Securing Mobile Data Computing in Healthcare

2011 ◽  
pp. 1930-1939
Author(s):  
Willy Susilo

Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in everyday life. Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care. Portability and accessibility of these devices enhances use of them in healthcare environment. However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare. Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on. Mobile computing is suitable for healthcare as healthcare providers are mobile. These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on. There are various projects using mobile devices to enhance patient’s care. With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system. In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices. There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information. In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.

Author(s):  
Willy Suslio ◽  
Khin Than Win

Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in everyday life. Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care. Portability and accessibility of these devices enhances use of them in healthcare environment. However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare. Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on. Mobile computing is suitable for healthcare as healthcare providers are mobile. These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on. There are various projects using mobile devices to enhance patient’s care. With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system. In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices. There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information. In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.


HortScience ◽  
2016 ◽  
Vol 51 (9) ◽  
pp. 1176-1183 ◽  
Author(s):  
Chase M. Straw ◽  
Rebecca A. Grubbs ◽  
Kevin A. Tucker ◽  
Gerald M. Henry

Research compared handheld and mobile data acquisitions of soil moisture [volumetric water content (VWC)], soil compaction (penetration resistance), and turfgrass vigor [normalized difference vegetative index (NDVI)] of four natural turfgrass sports fields using two sampling grid sizes (4.8 × 4.8 m and 4.8 × 9.6 m). Differences between the two sampling grid sizes were minimal, indicating that sampling with handheld devices using a 4.8 × 9.6 m grid (120–130 samples) would achieve results similar to the smaller grid size. Central tendencies and data distributions varied among the handheld and mobile devices. Moderate to strong correlation coefficients were observed for VWC and NDVI; however, weak to moderate correlation coefficients were observed for penetration resistance at three of the four locations. Kriged maps of VWC and NDVI displayed similar patterns of variability between handheld and mobile devices, but at different magnitudes. Spatial maps of penetration resistance were inconsistent due to device design and user reliability. Consequently, mobile devices may provide the most reliable results for penetration resistance of natural turfgrass sports fields.


Author(s):  
Prince Sharma

Data offloading offers a significant solution to the problem of explosive rise in mobile data traffic. A naive approach would be to utilize the infrastructure (cellular tower, WiFi, femtocell) or other mobile devices to offload data. However, increasing the number of a cellular towers, WiFi, or femtocells is costlier deal for data delivery. Recently, device-to-device (D2D) paradigm of data communication has emerged out as one of the most promising solutions to deal with cost effective cellular traffic offloading. D2D communication provides a direct communication link between closely located mobile users. Another significant feature of D2D is its content centric nature, which makes it useful in data offloading. In this paper, we have addressed the issue of data offloading in mobile devices and proposed a hybrid model of D2D communication with ad-hoc nature. The paper also considers the issues like memory constraints of the devices, pruning of replicated messages and energy efficiency to increase the lifetime of the battery. Considering all the constraints and trade off, we have modeled our problem into optimal target selection problem and distributed community detection problem, both of which are NP-hard. We propose a clustering algorithm to optimize the cooperative mobile nodes. The proposed algorithm uses the betweenness centrality and k-means for optimizing target set section. Our proposed algorithm requires less time in terms of computational complexity with limited space. We compare it with the community-based approach in terms of load transferred for varying target set sizes for validation. The simulation results of the suggested algorithm may reduce the energy requirements up to 16.7% and is able to accommodate 80% more traffic as compared to the community-based algorithm.


Diagnostics ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 1067
Author(s):  
Karla Jaimes Merazzo ◽  
Joseba Totoricaguena-Gorriño ◽  
Eduardo Fernández-Martín ◽  
F. Javier del Campo ◽  
Eva Baldrich

Smartphones are becoming increasingly versatile thanks to the wide variety of sensor and actuator systems packed in them. Mobile devices today go well beyond their original purpose as communication devices, and this enables important new applications, ranging from augmented reality to the Internet of Things. Personalized diagnostics is one of the areas where mobile devices can have the greatest impact. Hitherto, the camera and communication abilities of these devices have been barely exploited for point of care (POC) purposes. This short review covers the recent evolution of mobile devices in the area of POC diagnostics and puts forward some ideas that may facilitate the development of more advanced applications and devices in the area of personalized diagnostics. With this purpose, the potential exploitation of wireless power and actuation of sensors and biosensors using near field communication (NFC), the use of the screen as a light source for actuation and spectroscopic analysis, using the haptic module to enhance mass transport in micro volumes, and the use of magnetic sensors are discussed.


Author(s):  
Masoomeh Shabazi ◽  
Mostafa Amini Rarani ◽  
Sharam Tahmasebian ◽  
Maryam Jahanbakhsh

In recent years, the number of people who use mobile devices for business and organizational purposes has increased. This phenomenon is now known as “bring your own device” (BYOD), and it is rapidly entering the health industry, which makes clear the necessity of studying its various dimensions for its implementation and application. Recently, the use of mobile devices is increasing due to the social tendencies of people. Rapid changes in modern gadgets and smartphones have also encouraged organizations to use their mobile devices in the workplace for business purposes, creating related opportunities and challenges. These cases have made the expansion of BYOD inevitable so that the only way to control BYOD’s threats is to accept its process and finally formulate related strategies and policies before using it.


Author(s):  
Héctor Cancela

We are glad to present the last issue of 2015, completing Volume 18 of the CLEI Electronic Journal. This issue is comprised by the following regular papers.The first paper, “Quality of Protection on WDM networks: A Recovery Probability based approach”, by M. D. Rodas-Brítez and D. P. Pinto-Roa, features a proposal of a new quality of protection (QoP) paradigm for Wavelength Division Multiplexing optical networks. The new approach is flexible, allowing the network administrator to define and select a set of protection levels, based on recovery probabilities which measure the degree of conflict among primary lightpaths sharing backup lightpaths. To show the interest of the approach, a Genetic Algorithm is used to design a routing strategy by multi-objectiveoptimization, minimizing the number of blocked requests, the number of services without protection, the total differences between the requested QoP and the assigned QoP, and the network cost.The second paper, “Towards Scalability for Federated Identity Systems for Cloud-Based Environments”, by A.A. Pereira, J. B. M. Sobral and C. M. Westphall, addresses scalability issues in identity management for cloud computing environments. The authors propose an adapted sticky-session mechanism, as an alternative approach to the more common distributed memory approach, and discuss the implications in therms of computational resources, throughput and overall efficiency. The following work, “Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems”, by G. Betarte and C. Luna,tackles security models for security-critical applications in three areas: mobile devices, virtualization platforms, and domain name systems. The authors develop formalizations using the Calculus of Inductive Constructions, to study different usual variants of security models in these platforms and their properties.The last paper of this issue is “Digi-Clima Grid: image processing and distributed computing for recovering historical climate data”, by authors S. Nesmachnow, G. Usera and F. Brasileiro. This paper reports an experience of implementing semi-automatic techniques for digitalizing and recovering historical climate records applying parallel computing techniques over distributed computing infrastructures, which was applied to Uruguayan historical climate data.As we complete now the eighteenth year of continued existence of CLEIej, we thank the regional community for its continued support, and we encourage researchers working in computer science and its applications to consider submitting their work to CLEIej, as the the leading electronic, open access journal in Computer Science in Latin America.


Author(s):  
Lei Yang ◽  
Yuping Mao ◽  
Jeroen Jansz

This research aims to identify the sources that urban Hui Muslims access to get health information related to cardiovascular diseases (CVD) and how they evaluate the information from different sources. This paper focuses on health information related to cardiovascular diseases among Hui Muslims. The data was gathered by means of an online survey administered on mobile devices. To put the answers given by Hui Muslims into perspective and make a comparison between Hui Muslims and the Han people, we also gathered information from Han—the dominant group in China. The results showed that Chinese Hui Muslims mostly used mediated sources, while Han people mainly used interpersonal sources. Both Hui Muslims and Han people trusted and preferred health information about cardiovascular diseases provided by health organizations, doctors, and healthcare providers. The information given by religious leaders was trusted the least, although Hui Muslims were significantly more positive about religious authority than the Han people. The current results are relevant for Chinese health information promoters and can help them diffuse CVD health information more effectively to urban Hui Muslims.


2019 ◽  
Vol 5 (1) ◽  
pp. 13-19
Author(s):  
Ashish Jain ◽  
Robert M DiBlasi ◽  
Veena Devgan ◽  
Nisha Kumari ◽  
Kunal Kalra

ObjectiveTo describe the effective pressure and FiO2 delivery to a realistic spontaneously breathing lung model using a novel, simple, inexpensive neonatal non-invasive bubble continuous positive airway pressure (CPAP) device.MethodsThis experimental bench study was conducted at Bench Testing Laboratory at a Children’s Hospital. A realistic 3D anatomic airway model of a 28-week preterm neonate was affixed to the ASL5000 Test Lung to simulate spontaneous breathing with lung mechanics that are specific to a preterm neonate. The assembly was constructed on site using easily available nasal prongs, paediatric infusion set with a graduated chamber, three-way stop cocks and oxygen tubing. The adult nasal prong was used as cannulae. However, this assembly had the limitation of the lack of humidification and inability to deliver graduated oxygen. This assembly was attached to the anatomic airway with nasal prongs. Pressure and FiO2 were measured from within the lung model at different flow settings and recorded for 10 breaths.ResultsThere was a linear increase in the mean pressure in the 10 recorded breaths as oxygen flows were increased.ConclusionsOur nasal CPAP is a simple device, as it can be easily assembled at the point of care using simple, affordable supplies by the healthcare providers and can benefit the newborns with respiratory distress in the resource constraint settings.


Author(s):  
Ning Yu ◽  
Kien A. Hua ◽  
Danzhou Liu

During the last decade, high quality (i.e. over 1 megapixel) built-in cameras have become standard features of handheld devices. Users can take high-resolution pictures and share with friends via the internet. At the same time, the demand of multimedia information retrieval using those pictures on mobile devices has become an urgent problem to solve, and therefore attracts attention. A relevance feedback information retrieval process includes several rounds of query refinement, which incurs exchange of images between the mobile device and the server. With limited wireless bandwidth, this process can incur substantial delay, making the system unfriendly to use. This issue is addressed by considering a Client-side Relevance Feedback (CRF) technique. In the CRF system, Relevance Feedback (RF) is done on client side along. Mobile devices’ battery power is saved from exchanging images between server and client and system response is instantaneous, which significantly enhances system usability. Furthermore, because the server is not involved in RF processing, it is able to support more users simultaneously. The experiment indicates that the system outperforms the traditional server-client relevance feedback systems on the aspects of system response time, mobile battery power saving, and retrieval result.


Sign in / Sign up

Export Citation Format

Share Document