Performance Modeling and Analysis of Surgery Patient Identification Using RFID

Author(s):  
Byungho Jeong ◽  
Chen-Yang Cheng ◽  
Vittal Prabhu

This paper proposes a workflow and performance model for surgery patient identification using RFID (Radio Frequency Identification). Certain types of mistakes may be prevented by automatically identifying the patient before surgery. The proposed workflow is designed to ensure that both the correct site and patient are engaged in the surgical process. The performance model can be used to predict patient waiting time and service duration time with RFID implementation. A proof-of-concept system is developed to understand the information flow and to use information in RFID-based patient identification. Performance model indicates the response time to patients can be reduced to 38% after four hours using the proposed RFID based workflow.

2011 ◽  
pp. 945-957
Author(s):  
Byungho Jeong ◽  
Chen-Yang Cheng ◽  
Vittal Prabhu

This article proposes a workflow and reliability model for surgery patient identification using RFID (Radio Frequency Identification). Certain types of mistakes may be prevented by automatically identifying the patient before surgery. The proposed workflow is designed to ensure that both the correct site and patient are engaged in the surgical process. The reliability model can be used to assess improvements in patients’ safety during this process. A proof-of-concept system is developed to understand the information flow and to use information in RFID-based patient identification. Reliability model indicates the occurrences of patient identification error can be reduced from 90 to as low as 0.89 per 10,000 surgeries using the proposed RFID based workflow.


Author(s):  
Byungho Jeong ◽  
Chen-Yang Cheng ◽  
Vittal Prabhu

This article proposes a workflow and reliability model for surgery patient identification using RFID (Radio Frequency Identification). Certain types of mistakes may be prevented by automatically identifying the patient before surgery. The proposed workflow is designed to ensure that both the correct site and patient are engaged in the surgical process. The reliability model can be used to assess improvements in patients’ safety during this process. A proof-of-concept system is developed to understand the information flow and to use information in RFID-based patient identification. Reliability model indicates the occurrences of patient identification error can be reduced from 90 to as low as 0.89 per 10,000 surgeries using the proposed RFID based workflow.


2021 ◽  
Author(s):  
Shirley. Gilbert

With recent advancement in Radio Frequency Identification (RFID) technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has limited resources like memory, power and processing capabilities, authentication must be provided by encryption and decryption procedures that are lightweight consuming minimal resources. This report investigates some relevant RFID encryption algorithms and their possible implementations with respect to security, cost and performance. A survey and brief comparison of the algorithms are performed and the Tiny Encryption Algorithm (TEA) is selected as a feasible solution for encryption and decryption with an acceptable level of security. TEA is implemented on an FPGA (Field Programmable Gate Array) platform. After investigating several state-of-the-art authentication approaches, two protocols are designed incorporating TEA and implemented using VHDL. Simulations corroborate the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance. Potential improvements to enhance the security and strengthen RF communication during authentication are explored.


Author(s):  
Francesco Cremonesi ◽  
Georg Hager ◽  
Gerhard Wellein ◽  
Felix Schürmann

Big science initiatives are trying to reconstruct and model the brain by attempting to simulate brain tissue at larger scales and with increasingly more biological detail than previously thought possible. The exponential growth of parallel computer performance has been supporting these developments, and at the same time maintainers of neuroscientific simulation code have strived to optimally and efficiently exploit new hardware features. Current state-of-the-art software for the simulation of biological networks has so far been developed using performance engineering practices, but a thorough analysis and modeling of the computational and performance characteristics, especially in the case of morphologically detailed neuron simulations, is lacking. Other computational sciences have successfully used analytic performance engineering, which is based on “white-box,” that is, first-principles performance models, to gain insight on the computational properties of simulation kernels, aid developers in performance optimizations and eventually drive codesign efforts, but to our knowledge a model-based performance analysis of neuron simulations has not yet been conducted. We present a detailed study of the shared-memory performance of morphologically detailed neuron simulations based on the Execution-Cache-Memory performance model. We demonstrate that this model can deliver accurate predictions of the runtime of almost all the kernels that constitute the neuron models under investigation. The gained insight is used to identify the main governing mechanisms underlying performance bottlenecks in the simulation. The implications of this analysis on the optimization of neural simulation software and eventually codesign of future hardware architectures are discussed. In this sense, our work represents a valuable conceptual and quantitative contribution to understanding the performance properties of biological networks simulations.


2019 ◽  
Vol 59 (11) ◽  
pp. 2046
Author(s):  
I. Ruhnke ◽  
J. Boshoff ◽  
I. V. Cristiani ◽  
D. Schneider ◽  
M. Welch ◽  
...  

Free-range laying hens are provided with the opportunity to access various structural areas, including open floor space, feed areas, water lines, next boxes, perches, aviary tiers, winter gardens and ranges. Different individual location preferences can lead to the development of hen subpopulations that are characterised by various health, welfare and performance parameters. Understanding the complexity of hen movement and hen interactions within their environment provides an opportunity to limit the disadvantages that are associated with housing in loose husbandry systems and aids in decision-making. Monitoring hen movement using modern technologies such as radio-frequency identification (RFID), optical flow patterns, image analysis and three-dimensional (3D) cameras allows the accumulation of big data for data mining, clustering and machine learning. Integrating individual-based management systems into modern flock management will not only help improve the care of under-performing hens, but also ensure that elite hens are able to use their full genetic potential, allowing an ethical, sustainable and welfare friendly egg production. This review highlights the dynamics and impact of hen movement in free-range systems, reviews existing knowledge relevant for feeding hens in non-cage systems, and outlines recent technological advances and strategies to improve the management of free-range laying hens.


2012 ◽  
Vol 30 (34_suppl) ◽  
pp. 316-316
Author(s):  
Matthew C. Cheung ◽  
Maureen E. Trudeau ◽  
Ben De Mendonca ◽  
Kathy Beattie ◽  
Philomena Sousa ◽  
...  

316 Background: The Odette Cancer Centre (OCC) is the sixth largest cancer institution in North America and manages over 24,000 chemotherapy patient visits/year. We initiated an automated kiosk system whereby patients can “actively” self-check-in to the chemotherapy unit as part of a quality initiative to improve one of the most complex processes in patient care. Methods: From January-May 2012, consecutive patients receiving >2 cycles of chemotherapy were randomly assigned to either radio-frequency identification (RFID) or barcode technologies to facilitate self check-in and time-in-motion studies. In parallel, the former manual check-in system (with OCC staff) continued. The primary outcome was the proportion of patients with more 3 or more scheduled appointments who used the self-check system at least 2 times. Patient satisfaction was attained with baseline and post-study surveys. Results: The study accrued 81 patients (43 patients using RFID and 38 patients using barcodes). Mean age was 59 (20-81 years). Of 48 patients who completed baseline surveys, most had regular access to a computer (87.5%) and used the internet at least >1 hour/day (50%). However, 21% at baseline felt a person-to-person check-in was preferable to an automated option. With implementation of the study, 24 of 81 patients (29%) have used the kiosk only once. Of individuals with multiple scheduled appointments (at least 3), 50% assigned to the RFID group and 52.6% assigned to the barcode group used the kiosk at least 2 times (p=0.827; Fisher’s exact). In follow-up, 96.7% of patients agreed or strongly agreed that the kiosks were easy to use although only one-third (33.3%) of patients felt the new system improved the efficiency of care. Conclusions: An automated check-in process is feasible for a diverse population of patients receiving chemotherapy. Multiple uses of the kiosk technology suggest appropriate uptake and retention of the technology. Continued use of the system was not different between RFID and barcode technologies. Patient satisfaction was high despite the lack of improvement in efficiency. The next phase will incorporate patient tracking and real-time status updates to address these concerns.


2012 ◽  
Vol 579 ◽  
pp. 416-426
Author(s):  
Jiang Liang Hou ◽  
Hsiu Hui Cheng ◽  
Hung Lung Lin

In the last decade, RFID (Radio Frequency Identification) technology has been applied in many applications to support the routine operations. These methods about RFID applications focus mainly on the specific issues in the application domains. In this study, a generic object relationship identification and guidance model is proposed to identify the relationships between objects (including human beings, physical goods and locations) and guide the objects toward their destination based on their predefined objectives via the RFID. Eight general types of object interactions including searching, blocking, no-in, no-out, conflict, intersection, coincidence, and support, are considered to identify object relationship and guide the objects. The proposed scheme consists of three modules namely object type combination (OTC), object relationship identification (ORI) and object guidance (OG). Moreover based on the proposed methodology, an Object Relationship Identification and Guidance System (ORIG-System) is developed and simulated environments are established in order to verify the feasibility and performance of the proposed model. As a whole, this study provides a methodology and system to provide effective support to the routine operations in distinct application domains via the RFID technology.


2021 ◽  
Author(s):  
Shirley. Gilbert

With recent advancement in Radio Frequency Identification (RFID) technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has limited resources like memory, power and processing capabilities, authentication must be provided by encryption and decryption procedures that are lightweight consuming minimal resources. This report investigates some relevant RFID encryption algorithms and their possible implementations with respect to security, cost and performance. A survey and brief comparison of the algorithms are performed and the Tiny Encryption Algorithm (TEA) is selected as a feasible solution for encryption and decryption with an acceptable level of security. TEA is implemented on an FPGA (Field Programmable Gate Array) platform. After investigating several state-of-the-art authentication approaches, two protocols are designed incorporating TEA and implemented using VHDL. Simulations corroborate the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance. Potential improvements to enhance the security and strengthen RF communication during authentication are explored.


Sign in / Sign up

Export Citation Format

Share Document