2018
DOI: 10.1007/s11277-018-5998-5
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Reliable Packet Delivery in Wireless Body Area Networks Using TCDMA Algorithm for e-Health Monitoring system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…In this phase, the sink assigns time slots to every node using TDMA. However, TDMA technique causes extra delay for sporadic synchronization (Suriyakrishnaan and Sridharan, 2018). For N number of rounds, synchronization of all sensor nodes further increases the delay, which in turn reduces the stability of the network and deplete more energy of the network.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…In this phase, the sink assigns time slots to every node using TDMA. However, TDMA technique causes extra delay for sporadic synchronization (Suriyakrishnaan and Sridharan, 2018). For N number of rounds, synchronization of all sensor nodes further increases the delay, which in turn reduces the stability of the network and deplete more energy of the network.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…These wearable sensors will be beneficial for more older people and sick individuals who cannot get to the clinic routinely for medication (Omala et al. 2018 ; Suriyakrishnaan and Sridharan 2018 ).…”
Section: Introductionmentioning
confidence: 99%
“…WBAN can be used for different medical and non-medical applications due to its remote monitoring ability. For example, it permits us to continuously monitor elderly people and chronically ill patients remotely [2]- [5]. WBAN is also used to analyze the automatic dosing in diabetics.…”
Section: Introductionmentioning
confidence: 99%
“…The collected health information is analyzed with the medical data and the treatment will be given to the patient based on the data analysis report. Since the health information about the patient is highly confidential, only the authorized doctors can access the medical information of a particular patient [5]. If the medical information is accessed by an unauthorized user, then it may be abused, distributed or it may be altered.…”
Section: Introductionmentioning
confidence: 99%