(3.235.11.178) 您好!臺灣時間:2021/03/05 16:18
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳志成
研究生(外文):Chen, Chih-Cheng
論文名稱:智慧型射頻辨識醫療照護系統
論文名稱(外文):Intelligent RFID Health-Care Systems
指導教授:賴永齡賴永齡引用關係
指導教授(外文):Lai, Yeong-Lin
學位類別:博士
校院名稱:國立彰化師範大學
系所名稱:機電工程學系
學門:工程學門
學類:機械工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:104
中文關鍵詞:射頻辨識老人長期照護PDARSA對稱式加密行動裝置數位簽章智慧卡
外文關鍵詞:Radio Frequency Identification (RFID)Long-Term Care of EldersPDARSASymmetric CryptographyMobile DevicesDigital SignatureSmart Cards
相關次數:
  • 被引用被引用:0
  • 點閱點閱:284
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
近來台灣人口老化與少子化的問題引起社會熱烈的討論,對於銀髮族安養或是長期照護的議題逐漸被大眾所關注。科技的發達使得許多的醫療內容服務的產品與資訊內容不斷地被數位化,為了追求更方便且有效率的生活方式,各式各樣的科技產品也被個人化、行動化,以方便、滿足人們可以無時無刻、隨時隨地就能處理各種事務。例如行動使用者可透過行動設備(如手機、個人數位助理)進行網路交易行為。發展至今,行動化裝置再也不是只能僅僅做語音通話功能,除了通訊功能外,更具備了個人數位助理(Personal Digital Assistant, PDA)的功能。科技的進步,不但使企業活動有效率,也提供消費者擁有更貼心、更便利的服務。
基於這樣的發展趨勢,在本研究中我們發展了一個在行動化裝置上的醫療數位加值服務平台。其次我們整合密碼學上的相關驗證機制(例如公開金鑰系統、秘密金鑰系統和數位簽章)、無線網路、網頁及SQL等相關技術進而建構出一個創新性的行動醫療加值服務系統。使得消費者能夠以一個行動化裝置手持式裝置在具有無線通訊網路架構下的任何地方,進行存取使用者所需求的醫療加值服務;讓交易的雙方都能安全地進行資料交換,提高系統的安全性,以確保交易的安全性與可信度。
本論文將以行動裝置、智慧卡、數位簽章、跌倒判斷、無線射頻識別技術 Radio Frequency Identification (RFID)為基礎,規劃一個創新性的行動醫療加值服務系統。其方法是利用無線傳輸的特性,將年長者及時狀態,諸如站立坐下躺下等動作,傳送到中控主機,這可以預防老年人跌倒。倘若老年人意外跌倒後,能做第一時間緊急通報,醫護人員也能隨時隨地掌握老人生理狀況以便給有充足病理資訊,作為診斷之依據進而提升照護品質。
老年人的健康照護是一個很重要的議題,本論文提出一個全方位的醫療整合服務流程,包含以智慧卡為基礎發展出來的健康檢查報告,到RFID 跌倒通報系統。如果在家中老年人在家中不慎跌倒,照護系統則可隨時監測老人生理資訊。若此時老人需要藥物治療及長期照護,那麼本文技術即是關鍵。所以本博士論文的貢獻是透過事前健康檢查的預防,經由跌倒通報系統監控,再經由長期照護系統,以及用藥安全管理系統讓老人用藥得以有保障,建構出一個完備的醫療服務體系。

Recently, the increasing of the aging population and decreasing of low birth rate have been causing the radical discussion in the society. The issues about senior nursing or long term care have been addressed in public.With the improvement of modern technology, numerous medical services have been digitalized constantly in our daily life. In order to be more convenient and efficient, a wide variety of high technological products have also been personalized, mobilized, so people can handle their businesses anytime and anywhere. For example, mobile users can perform the Internet transactions via mobile devices (such as cell phone and Personal Digital Assistant). Nowadays, the mobile devices are not only used in communication, but it can be combined with Personal Digital Assistant (PDA) functions. The progress of technology makes the commercial activities efficient; moreover, it provides consumers with more convenient and intimate services.
Due to the tendency of the technology development, we implement a digital value-added services platform via the mobile device in this dissertation. We integrate the related cryptography mechanisms (for example: public key infrastructure, symmetric cryptography and digital signature) wireless and SQL technologies to construct an inhttp://libproxy.ncue.edu.tw/cgi-bin/cdrfb3/gsweb.cgitelligent RFID medical health care system. The consumer can use a mobile device to get a requested value-added service so that the buyers and sellers can exchange data and perform a secure transaction. Therefore, the security and reliability of the system are assured in our scheme.
On the basis of mobile devices, digital signature, smart cards, and radio frequency identification (RFID), a novel mobile medical value-added service system is proposed in this dissertation. The method is to use the feature of wireless transmission. The elders’ real-time physical conditions, such as standing, sitting, and lying, can be transmitted to the server. By doing so, this can prevent the elders from falling. Since the elders’ physiological data can immediately be gasped, the medical staff can have sufficient pathological information as diagnosis to offer medical treatment. Besides, the wireless transmission can be integrated with computer network techniques to establish a complete monitor system to upgrade medical quality.
The elders’ health care is of significance. I propose a full range of medical integration service process, including the smart-card based health examination report and the RFID fall notification system. If the elderly accidentally fall down at home, the health care system can monitor their physiological data at any time. If the elderly need medical treatment or long term care, the techniques mentioned here are the key to elderly health. Therefore, the contribution of the dissertation is to provide the prediction of health examination in advance, the monitoring of fall notification system, the long term care system, and medication management system to guarantee the elders’ medication. All these systems constitute a well-equipped medical service system.

Contents page
中文摘要 I
Abstract III
Acknowledgements V
Contents VI
Figure Caption IX
Table Caption XI
Chapter 1 Introduction 1
1-1 Background and motivation 1
1-2 Research methods 2
1-3 Structure of the dissertation 6
Chapter 2 Fundamental theories 7
2-1 Introduction to RFID 7
2-2 RSA cryptographic algorithm 8
2-3 Signature with one-way Hash Function 9
2-4 Research methods 10
Chapter 3 A mobile secure transaction system for applications of medical treatment examination reports 11
3-1 Introduction 11
3-1-1Related works 12
3-1-2 System requirements 15
3-2 TheProposedscheme 16
3-2-1 Notations 19
3-2-2 Registration phase 20
3-2-3 Login phase 21
3-2-4 Verification phase 22
3-2-5 Password modification phase 24
3-3 Security analysis and discussions 27
3-3-1 Security analysis 27
3-3-2 Discussions and comparisons 28
3-4 The summary of a mobile secure transaction system for applications of medical treatment examination reports 31
Chapter 4 An avanced RFID system for fall notification 33
4-1 Introduction 33
4-2 System structure 36
4-2-1 System architecture 36
4-2-2 Information flow 37
4-2-3 Reader architecture 38
4-2-4 Tag architecture 39
4-2-5 DPCM (Differential Pulse Code Modulation) 40
4-3 Fall detection and notification 41
4-4 Experimental results, analysis, and discussions 43
4-5 The summary of an advanced RFID system for fall notification . 47
Chapter 5 A novel dual-band RFID Long-Term-Care systems 48
5-1 Introduction 48
5-2 Research methodology and system structure 51
5-2-1 System architecture 51
5-2-2 Data transferring 53
5-2-3 Function plan and lab platform 55
5-2-4 The 2.45G Hz active reader spec 56
5-2-5 The 2.45G Hz active tag spec 57
5-2-6 13.56MHz passive tag spec 57
5-3 Experimental results and discussions 58
5-4 Characteristics 61
5-5 The summary of a novel dual-band RFID long-term-care
systems 64
Chapter 6 A non-repudiated RFID medication safety systems65 6-1 Introduction 65
6-2 The proposed scheme 66
6-2-1 Notations 70
6-2-2 Registration phase 71
6-2-3 Prescription phase 71
6-2-4 Medication-dispensed phase 73
6-2-5 Prescription change phase 75
6-3 Security analysis and discussions 75
6-3-1 Security analysis 75
6-3-2 Authentication analysis 76
6-3-3 Integrity analysis 76
6-3-4 Non-repudiation analysis 77
6-4 System demo and discussions 78
6-5 Operation procedure of RFID AMDM 78
6-6 The summary of non-repudiated RFID medication safety system 81
Chapter 7 Conclusions and future outlook 82
7-1 Conclusions 82
7-2 Future outlook 84
References 85
Vita and Publications 101
Publications 102


Figure Caption
Figure 3.1 A flow chart of the mobile medical treatment examining report Transaction system based on smart cards 16
Figure 3.2 A registration phase flow chart phase 20
Figure 3.3 A login phase flow chart 21
Figure 3.4 A verification phase flow chart23
Figure 3.5 A password modification flow chart 25
Figure 4.1 System architecture of dual-band RFID intelligent fall notification systems37
37
Figure 4.2 System architecture of dual-band RFID intelligent fall notification systems38
Figure 4.3 Block diagram of 2.45 GHz fall and voice tag39
Figure 4.4 Voice and data transformations of the 2.45 GHz fall and voice tag 42
Figure 5.1 System architecture of dual-band RFID LTC system52
Figure 5.2 Network structure of dual-band RFID LTC system 53
Figure 5.3 Data transferring flow diagram of dual-band RFID LTC system. 54
Figure 5.4 Lab experiment platform .55
Figure 5.5 2.45 GHz Reader . 56
Figure 5.6 Case study of dual-band RFID LTC system . . 59
Figure 5.7 Functions of access control system, patients’ information and abnormal messages. . .60
Figure 6.1 Processes and functions of proposed scheme..68
Figure 6.2 Overview of prescription phase . 72
Figure 6.3 Overview of medication-dispensed phase. . . . .73
Figure 6.4 RFID AMDM . . 78
Figure 6.5 Structure diagram of RFID AMDM. . . .79
Figure 6.6 Integration system of RFID AMDM . . .79


Table Caption

Table 2.1 RFID tag types. . . . . . . . . . . . . . .. 8
Table 3.1 A comparison of related smart card-based systems 32
Table 4.1 Characteristics of the 2.45 GHz fall and voice tags 40
Table 4.2 Transmission characteristics of audio signals.44
Table 4.3 A comparison of fall notification systems . 46
Table 5.1 A comparison of RFID LTC systems . . 63
Table 6.1 Non-repudiation proofs of the proposed scheme 77
Table 6.2 Comprehensive analysis of KPI . . . . . . 80






References
[1] E. Teaw, G. Hou, M. Gouzman, K. W. Tang, A. Kesluk, M. Kane, and J. Farrell, “A wireless health monitoring system,” in Proc. Int. Conf. Information Acquisition, Hong Kong and Macau, China, pp. 247–252, Jun.–Jul. 2005.
[2] Business Weekly, http://www.businessweekly.com.tw/ Access available 2010/5/30.
[3] MIC (Market Intelligence Center), http://mic.iii.org.tw/english/ Access available 2010/5/30.
[4] C. H. Chang, and W. L. Wang, “RFID System,” Tsang Hai Book, Taiwan, 2008.
[5] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed, Wiley, 2003, UK.
[6] C. M. Roberts, “Radio frequency identification (RFID),” Journal Computer & Security, vol. 25, no. 1, pp. 18–26, Feb. 2006.
[7] S. L. Garfinkel, “Public key cryptography,” Computer, vol. 29, no. 6, pp. 101–104, June 1996.
[8] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communications of the ACM, vol. 21, pp. 120–126, 1978.
[9] Y. -Y. Chen, J. -K. Jan, and C. -L. Chen, “A fair and secure mobile billing system,” Computer Networks, vol. 48, no. 4, pp. 517–524, Jul. 2005.
[10] S. Goldwasser, “The search for provably secure cryptosystems,” in Proceedings Symposia in Applied Mathematics, vol. 42, pp. 89–113, 1990.
[11] J. Buchmann, “Introduction to Cryptography,” 2nd, Springer-Verlag, New York, pp. 27, 2004.
[12] L. Lamport, “Password authentication with insecure communication,” Communication of the ACM, vol. 24, no. 11, pp. 770–772, 1981.
[13] M.-S. Hwang, and L.-H. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 1, no. 46, pp. 28–30, 2000.
[14] H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, “An efficient and practical solution to remote authentication: smart card,” Computers & Security, vol. 21, no. 4, pp. 372–375, Aug. 2002.
[15] H.-F. Huang, and W.-C. Wei, “A new efficient and complete remote user authentication protocol with smart card, ”International Journal of Innovative Computing, Information and Control, vol. 4, no. 11, pp. 2803–2808, 2008.
[16] W.-C. Ku, and S.-M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronic, vol. 50, no. 1, pp. 204–207, 2004.
[17] M. Kumar, On the weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, Cryptology ePrint Archive: Report 163, http://eprint.iacr.org/complete/.
[18] C.-C. Chang, and J.-S Lee, “A smart-card-based remote authentication scheme,” Proceedings of the Second International Conference on Embedded Software and Systems (ICESS’05), pp. 1–5, Dec. 16–18, 2005.
[19] S.-T. Wu, and B.-C. Chieu, “A user friendly remote authentication scheme with smart cards,” Computers & Security, vol. 22, no. 6, pp. 547–550, Sep. 2003.
[20] E.-J. Yoon, and K.-Y. Yoo, “More efficient and secure remote user authentication scheme using smart cards,“ Proceedings of 11th International Conference, vol. 2, pp. 73–77, 2005.
[21] S.-W. Lee, H.-S. Kim, and K.-Y. Yoo, "Improved efficient remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 565–567, 2004.
[22] A. K. Awasthi, “Comment on a dynamic ID-based remote user authentication scheme,” Transaction on Cryptology, vol. 1, no. 2, pp. 15–17, 2004.
[23] M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Trans. Consumer Electronics, vol. 50, no. 2. pp. 629–631, 2004.
[24] M. Misbahuddin, M. A. Ahmed, A. A. Rao, C. S. Bindu, and M. A. M. Khan, “A novel dynamic ID-based remote user authentication scheme,” 2006 Annual India Conference, pp. 1–5, 2006.
[25] X.-M. Wang, W.-F. Zhang, J.-S. Zhang, and M.-K. Khan, “Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards,” Computer Standards & Interfaces, vol. 29, no. 4, pp. 507–512, 2007.
[26] Fujitsu Company, http://www.fujitsu.com/sg/services/computing/pc/notebooks/useries/u2010/index.html. Access available 2010/5/30.
[27] C.-L. Chen, “An “All-In-One” Mobile DRM System Design,” The International Journal of Innovative Computing, Information and Control, vol. 6, no. 3A, pp. 897–911, March 2010.
[28] G. Kardas, and E. T. Tunali, “Design and implementation of a smart card based healthcare information system,” Computer Methods and Programs in Biomedicine, vol. 81, no. 1, pp. 66–78, Jan. 2006.
[29] C.-L. Chen, Y.-Y. Chen, and Y.-H. Chen, “Group-based authentication to protect digital content for business applications,” The International Journal of Innovative Computing, Information and Control, vol. 5, no. 5, pp. 1243–1251, May. 2009.
[30] M. Markovic, “On secure e-health systems,” Lecture Notes in Computer Science, vol. 4302/2006, no. 5, pp. 360–374, Nov. 2006.
[31] C.-J Li, L. Liu, S.-Z. Chen, C.-C. Wu, C.-H. Huang, and X.-M. Chen “Mobile healthcare service system using RFID,” IEEE Networking, Sensing and Control, vol. 2, Taipei, Taiwan, pp. 1014–1019, Mar. 2004.
[32] M. Chen, S. Gonzalez, V. Leung, Q. Zhang, and M. Li, “A 2G-RFID-based e-healthcare system,” Proc. of IEEE Conf. Wireless Communications, pp. 37–43, Feb. 2010.
[33] D. L. Hudson, and M. E. Cohen, “Intelligent agent model for remote support of rural healthcare for the elderly,” Proc. of the 28th IEEE Conf. on Engineering in Medicine and Biology Society, California, San Francisco, USA, pp. 6332–6335, 2006.
[34] C.-C. Lin, M.-J. Chiu, C.-C. Hsiao, R.-G. Le, and Y.-S. Tsai, “Wireless health care service system for elderly with dementia,” IEEE transactions on Information Technology in Biomedicine. vol. 10, no. 4, pp. 696–704, Oct. 2006.
[35] J. A. Stevens, P. S. Corso, E. A. Finkelstein, and T. R. Miller, “The costs of fatal and nonfatal falls among older adults,” Injury Prevention, vol. 12, pp. 290–295, 2006.
[36] H. Xie, T. Chaussalet, and P. Millard, “A tool for studying the effects of residents' attributes on patterns of length of stay in long-term care,” Proc. of the 18th IEEE International Conf. on Computer-Based Medical Systems, vol. 23-25, pp. 473–478, Jun. 2005.
[37] H. Kanai, G. Tsuruma, T. Nakada, and S. Kunifuji, “Notification of dangerous situation for elderly people using visual cues,” Proc. of International Conf. on Intelligent User Interfaces, pp. 345–348, 2008.
[38] A. Arcelus, M. H. Jones, R. Goubran, and F. Knoefel, “Integration of smart home technologies in a health monitoring system for the elderly,” Advanced Information Networking and Applications Workshops , 21st International Conference 2007, vol. 2, pp. 820–825, 2007.
[39] A. Sixsmith, and N. Johnson, “A smart sensor to detect the falls of the elderly,” IEEE Pervasive Computing,” vol. 3, no. 2, pp. 42–47, April, 2004.
[40] M. N. Nyan, F. E. H. Tay, M. Manimaran, and K. H. W. Seah, “Garment-based detection of falls and activities of daily living using 3-axis MEMS accelerometer,” International MEMS Conference 2006, vol. 34, pp. 1059–1067, 2006.
[41] U. Maurer, A. Rowe, A. Smailagic, and D. P. Siewiorek, “eWatch: a wearable sensor and notification platform,” Wearable and Implantable Body Sensor Networks, Cambridge, MA, pp. 141–145, April. 2006.
[42] Y. Seo, T. Asano, H. Lee, and K. Kim, “A lightweight protocol enabling ownership transfer and granular data access of RFID tags,” Proc. of Symposium Conf. on Cryptography and Information Security, Sasebo, Japan, pp. 23–26, 2007.
[43] N. Raza, V. Bradshaw, and M. Hague, “Applications of RFID technology,” Proc. of IEEE International Conf. on RFID Technology, pp. 1/1–1/5, Oct. 1999.
[44] G. Steiner, H. Zangl, P. Fulmek, and G. Brasser, “A tuning transformer for the automatic adjustment of resonant loop antennas in RFID systems,” Proc. of IEEE International Conf. on Industrial Technology, vol. 2, pp. 912–916, Dec. 8-10, 2004.
[45] I.-C. Lin, C.-W. Yang, and S.-C. Tsaur, “Noidentifiable RFID privacy protection with ownership transfer,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 5, pp. 2341–2352, 2010.
[46] M. Buckner, R. Crutcher, M. R. Moore, and B. Whitus, “Miclog RFID tag program enables total asset visibility”, Proc. of IEEE International Conf. on MILCOM, vol. 2, pp. 1422–1426, 2002.
[47] W. D. Yu, P. Ray, and Y. Motoc, “A RFID technology based wireless mobile multimedia system in healthcare,” Proc. of the 8th International Conf. on E-Health Networking, Applications and Services, pp. 1–8, 2006.
[48] D.-G. Yun, J.-M. Lee, M.-J. Yu, and S.-G. Choi, “Agent-based user mobility support mechanism in RFID networking environment,” IEEE Trans. Consumer Electron, vol. 55, no. 2, pp. 800–804, 2009.
[49] H. Jabbar, T. Jeong, H. Hwang, and G. Park, “Viewer identification and authentication in IPTV using RFID Technique,” IEEE Trans. Consumer Electron, vol. 54, no. 1, pp. 105–109, Feb. 2008.
[50] Y.-S. Yen, F.-Lin, and H.-C. Chao, “Integrated residential gateway: easy IA management with P2P community using RFID,” IEEE Trans. Consumer Electron, vol. 51, no. 3, pp. 824–830, Aug. 2005.
[51] R. Tesoriero, J. A. Gallud, M. D. Lozano, and V. M. R. Penichet, “Tracking autonomous entities using RFID technology,” IEEE Trans. Consumer Electron, vol. 55, no. 2, pp. 650–655, May. 2009.
[52] R. Tesoriero, J. A. Gallud, M. D. Lozano, and V. M. R. Penichet, “Using active and passive RFID technology to support indoor location-aware systems,” IEEE Trans. Consumer Electron, vol. 54, no. 2, pp. 578–583, 2008.
[53] S. S. Manapure, H. Darabi, V. Patel, and S. Banejee, “A comparative study of radio frequency-based indoor location sensing & systems,” Proc. of IEEE International Conf. on Networking, Sensing and Control, Taipei, Taiwan, vol. 2, pp. 1265–1270, 2004.
[54] H. Hontani, M. Nakagawa, T. Kugimiya, K. Baba, and M. Stao, “A visual tracking system using an RFID-tag,” Proc. of Conf. on SICE Annual, vol. 3, pp. 2720–2723, 2004.
[55] T. Cao, and P. Shen, “Cryptanalysis of two RFID authentication protocols,” International Journal of Network Security, vol. 9, no. 1, pp. 95–100, July. 2009.
[56] S. L. Garfinkel, A. Juels, and R. Pappu, “RFID Privacy: An overview of problems and proposed Solutions,” IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 34–43, 2005.
[57] S. Han, H. Lim, and J. Lee, “An efficient localization scheme for a differential-driving mobile robot based on RFID system,” IEEE Trans. Ind. Electron, vol. 54, no. 6, pp. 3362–3369, Dec. 2007.
[58] L. Hong, and C. Tianjie, “RFID protocol enabling ownership transfer to protect against Traceability and DoS attacks,” IEEE First International Symposium on Data, Privacy and E-Commerce. pp. 508–510, 2007.
[59] A. D. Henrici, and P. MAuller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,” Proc. of the PerSec'04 Conf. on PerCom, pp. 149–153, March. 2004.
[60] A. Juels, “Strengthening EPC tags against cloning,” Proc. of the 4th ACM workshop on Wireless security, pp. 67–76, March. 2005.
[61] K. H. S. S. Koralalage, S. M. Reza, J. Miura, Y. Goto, and J. Cheng, “An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism,” In Proc. ACM symposium on Applied computing, pp. 270–275, New York, NY, USA, 2007.
[62] D. Molnar, A. Soppera, and D. Wagner, “A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags,” Selected Areas in Cryptography - SAC 2005, LNCS, vol. 3897/2006, pp. 276–290, 2006.
[63] K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An efficient and secure RFID security method with ownership transfer”, Proc. of IEEE International Conf. on Computational Intelligence and Security, vol. 2 pp. 3–6, 2006.
[64] J. Saito, J. C, Ryou, and K. Sakurai, “Enhancing privacy of universal re-encryption scheme for RFID tags,” Lecture Notes in Computer Science, EUC 2004, LNCS, vol. 3207, pp. 879–890, 2004.
[65] Y. Seo, T. Asano, H. Lee, and K. Kim, “A lightweight protocol enabling ownership transfer and granular data access of RFID tags,” In Proc. Symposium on Cryptography and Information Security Sasebo, Japan, pp. 23–26, Jan. 2007.
[66] B. Toiruul, and K. Lee, “An advanced mutual-authentication algorithm using AES for RFID systems,” In International Journal of Computer Science and Network Security, vol. 6, no. 9B, pp. 156–162, 2006.
[67] S. Weis, S. Sarma, R. Rivest, and D. Engels, “Security and privacy aspects of low-cost radio frequency identification systems,” Proc. of the 1st IEEE Conf. on Security in Pervasive Computing, pp. 12–14, 2003.
[68] H. C. Hsieh, J. S. Leu, and W. K. Shih, “Reaching consensus underlying an autonomous local wireless sensor network,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 4, pp. 1905–1914, April. 2010.
[69] P. C. Tseng, C. Y. Chen, W. S. Hwang, J. S. Pan, and B. Y. Liao, “Qos-aware residential gateway supporting Zigbee-related services based on a service-oriented architecture,” International Journal of Innovative Computing, Information and Control, In press, vol. 6, no. 6, pp. 2803–2816, 2010.
[70] M. Singh, M. Sethi, N. Lal, and S. Poonia, “A tree based routing protocol for mobile sensor networks,” International Journal of Computer Sciences and Engineering Systems, vol. 1, no. 2, pp. 50–60, 2010.
[71] G. S. Binu, and K. P. Jacob, “A channel adaptive MAC protocol with traffic aware distributed power management in wireless sensor networks,” IJCSNS International Journal of Computer Science and Network Security, vol. 10, no. 7, pp. 177–182, July. 2010.
[72] M. K. J. Kumar, and R. S. Rajesh, “Distributed positioning technique in wireless Ad Hoc sensor networks,” International Journal of Computer Sciences and Engineering Systems, vol. 2, no. 3, pp. 193–199, July. 2008.
[73] Y. J. Zhao, R. Govindan, and D. Estrin, “Residual energy scan for monitoring sensor networks,” Proc. of the IEEE Conf. on Wireless Communications and Networking, Orlando, FL,USA, vol. 1, pp. 356–362, Mar. 2002.
[74] R. D. Pietro, L. V. Mancini, and A. Mei, A. “Random key-assignment for secure wireless sensor networks.” In Proceedings of ACM workshop on Security of ad hoc and sensor networks, Fairfax, VA, USA, pp. 62–71, 2003.
[75] E. J. D. Duarte-Melo, and M. Liu, “Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks,” Proc. of the IEEE Conf. on Telecommunication, pp. 21–25, 2002.
[76] C. Schurgers, and M. B. Srivastava, “Energy efficient routing in wireless sensor networks,” Proc. of the IEEE Conf. on Military Communications, vol. 1, pp. 357–361, 2001.
[77] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks: International Journal of Computer and Telecommunications Networking, vol. 38, no. 4, pp. 393–422, March. 15, 2002.
[78] J. Levendovszky, A. Bojárszky, B. Karlócai, and A. Oláh, “Energy balancing by combinatorial optimization for wireless sensor networks,” WSEAS transactions on communications, vol. 7, no. 2, pp. 27–32, Feb. 2008.
[79] T. J. Chan, C. M. Chen, Y. F. Huang, J. Y. Lin, and T. R. Chen, “Optimal cluster number selection in ad-hoc wireless sensor networks,” WSEAS transactions on communications, vol. 7, no. 8, pp. 837–846, August. 2008.
[80] R. S. Yadav, and K. Singh, “Overview of secure network system,” International Journal of Computer Sciences and Engineering Systems, vol. 1, no. 4, Oct. 2007.
[81] K. Yamamoto, and M. Iwakiri, “Real-time audio watermarking based on characteristics of PCM in digital Instrument,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 2, pp. 59–71, 2010.
[82] H. Sayoud, and S. Ouamour, “Proposal of a new confidence parameter estimating the number of speakers -an experimental investigation,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 2, pp. 101–109, 2010.
[83] D. H. Kang, J. H. Chio, Y. H. Lee, and C. Lee, “Applications of a DPCM system with median predictors for image coding,” IEEE Trans. Consumer Electron, vol.38, no. 3, pp. 429–435, 1992.
[84] D. Goodman, “Embedded DPCM for variable bit rate transmission,” IEEE Trans. communications, vol. 28, no. 7, pp.1040–1046, 1980.
[85] R. Link, and S. Kaellal, “Optimal use of markov models for DPCM picture transmission over noisy channels,” IEEE Trans. communications, vol. 48, no. 10, pp. 1702–1711, 2000.
[86] M. H. Chan, “The performance of DPCM operating on lossy channels with memory,” IEEE Trans. communications, vol. 43, no. 234, pp. 1686–1696, 1995.
[87] J. E Essman, and P. A. Wantz, “The effects of channel errors in DPCM systems and comparison with PCM systems,” IEEE Trans. communications, vol. 21, no. 8, pp. 867–877, Aug. 1973.
[88] A. N. Kim, and T. A. Ramstad, “Improving the Rate-distortion performance of DPCM using multirate processing With Application in Low-Rate Image Coding,” IEEE Trans. Signal.Processing, vol. 55, no. 10, pp. 4958–4968,2007.
[89] T. Eger, and L. Varner, “A novel adaptive predictor DPCM system for speech signals,” Proc. of IEEE International Conf. of the ICASSP’81 IEEE Conf on Acoustics, Speech, and signal Processing, Hong Kong and Macau, China, pp. 623–626, April. 1981.
[90] P. Pirsch, “Stability conditions for DPCM Coder,” IEEE Trans. communications, vol. 30, no. 5, p.1174–1184,1982.
[91] N. Jia, Detecting human falls with a 3-axis digital accelerometer, Analog dialog Devices, vol. 43, no. 7, pp. 1–7, 2009.
[92] H. S. Chen, M. J. Su, T. H. Tsai, S. S. Teng, H. W. Zhang, L. S. Lai, F. P. Lai and C. Y. Chen, “U-care for the elderly: implementation of a Comprehensive Living and Health Care Network,” in Proc. 9th Int. Conf. E-Health Networking, Applications and Services, pp. 187–190, Jul. 2006.
[93] H. Xie, T. Chaussalet, and P. Millard, “A tool for studying the effects of residents' attributes on patterns of length of stay in long-term care,” Proc. 18 Int. Conf. Computer-Based Medical Systems, pp. 473–478, Jun. 2005.
[94] P. H. Cheng, T. H. Yang, H. S. Chen, K. P. Hsu, S. J. Chen and L. S. Lai “Codesign of a healthcare enterprise information portal and hospital information systems,” in Proc. 7th Int. Conf. Enterprise networking and Computing in Healthcare Industry, pp. 446–449, Jun. 2005.
[95] D. L. Hudson, and M. E. Cohen, “Intelligent agent model for remote support of rural healthcare for the elderly,” in Proc. EMBS 28th Annual. New York City, USA, pp. 6332–6335, Aug–Step. 2006.
[96] N. Raza, V. Bradshaw, and M. Hague, “Applications of RFID technology,” in Proc. IEEE Int. Conf. on RFID Technology, pp. 1/1–1/5Oct. 1999.
[97] R. Shahriyar, M. F. Bari, G. Kundu, S. I. Ahamed, and M. M. Akbar, “Intelligent Mobile Health Monitoring Systems,” International Journal of Control and Automation, vol. 2, no. 3, pp. 13–28, Sep. 2009.
[98] C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, “RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards,” Int. J. Network Security, vol. 13, no. 1, pp. 41–48, July. 2011.
[99] G. Steiner, H. Zangl, P. Fulmek, and G. Brasser, “A tuning transformer for the automatic adjustment of resonant loop antennas in RFID systems,” in Proc. IEEE Int. Conf. on Industrial Technology, vol. 2, pp. 912–916, Dec. 2004.
[100] M. Buckner, R. Crutcher, M. R. Moore, and B. Whitus, “MICLOG RFID tag program enables total asset visibility,” in Proc. IEEE Int. Conf. on MILCOM, vol. 2, pp. 1422–1426, Oct. 2002.
[101] S. W. Wang, W. H. Chen, C. S. Ong, L. Liu, and Y. W. Chuang, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital,” Proceedings of the 39th Hawaii International Conference on System Sciences, vol. 8, Washington, DC, USA, pp. 184A, 2006.
[102] A. Lahtela, M. Hassinen, and V. Jylha, “RFID and NFC in healthcare: safety of hospitals medication care,” in Proceedings of Second International Conference on Pervasive Computing Technologies for Healthcare, pp. 241–244, Jan. 2008,.
[103] S. L. Ting, S. K. Kwok, A. H. Tsang, and W. B. Lee “Critical elements and lessons learnt from the implementation of an RFID-enabled healthcare management system in a medical organization.” Journal of Medical Systems, 2009
[104] J. H. Park, J. A. Seol, and Y. H. Oh, “Design and implementation of an effective mobile healthcare system using mobile and RFID technology,” in Proc. 7th Int. Conf. Enterprise networking and Computing in Healthcare Industry, pp. 263–266, Jun. 2005.
[105] D. W. Bates, D. J. Cullen, N. Laird, L. A. Petersen, S. D. Small, D. Servi, G. Laffel, B. J. Sweitzer, B. F. Shea, R. Hallisey, M. V. Vliet, R. Nemeskal, and L. L. Leape, “Incidence of adverse drug events and potential adverse drug events. Implications for prevention. ADE Prevention Study Group,"JAMA vol. 247, no. 1, pp. 29–34, 1995.
[106] P. Aspden, J. A. Wolcott, J. L. Bootman, and L. R. Cronenwett, “Preventing medication errors,” The National Academies Press, Washington, DC, 2007.
[107] B. V. D. Castle, J. Kim, M. L. G. Pedreira, A. Paisa, W. Goossen, and D. W. Bates, “Information technology and patient safety in nursing practice: an international perspective,” International Journal of Medical Informatics, vol. 73, pp. 607–614, 2004.
[108] P. R. Sun, B. H Wang, and F. Wu,”A new method to guard inpatient medication safety by the implementation of RFID,” Journal of Medical System, vol. 32, pp. 327–332, 2008.
[109] M. R. Chassin, and E. C. Becher, “The wrong patient,” Ann. International. Medical, vol. 136, pp. 826–833, 2002.
[110] W. L. Wang, and C. H Lin, “A study of two-dimensional barcode prescription system for pharmacist’s activities of NHI contracted pharmacy,” Journal of the Pharmaceutical Society of Japan, vol. 128, no. 1, pp. 123–127, 2008.
[111] M. Kamei, K. Teshima, N. Fukushima, and T. Nakamura, “Investigation of patients' demand for community pharmacies: relationship between pharmacy services and patient satisfaction,” Journal of the Pharmaceutical Society of Japan, vol. 121, no. 3, pp.215–220, 2001.
[112] H. Y. Chien, C. C. Yang, and T. C. Wu, “Two RFID -based Solutions to enhance inpatient medication safety,” Journal of Medical System, vol. 35, pp. 369–375, 2011.
[113] H. H. Huang, C. Y. Ku, and T. C. Wu, “A RFID grouping proof protocol for medication safety of inpatient,” Journal of Medical System, vol. 33, no. 6 pp. 467–474, 2011.



連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔