Special Issue "Unobtrusive systems and wearable technologies for medical applications"

Submission Deadline: 31 December 2020 (closed)
Guest Editors
Prof. Vijayakumar Varadarajan, The University of New South Wales, Australia.
Dr. Carlo Massaroni, Università Campus Bio-Medico di Roma, Italy.
Prof. Emiliano Schena, Università Campus Bio-Medico di Roma, Italy.

Summary

Unobtrusive monitoring systems and wearable technologies are rapidly evolving and their use in healthcare, exercise activity monitoring, and performance assessment is promising. Wearable sensors and unobtrusive systems development have been fostered by a combination of advances in materials, fabrication techniques, electronic engineering, IoT technologies, wireless networks. Such systems may find application in the measurement of a range of physiological parameters and physical activity, in disparate scenarios and at different scopes.


Keywords
• Wearable sensing systems (including flexible and tattoo sensors and electronics)
• Unobtrusive sensing systems, techniques and methods
• Metrological characterization of wearable devices and unobtrusive monitoring systems
• Unobtrusive and wearable systems: prototypes and applications in medicine and sport science
• Sensor miniaturization and manufacturing techniques
• Data fusion or signal processing of body-related quantities
• Innovative applications and case studies

Published Papers
  • ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing
  • Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks like spoofing, replay, Masquerade, and… More
  •   Views:314       Downloads:214        Download PDF