Professional Documents
Culture Documents
Falldetectionsystem PDF
Falldetectionsystem PDF
net/publication/368289020
CITATIONS READS
0 310
4 authors, including:
Radovan Stojanovic
University of Montenegro
183 PUBLICATIONS 1,146 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Radovan Stojanovic on 05 February 2023.
Professor: Students:
2. Introduction
Falling is the most significant cause of injury in the elderly. Most of the
elderly (over 75 years old) fell at least once a year, and 24% of them
have serious injuries. This is a serious public health problem with a
significant impact on health and health care costs. The cost and burden
of caring for older adults continues to rise. Among people affected by
Alzheimer's disease, the probability of falling increases by three times.
Elderly care can be improved by using sensors that monitor patients'
vital signs and activities, and remotely transmit this information to
loved ones and caregivers. The consequences of a fall can range from
scratches to fractures and in some cases lead to death. Even if there are
no immediate consequences, a long wait on the floor for help increases
the likelihood of death from an accident. For that reason, fall detection
is an active area of research. In recent years, passive monitoring
solutions have taken root in health monitoring systems in homes, living
environments and nursing homes. They ensure timely interventions in
emergencies. Most research on falls in which accelerometers are issued
focuses on determining the change in magnitude of acceleration. When
the acceleration value exceeds the critical threshold, a fall is detected.
The use of wearable and active sensors provides better tracking
capability. The contribution to such standardization is made by
collecting the most relevant parameters, data filtering techniques and
testing approaches from the studies done so far. State-of-the-art fall
detection techniques are examined, highlighting differences in their fall
detection effectiveness. A standard fall study database structure has
been created that highlights the most important elements of a fall
detection system that must be considered to design a robust system, as
well as to address limitations and challenges. However, focusing only
on high acceleration can lead to many false positives for fall-like
activities such as rapid descent and running.
The benefits of IoT span all areas of lifestyle and business. Here is
a list of some of the benefits IoT can offer:
• Improved customer engagement – Current analytics suffer from
blind spots and significant accuracy gaps; and as noted,
engagement remains passive.
• Technology Optimization – The same technologies and data that
improve user experience also improve device usability and help
drive more powerful technology improvements.
• Waste reduction – IoT makes areas of improvement clear.
Current analytics give us superficial insight, but IoT provides real-
world information that leads to more efficient resource
management.
• Improved Data Collection – Modern data collection suffers from
its limitations and design for passive use. IoT takes it out of those
spaces and places it exactly where it's needed. It provides an
accurate picture of everything.
IoT software deals with its core areas of networking and acting through
platforms, embedded systems, partner systems, etc. These individual
and master applications are responsible for data collection, device
integration, real-time analytics, and the extension of applications and
processes within the IoT network. They leverage integration with
critical business systems (eg ordering systems, robotics, scheduling, and
more) to accomplish related tasks.
4.11 LTE-A
LTE-A, or LTE Advanced, brings an important upgrade to LTE technology
by increasing not only its coverage, but also reducing latency and
increasing bandwidth. This gives IoT tremendous power by expanding
its range, and its most significant applications are vehicles, UAVs and
similar communications.
4.12 WiFi-Direct
WiFi-Direct eliminates the need for an access point. It allows P2P (peer-
to-peer) connections with the speed of WiFi, but with lower latency.
WiFi-Direct eliminate an element of a network that often bogs it down,
and it does not compromise on speed or throughput.
Intrinsic:
1. Age(over 75 )
2. Chronic desease
3. Previous falls
4. Poor balance
6. Sight problems
8. Parkinson desease
Internal Environment:
2. Slipping floors
3. Stairs
External Environment:
1. Damaged roads
2. Dangerous steps
3. Poor lighting
4. Crowded places
6.Fall Detection Algorithm
The total acceleration sum vector Acc, contains both dynamic and static
acceleration. The components are calculated from the sampled data as
indicated in the relation below:
Negative peaks for the resultant of each recorded activity are called
lower signal peak values (LPV). The LFT for the acceleration signals was
set to the level of the smallest lower peak drop (LFP) recorded.
The positive peaks for the recorded signals for each recorded activity
are called upper peak signal values (UPV). The UFTs for each of the
acceleration and angular velocity signals were set to the level of the
smallest recorded UPV magnitude. UFT refers to the peak impact force
experienced by a body segment during the impact phase of a fall.
Fall detection algorithms using thresholds are usually divided into two
groups, one based on LFT comparison and the other based on UFT
comparison of acceleration data. Although past research has achieved
some significant results, accuracy is still below desired levels.
Fall detection algorithm
7. Components
#include <Wire.h>
#include <WiFi.h>
#include <HTTPClient.h>
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <Blynk.h>
#include <BlynkSimpleEsp32.h>
WiFiServer server(80);
String header;
// Current time
// Previous time
unsigned long previousTime = 0;
char post[500];
String y = "";
float ax = 0, ay = 0, az = 0, gx = 0, gy = 0, gz = 0;
double x;
double yy;
double z;
boolean trigger1 = false; //stores if first trigger (lower threshold) has occurred
boolean trigger2 = false; //stores if second trigger (upper threshold) has occurred
boolean trigger3 = false; //stores if third trigger (orientation change) has occurred
byte trigger1count = 0; //stores the counts past since trigger 1 was set true
byte trigger2count = 0; //stores the counts past since trigger 2 was set true
byte trigger3count = 0; //stores the counts past since trigger 3 was set true
int angleChange = 0;
void setup() {
Serial.begin(115200);
Wire.begin();
Wire.beginTransmission(MPU_addr);
Wire.endTransmission(true);
WiFi.begin(ssid, pass);
delay(300);
Serial.print(".");
Serial.println("");
Serial.println("WiFi connected");
server.begin();
}
void loop() {
Blynk.run();
mpu_read();
Blynk.virtualWrite(V4, x);
Blynk.virtualWrite(V5, yy);
Blynk.virtualWrite(V6, z);
Serial.println(amplitude);
if (amplitude <= 2 && trigger2 == false) { //if AM breaks lower threshold (0.4g)
trigger1 = true;
Serial.println("TRIGGER 1 ACTIVATED");
if (trigger1 == true) {
trigger1count++;
trigger2 = true;
Serial.println("TRIGGER 2 ACTIVATED");
if (trigger2 == true) {
trigger2count++;
Serial.println(angleChange);
if (angleChange >= 30 && angleChange <= 400) { //if orientation changes by between 80-100
degrees
Serial.println(angleChange);
Serial.println("TRIGGER 3 ACTIVATED");
if (trigger3 == true) {
trigger3count++;
Serial.println(angleChange);
if ((angleChange >= 0) && (angleChange <= 10)) { //if orientation changes remains between 0-10
degrees
Serial.println(angleChange);
Serial.println("TRIGGER 3 DEACTIVATED");
Serial.println("FALL DETECTED");
serverName = "https://xdroid.net/api/message?k=k-e957855e4df2&t=Fall-
detection&c=HELP!&u=http://google.com";
sendCustom("true");
serverName = "";
delay(3000);
fall = false;
Serial.println("TRIGGER 2 DECACTIVATED");
Serial.println("TRIGGER 1 DECACTIVATED");
delay(100);
void mpu_read() {
Wire.beginTransmission(MPU_addr);
Wire.endTransmission(false);
}
void sendCustom(char notify[]) {
if (WiFi.status() == WL_CONNECTED) {
// Preparing Data
strcat(tok, token);
HTTPClient http;
http.begin(serverName);
http.addHeader("Content-Type", "application/x-www-form-urlencoded");
// Token Header
http.addHeader("Authorization", tok);
// Post Data
strcat(post, "&BL_notify=");
strcat(post, notify);
Serial.println(httpResponseCode);
// Free resources
http.end();
Way of using
Features:
Similar API & UI for all supported hardware & devices
Connection to the cloud using:
WiFi
Bluetooth and BLE
Ethernet
USB (Serial)
GSM
Set of easy-to-use Widgets
Direct pin manipulation with no code writing
Easy to integrate and add new functionality using virtual pins
History data monitoring via SuperChart widget
Device-to-Device communication using Bridge Widget
Sending emails, tweets, push notifications, etc.
Our Blynk application shows the movement of the patient along the
x,yiz axis. This is shown in Figure 3 pie charts for each of the axes. In
this way, the guardian receives information at any time, that is, he can
simply follow the movement and position of the patient.
Figure 4:Blynk system