4.5 Article

A Formal Testing Model for Operating Room Control System Using Internet of Things

Journal

CMC-COMPUTERS MATERIALS & CONTINUA
Volume 66, Issue 3, Pages 2997-3011

Publisher

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2021.014090

Keywords

Communication; Internet of Things; control rooms; sensors; cloud; robot

Funding

  1. Taif University Researchers Supporting Project, Taif University, Taif, Saudi Arabia [TURSP-2020/36]

Ask authors/readers for more resources

Technological advancements have transformed the operations of operating rooms significantly. This study focuses on creating a favorable environment for all operations. The system enables doctors to monitor temperature and humidity in the operating rooms and alert them in case of issues. Experimental results are visualized through web and Android applications.
Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an operation, and monitor their temperature and humidity to prepare for the operation. Also, in the event of a problem, an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved. The platform is tested using a Raspberry PI card and sensors. The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation. The result of experimentations is visualized through a web application and an Android application. The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications. We can also test and evaluate the system's existing problems and vulnerabilities using the IEEE and owasp IoT standards. Finally, the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available