Smart Home Technology for Elderly Care: A Literature Review
VerifiedAdded on 2025/04/21
|78
|7874
|122
AI Summary
Desklib provides past papers and solved assignments for students. This literature review explores IoT-based smart homes for elderly care.

Review Based ProjectLiterature Review (Secondary Research)Template
Student's Name and CSU ID
Project Type Review Based Project
Project Name A systematic review of IoT based Smart Homes (SH) for Elderly Assisted Living
Technology
Techniques
Domain
Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in
'Reference List'
Pal, D., Funilkul, S., Charoenkitkarn, N., & Kanthamanon, P. (2018). Internet-of-things and smart homes for
elderly healthcare: An end user perspective. IEEE Access, 6, 10483-10496. Doi:
10.1109/ACCESS.2018.2808472
Citation that will be in the content (Pal et al. 2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://ieeexplore-ieee-
org.ezproxy.csu.edu.au/document/8300511
Q1 Healthcare
Elderly
Smart homes
The Name of the Current Solution
(Technique/ Method/ Scheme/
The Goal (Objective) of this Solution & What are the components of it?
1
Student's Name and CSU ID
Project Type Review Based Project
Project Name A systematic review of IoT based Smart Homes (SH) for Elderly Assisted Living
Technology
Techniques
Domain
Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in
'Reference List'
Pal, D., Funilkul, S., Charoenkitkarn, N., & Kanthamanon, P. (2018). Internet-of-things and smart homes for
elderly healthcare: An end user perspective. IEEE Access, 6, 10483-10496. Doi:
10.1109/ACCESS.2018.2808472
Citation that will be in the content (Pal et al. 2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://ieeexplore-ieee-
org.ezproxy.csu.edu.au/document/8300511
Q1 Healthcare
Elderly
Smart homes
The Name of the Current Solution
(Technique/ Method/ Scheme/
The Goal (Objective) of this Solution & What are the components of it?
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Algorithm/ Model/ Tool/ Framework/ ...
etc )
What is the Problem that need to be solved
Technique/Algorithm name:
Unified Theory of Acceptance and Use of
Technology (UTAUT) Framework
Tools:
IoT device
Sensors
Actuators
Applied Area:
Healthcare sector
Problem:
In this paper the major issue that author has
focused is Lack of awareness and management
regarding elderly health in medical sector.
Goal:
The goal is to provide better management and
online healthcare treatment to the elderly
person by using smart devices in smart home.
Also using other devices for elderly people
protection such as cameras and mobile phones
for getting better results.
Smart machinery
Sensor data processing module
Monitoring data and analysis
Healthcare home
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Smart treatment-
In this process, the online treatment is given by
using mobile devices. Also, patient using
different apps provides better advices in the real
time.
The person gets real time consult and treatment
easily at home.
N/A
2 Sensor data processing module-
It tells about the processing of module whether it
is consistent patients or not. By doing sensor
data processing the power absorbed by the
There are several advantages of sensor data
processing module:-
To determine adverse condition
Sometimes Technical issues occur
2
etc )
What is the Problem that need to be solved
Technique/Algorithm name:
Unified Theory of Acceptance and Use of
Technology (UTAUT) Framework
Tools:
IoT device
Sensors
Actuators
Applied Area:
Healthcare sector
Problem:
In this paper the major issue that author has
focused is Lack of awareness and management
regarding elderly health in medical sector.
Goal:
The goal is to provide better management and
online healthcare treatment to the elderly
person by using smart devices in smart home.
Also using other devices for elderly people
protection such as cameras and mobile phones
for getting better results.
Smart machinery
Sensor data processing module
Monitoring data and analysis
Healthcare home
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Smart treatment-
In this process, the online treatment is given by
using mobile devices. Also, patient using
different apps provides better advices in the real
time.
The person gets real time consult and treatment
easily at home.
N/A
2 Sensor data processing module-
It tells about the processing of module whether it
is consistent patients or not. By doing sensor
data processing the power absorbed by the
There are several advantages of sensor data
processing module:-
To determine adverse condition
Sometimes Technical issues occur
2

machine is recognised. For protection
Monitoring
3 Monitoring data and analysis-
In monitoring data analysis, the data send by the
smart devices to the Internet through cloud is
stored in the system which is helpful for the
further activities.
For inspecting and recording for their
condition.
Time consuming
4 Back over patient Protection-
It has its individual algorithm which process and
compares different values .It monitor apparatus.
It detects and identifies the problem.
It transfers the data via transmitter.
N/A
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Ultra Sound Distance sensors
Communication Wireless technology
IoT Power Saving, Real time senescing
Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Unified Theory of
Acceptance and
After doing the
research it has been
According to Pal et al. (2018) this research
proposed a UTAUT model that is helpful for the
elderly people. The main feature of this research is
that the smart devices are used in smart home for
The limitations are-
Sometimes Technical issues occur
Time consuming
3
Monitoring
3 Monitoring data and analysis-
In monitoring data analysis, the data send by the
smart devices to the Internet through cloud is
stored in the system which is helpful for the
further activities.
For inspecting and recording for their
condition.
Time consuming
4 Back over patient Protection-
It has its individual algorithm which process and
compares different values .It monitor apparatus.
It detects and identifies the problem.
It transfers the data via transmitter.
N/A
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Ultra Sound Distance sensors
Communication Wireless technology
IoT Power Saving, Real time senescing
Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Unified Theory of
Acceptance and
After doing the
research it has been
According to Pal et al. (2018) this research
proposed a UTAUT model that is helpful for the
elderly people. The main feature of this research is
that the smart devices are used in smart home for
The limitations are-
Sometimes Technical issues occur
Time consuming
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Use of
Technology
(UTAUT)
Framework
Peak overload
mhealth
cleared that
monitoring process
and smart device
performance has been
increased with the
help of smart
technologies using
IoT.
provides protection and healthy living for the
elderly people.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
What is the Future work that set by the author
in Conclusion and Future work section
Pal et al. (2018) have proposed a UTAUT system.
With the help of sensor data processing and
monitoring data analysis to improve the health
and living in their homes. Hence, the security of
elderly people has been improved by 81.4 %.
By using the proposed solution the older and
elderly people are easily get treatment at their
home. Also, the elderly person takes online
treatment and advice by using smart devices.
It has been proposed to improve the ambiguity in
the peak load through signal noise filtering. It can
be improve by adding more sensors for safety
margins and the application of IoT can be more
utilize.
Diagram/Flowchart
4
Technology
(UTAUT)
Framework
Peak overload
mhealth
cleared that
monitoring process
and smart device
performance has been
increased with the
help of smart
technologies using
IoT.
provides protection and healthy living for the
elderly people.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
What is the Future work that set by the author
in Conclusion and Future work section
Pal et al. (2018) have proposed a UTAUT system.
With the help of sensor data processing and
monitoring data analysis to improve the health
and living in their homes. Hence, the security of
elderly people has been improved by 81.4 %.
By using the proposed solution the older and
elderly people are easily get treatment at their
home. Also, the elderly person takes online
treatment and advice by using smart devices.
It has been proposed to improve the ambiguity in
the peak load through signal noise filtering. It can
be improve by adding more sensors for safety
margins and the application of IoT can be more
utilize.
Diagram/Flowchart
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Reference in APA format that will be in 'Reference List'
(This give the Reference of the Journal Paper that the author selected and improve it (State of art of his work))
Kanan, R., Elhassan, O., & Bensalem, R. (2018). An IoT-based autonomous system for workers' safety in construction sites with real-time alarming,
monitoring, and positioning strategies. Automation in Construction, 88, 73-86.
Hu, L., Peng, C., Evans, S., Peng, T., Liu, Y., Tang, R., &Tiwari, A. (2017). Minimising the machining energy consumption of a machine tool by
sequencing the features of a part. Energy, 121, 292-305.
Citation that will be in the content
(kanan et al. 2018)
(Hu et al. 2017)
5
(This give the Reference of the Journal Paper that the author selected and improve it (State of art of his work))
Kanan, R., Elhassan, O., & Bensalem, R. (2018). An IoT-based autonomous system for workers' safety in construction sites with real-time alarming,
monitoring, and positioning strategies. Automation in Construction, 88, 73-86.
Hu, L., Peng, C., Evans, S., Peng, T., Liu, Y., Tang, R., &Tiwari, A. (2017). Minimising the machining energy consumption of a machine tool by
sequencing the features of a part. Energy, 121, 292-305.
Citation that will be in the content
(kanan et al. 2018)
(Hu et al. 2017)
5

2
Reference in APA format that will be in
'Reference List'
(This give the Reference of the Journal
Paper you are working on it)
Tariq, M., Majeed, H., Beg, M. O., Khan, F. A., & Derhab, A. (2019). Accurate detection of sitting posture
activities in a secure IoT based assisted living environment. Future Generation Computer Systems, 92, 745-757.
https://doi.org/10.1016/j.future.2018.02.013
Citation that will be in the content (Tariq, et al. 2019)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/pii/
S0167739X1731333X
Journal level – Q1 Neural network, Kinect,
Information assurance and security, Social Internet of Things
(SIoT), Activity recognition, Human robot interaction,
Hidden Markov Model
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Hidden Markov Model (HMM)
Activity recognition techniques
Generic technique
Forward–Backward algorithm
Diffie-Hellman algorithm
Tools:
Problem: This research work is based on
health-related problems to humans due to bad
posture sitting.
Goal:
This research aims to solve the issue of the
sitting-related problem by implementing
sensor-based devices like smartwatches etc.
This research work contain following components-
Activity detection
Experimental setup
Result
6
Reference in APA format that will be in
'Reference List'
(This give the Reference of the Journal
Paper you are working on it)
Tariq, M., Majeed, H., Beg, M. O., Khan, F. A., & Derhab, A. (2019). Accurate detection of sitting posture
activities in a secure IoT based assisted living environment. Future Generation Computer Systems, 92, 745-757.
https://doi.org/10.1016/j.future.2018.02.013
Citation that will be in the content (Tariq, et al. 2019)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/pii/
S0167739X1731333X
Journal level – Q1 Neural network, Kinect,
Information assurance and security, Social Internet of Things
(SIoT), Activity recognition, Human robot interaction,
Hidden Markov Model
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Hidden Markov Model (HMM)
Activity recognition techniques
Generic technique
Forward–Backward algorithm
Diffie-Hellman algorithm
Tools:
Problem: This research work is based on
health-related problems to humans due to bad
posture sitting.
Goal:
This research aims to solve the issue of the
sitting-related problem by implementing
sensor-based devices like smartwatches etc.
This research work contain following components-
Activity detection
Experimental setup
Result
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Accelerometers
Multi-dimensional Scaling (MDS)
Microsoft Kinect
Smart watches
Binary Images
Applied Area:
Improving daily life activities
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Activity detection
In this process, the activity of the human body is
detected with the help of smartwatch or other
devices.
Rotational features of body are measured N/A
2 Experimental setup
The smart healthcare wearable devices are
linked to external devices which are used to
store and calculate the angular position of the
human body.
Identify posture of Skelton of human body N/A
3 Results
After implementing the above processes, data is
calculated based on activity detection and
activity performed.
Sitting posture is improved N/A
Validation Criteria (Measurement Criteria)
7
Multi-dimensional Scaling (MDS)
Microsoft Kinect
Smart watches
Binary Images
Applied Area:
Improving daily life activities
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Activity detection
In this process, the activity of the human body is
detected with the help of smartwatch or other
devices.
Rotational features of body are measured N/A
2 Experimental setup
The smart healthcare wearable devices are
linked to external devices which are used to
store and calculate the angular position of the
human body.
Identify posture of Skelton of human body N/A
3 Results
After implementing the above processes, data is
calculated based on activity detection and
activity performed.
Sitting posture is improved N/A
Validation Criteria (Measurement Criteria)
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Dependent Variable Independent Variable
Activity recognition Images
HMM parameters maximum likelihood
Signal segmentation threshold
Accuracy Kinect and Smartwatch
Cross-validation Kinect-only data
Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Visual
recognition is
used by
sensors
enabled
devices to
monitor body
languages.
After input is taken
device to collaborate
data and implement it
and provide the
specific result to
improve posture.
This Research work focuses on a smart home to
enable smart sitting posture detection system which
benefits to overcome health-related problems.
There is some limitation of current solution that it
does not secure data. The system has a limitation
of dependency. If the user lost Smartphone it
unable him to use the system due to unavailability
of the password.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
8
Activity recognition Images
HMM parameters maximum likelihood
Signal segmentation threshold
Accuracy Kinect and Smartwatch
Cross-validation Kinect-only data
Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Visual
recognition is
used by
sensors
enabled
devices to
monitor body
languages.
After input is taken
device to collaborate
data and implement it
and provide the
specific result to
improve posture.
This Research work focuses on a smart home to
enable smart sitting posture detection system which
benefits to overcome health-related problems.
There is some limitation of current solution that it
does not secure data. The system has a limitation
of dependency. If the user lost Smartphone it
unable him to use the system due to unavailability
of the password.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
8

What is the Future work that set by the author
in Conclusion and Future work section
(Tariq, et al. 2019) proposed a smart system to
detect human activitits in an smart home based on
Iot devices. Activities detection systems is based
on sensor enabled devices which detect human
activities and their posture to implement them.
The author has been given a solution for detecting
human activities by analysing their body motion in
a living environment. Detection of motion activities
is beneficial for the human to serve them in their
health problems.
The solution proposed by the author in this
research work is based on smart devices to detect
human motion activities. There are some issues
related to security in detecting human activities
which need to improve in future work. Sliding
window can be implemented to improve current
solutions.
Diagram/Flowchart
9
in Conclusion and Future work section
(Tariq, et al. 2019) proposed a smart system to
detect human activitits in an smart home based on
Iot devices. Activities detection systems is based
on sensor enabled devices which detect human
activities and their posture to implement them.
The author has been given a solution for detecting
human activities by analysing their body motion in
a living environment. Detection of motion activities
is beneficial for the human to serve them in their
health problems.
The solution proposed by the author in this
research work is based on smart devices to detect
human motion activities. There are some issues
related to security in detecting human activities
which need to improve in future work. Sliding
window can be implemented to improve current
solutions.
Diagram/Flowchart
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 1 Activity recognition
Reference in APA format that will be in 'Reference List'
(This give the Reference of the Journal Paper that the author selected and improve it (State of art of his work))
Yang, X., & Tian, Y. (2017). Super normal vector for human activity recognition with depth cameras. IEEE transactions on pattern analysis and
machine intelligence, 39(5), 1028-1039.
Khan, F. A., Haldar, N. A. H., Ali, A., Iftikhar, M., Zia, T. A., & Zomaya, A. Y. (2017). A continuous change detection mechanism to identify
anomalies in ECG signals for WBAN-based healthcare environments. IEEE Access, 5, 13531-13544.
Citation that will be in the content
(Yang and Tian, 2017)
10
Reference in APA format that will be in 'Reference List'
(This give the Reference of the Journal Paper that the author selected and improve it (State of art of his work))
Yang, X., & Tian, Y. (2017). Super normal vector for human activity recognition with depth cameras. IEEE transactions on pattern analysis and
machine intelligence, 39(5), 1028-1039.
Khan, F. A., Haldar, N. A. H., Ali, A., Iftikhar, M., Zia, T. A., & Zomaya, A. Y. (2017). A continuous change detection mechanism to identify
anomalies in ECG signals for WBAN-based healthcare environments. IEEE Access, 5, 13531-13544.
Citation that will be in the content
(Yang and Tian, 2017)
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

(Khan, et al., 2017)
3
Reference in APA format that will be in
'Reference List'
(This give the Reference of the Journal
Paper you are working on it)
Monowar, M. I. Shakil, R. S. Kafi, A. H. & Rhaman, K. (2019). Framework of an intelligent, Multi-Nodal
and Secured RF based wireless Home automation System for Multifunctional Devices. Wireless Personal
Communication.Vol. 105. pp. 1-16. DOI: https://doi-org.ezproxy.csu.edu.au/10.1109/tce.2006.1706478
Citation that will be in the content (Monowar et al. 2019)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://link-springer-
com.ezproxy.csu.edu.au/article/10.1007/
s11277-018-6100-z
Level of Journal Q2 Multi nodal
Radio frequency
Hoe automation
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that needs to be solved
What are the components of it?
Technique/Algorithm name:
radio frequency
video surveillance
pattern recognition
Algorithm:
VCA algorithms
Mean-shift Algorithm
Problem: The problem is how to more secure
the home using appliances using a new home
automation system.
Goal: using smart intelligent and multimodal
system solve the security issue of home.
Reception and transmission
Problems and solutions
Using Encoder, decoder full integrated circuit
11
3
Reference in APA format that will be in
'Reference List'
(This give the Reference of the Journal
Paper you are working on it)
Monowar, M. I. Shakil, R. S. Kafi, A. H. & Rhaman, K. (2019). Framework of an intelligent, Multi-Nodal
and Secured RF based wireless Home automation System for Multifunctional Devices. Wireless Personal
Communication.Vol. 105. pp. 1-16. DOI: https://doi-org.ezproxy.csu.edu.au/10.1109/tce.2006.1706478
Citation that will be in the content (Monowar et al. 2019)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://link-springer-
com.ezproxy.csu.edu.au/article/10.1007/
s11277-018-6100-z
Level of Journal Q2 Multi nodal
Radio frequency
Hoe automation
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that needs to be solved
What are the components of it?
Technique/Algorithm name:
radio frequency
video surveillance
pattern recognition
Algorithm:
VCA algorithms
Mean-shift Algorithm
Problem: The problem is how to more secure
the home using appliances using a new home
automation system.
Goal: using smart intelligent and multimodal
system solve the security issue of home.
Reception and transmission
Problems and solutions
Using Encoder, decoder full integrated circuit
11

Machine learning algorithm
Tools:
Video system
Energy management
PC/laptop
Smartphone
Applied Area: Home Automation
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Reception and transmission
In this process, RF signal used 433 MHz which
transmitter act as a remote and design least
number of the transmitter of the device.
It gets the best outcomes for transmitting the
frequency.
N/A
2 Solution and problems
The radio energy sends into the sky so the radio
transmitter prone to cause interference and
create much noise.
In this analyze the problem in the machine and
find the solution for giving the best output.
Some systems have critical problems which
not able to solve.
Using Encoder, decoder full integrated circuit
It is a combination of an integrated circuit which
reception and transmission denoted by Rx and
Tx. They connect the switches and receiver end
devices are connected.
Use encoding and decoding minimize
interference and noise.
N/A
12
Tools:
Video system
Energy management
PC/laptop
Smartphone
Applied Area: Home Automation
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Reception and transmission
In this process, RF signal used 433 MHz which
transmitter act as a remote and design least
number of the transmitter of the device.
It gets the best outcomes for transmitting the
frequency.
N/A
2 Solution and problems
The radio energy sends into the sky so the radio
transmitter prone to cause interference and
create much noise.
In this analyze the problem in the machine and
find the solution for giving the best output.
Some systems have critical problems which
not able to solve.
Using Encoder, decoder full integrated circuit
It is a combination of an integrated circuit which
reception and transmission denoted by Rx and
Tx. They connect the switches and receiver end
devices are connected.
Use encoding and decoding minimize
interference and noise.
N/A
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 78
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.