frequency Identification (RFID), Healthcare, Patients, Technology, Pulse Oximeter, Local Positioning Sensor (LPS), Global Positioning System (GPS).Abstract
Internet of Things (IoT) in recent years, facilitates in revolutionizing the introduction, and acceptance of healthcare facilities in rural areas. IoT offers a more efficient way to access healthcare and at the same time better manages the cost of implementing it. The main usage of IoT in healthcare is monitoring patients’ health conditions without having being required to be physically present. As powerful as IoT may sound, it also comes with many security challenges as well as using energy efficiently. A number of research papers have proposed multiple ways of handling these challenges and the different types of sensors used in these IoT devices. After thorough research, a combined analysis of health data recorded in several countries have also been reviewed to aid in identifying the requirements of patients especially those in remote areas. The aim of this research is to give an insight on how IoT usage in healthcare is able to revolutionize the entire industry, moving on from its traditional ways of caring for patients. This research paper is a compilation of different viewpoints of IoT in healthcare from different papers, explaining in detail why and how IoT is used in this industry and the steps taken to mitigate the challenges faced
Downloads
References
[1] Perrier, E., 2015. Positive Disruption: Healthcare, Ageing and Participation in the Age of Technology, s.l.:
The McKell Institute.
[2] Adams, D., 2011. The Internet of Things : How the Next Evolution of the Internet Is Changing Everything,
s.l.: s.n.
[3] Health Policy Institute, Georgetown University, n.d. Rural and Urban Health. [Online] Available at:
https://hpi.georgetown.edu/rural/[Accessed 30 4 2019].
[4] Niewolny, D., 2013. How the Internet of Things Is Revolutionizing Healthcare.
[5] Nguyen, H.H., 2017. A Review on IoT Healthcare Monitoring Applications and a Vision for Transforming
SensorData into Real-time Clinical Feedback.
[6] Alqahtani, F.H., 2018. The Application of the Internet of Things in Healthcare. pp. 19-23.
[7] Haghi, M., Thurow, K.D.H.I., Stoll, R. & Dr. Habil, M., 2017. Wearable Devices in Medical Internet of
Things: Scientific Research and Commercially Available Devices. PMC, pp. 4-15.
[8] Cicek, M., 2015. Wearable Technologies and its Future Applications.
[9] Malasinghe, L.P., Ramzan, N. & Dahal, K., 2019. Remote Patient Monitoring: A Comprehensive Study.
Springer Link.
[10] Spleen, A.M., Lengerich, E.J., Camacho, F.T. & Vanderpool, R.C., 2014. Health Care Avoidance Among
Rural Populations: Results From a Nationally Representative Survey.
[11] Sutton, J. & Austin, Z., 2015. Qualitatice Research: Data Collection, Analysis, and Management. NCBI.
[12] Yang, K. & Banamah, A., 2014. Quota Sampling as an Alternative to Probablity Sampling? An
Experimental Study. Sociological Research Online.
[13] Stephanie, 2015. Quota Sampling: Definitions and Examples. [Online] Available at:
https://www.statisticshowto.datasciencecentral.com/quota-sampling/[Accessed 30 4 2019].
[14] DeFranzo, S.E., 2014. Advantages and Disadvantafes of Face-to-Face Data Collection. [Online] Available
at: https://www.snapsurveys.com/blog/advantages-disadvantages-facetoface-data-collection/ [Accessed 30
4 2019].
[15] Debois, S., 2019. 10 Advantages and Disadvantages of Questionnaires (Updated 2019). [Online] Available
at: https://surveyanyplace.com/questionnaire-pros-and-cons/ [Accessed 1 5 2019].
[16] Stephens, C., 2017. Pulse Oximetry. [Online] Available at: https://www.healthline.com/health/pulseoximetry [Accessed 30 4 2019].
[17] Hasan, H.S., Hussein, M., Mad Saad, S. & Mat Dzahir, M.A., 2018. An Overview of Local Positioning
System: Technologies, Techniques and Applications.
[18] Kamel Boulos, M.N. & Berry, G., 2012. Real-Time Locating Systems (RTLS) in Healthcare: A Condensed
Primer.
[19] Koo, S. et al., 2018. Real-Time Location System-Based Asset Tracking in the Healthcare Field: Lessons
Learmed from a Feasibility Study. [Online] Available at: https://www.ncbi.nlm.nih.gov/pmc/
articles/PMC6131815/
[20] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760, ISSN
Online: 2162-2086, DOI: 10.4236/tel.2019.94049, which is in B category of ABDC
List. https://www.scirp.org/journal/Home.aspx?IssueID=12251
[21] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The
Empirical Economics Letters, Vol.18; No. 3, March 2019, ISSN: 1681-8997, which is in C category of
ABDC List. http://www.eel.my100megs.com/volume-18-number-3.htm
[22] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International
Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014. URL: https://dl.acm.org/
citation.cfm?id=2628938; DOI: 10.4018/ijbir.2014010105, which is in C category of ABDC List.
[23] P. Mary Jeyanthi, “INDUSTRY 4.O: The combination of the Internet of Things (IoT) and the Internet of
People (IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN:
0973-9785.
[24] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An
Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN
Online: 2350-1111 (Online). URL: http://www.i3cpublications.org/M-IJTS-061801.pdf
[25] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in
Financial Institutions”, Vivekananda Journal of Research Vol. 7, Special Issue 1, May 2018, ISSN 2319-
8702(Print), ISSN 2456-7574(Online). URL: http://vips.edu/wp-content/uploads/2016/09/Special-IssueVJR-conference-2018.pdf Page no: 159-164.
[26] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization Approach”,
International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.
[27] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision
Making”, International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-
2013. URL: https://www.ijert.org/browse/volume-2-2013/august-2013-edition?start=140
[28] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic
Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and
Communication Engineering, Volume 3, Issue 3, March-2014. URL: https://ijarcce.com/wpcontent/uploads/2012/03/IJARCCE7F-a-mary-prem-A-NEW-IMPLEMENTATION.pdf
[29] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical
Study”, International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.
URL: http://www.hindex.org/2015/p1258.pdf
[30] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud
Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)
[31] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment
generation in the field of UPVC widows” (ICSMS2019).
[32] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across
emerging countries”, International Conference on Sustainability Management and Strategy”
(ICSMS2018).
[33] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International
Conference on Business Management and Information Systems” (ICBMIS2015).
[34] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International
Conference on Mathematics in Engineering & Business Management (ICMEB 2012).
[35] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear
Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering
& Business Management (ICMEB 2012).
[36] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision
Making”, 2011 IEEE International Conference on Computational Intelligence and Computing Research
(2011 IEEE ICCIC).
[37] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome
the Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing
Research (2011 IEEE ICCIC).
[38] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing
and Communication Technologies. (SCCT-2015).
[39] Dr.P. Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm
for Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019
[40] Dr.P. Mary Jeyanthi, “Customer Value Management (CVM) – Thinking Inside the box” – ISBN: 978-93-
87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.
[41] Jeyanthi, P.M., & Shrivastava, S.K. (2019). The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.