Search results
1 – 10 of 33Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of specialist…
Abstract
Purpose
Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of specialist doctors by using mobile internet communication. Some rural areas have slow internet speed because of weak internet signal propagation from mobile towers. A good design of antenna is needed to improve mobile internet speed for big medial data transmission in telemedicine application. Hence, this paper aims to propose economically low-cost design of antenna.
Design/methodology/approach
Telemedicine recommended to design the satellite frequency modulation dish (SAT FMD) antenna ( where in FM radio antenna, dish antenna are combined ) to improve the internet speed at Telemedicine system and Hospitals for purpose of Telemedicine communication and information for emergency treatment.
Findings
In the proposed system, designed SAT FMD satellite-based antenna improved internet speed is achieved at 90.6% accuracy in this research method. Finding latitude and longitude angles to identify the patient location, nearest hospitals location and finding distance, shortest path routing between patient and hospital. Finding elevation, Azimuth, latitude, longitude, skew for alignment dish to focus satellite and mobile cell tower to improve internet speed at telemedicine area and hospitals and reduced transmission delay and nodal delay of big medical data.
Social implications
The social awareness among people can be shared information of accident patient to communicate Hospital and Ambulance driver by internet mobile app tools and help find nearest hospitals to emergency treatment for accident people.
Originality/value
This paper presents SAT FMD antenna model based on satellite dish antenna consisting of FM radio receiver antenna and dish antenna for telemedicine communication.
Details
Keywords
Prabu S., Balamurugan Velan, Christalin Nelson S., Jayasudha F.V., Visu P. and Janarthanan K.
The purpose of this paper is to review the techniques for versatile advancements in contact tracing for the coronavirus disease 2019 (COVID-19) positive cases in this pandemic and…
Abstract
Purpose
The purpose of this paper is to review the techniques for versatile advancements in contact tracing for the coronavirus disease 2019 (COVID-19) positive cases in this pandemic and to introduce the way of using the mobile location information collected within the country India. As the method, an exploratory review of current measures was conducted for confirmed COVID-19 contact tracing after understanding the current situation of the world. This paper has examined the way of using free locational information in an innovative way to reduce the spread of COVID-19 spread.
Design/methodology/approach
COVID-19 pandemic is the utmost global economic and health challenge of the century. One powerful and consistent procedure to slow down the spread and decrease the effect of COVID-19 is to track the essential and auxiliary contacts of confirmed COVID-19 positive cases by using contact-tracing innovation.
Findings
Although it takes the information from various clients, there are numerous odds in the information. The sincere measures were taken by the authors to avoid the abuse of information by any kind. A portion of the tips for keeping information from getting abused is on the whole, the information ought to be with just higher specialists, and they ought not to have the authorization to impart information to anybody.
Originality/value
This paper helps to track the COVID-19 positive cases as of now by using the field information assortment and outbreak examination stages. At the same time, mobile location information used inside the current guideline, rules for information handlers must incorporate measures to reduce the abusing of information.
Details
Keywords
We live in an age of unparalleled access to personal data. Technological advances that seem second nature today allow for the mass accumulation of personal information by even the…
Abstract
We live in an age of unparalleled access to personal data. Technological advances that seem second nature today allow for the mass accumulation of personal information by even the smallest of companies. The same technology also can be used directly by the state to accumulate mass information on its citizens. In the hands of government law enforcement officials, these surveillance advances also can be used to greatly enhance the state’s ability to exercise social control – a circumstance that has both positive and negative connotations. This chapter discusses the increasingly important confluence of privacy rights, surveillance, and social control as seen from a constitutional standpoint.
After years of limiting the expectations of privacy that citizens may have in their day-to-day lives, several recent Supreme Court decisions have attempted to take account of the privacy expectations held by individuals in today’s ever-evolving technological world, and in doing so have limited the ability of law enforcement to engage in surveillance without first obtaining a warrant. Yet more needs to be done. Specifically, the author argues that the law of standing must be updated to permit judicial claims by individuals who challenge the legality and constitutionality of comprehensive surveillance programs.
Details
Keywords
Mohanbir Sawhney, Birju Shah, Ryan Yu, Evgeny Rubtsov and Pallavi Goodman
Uber had pioneered the growth and delivery of modern ridesharing services by leveraging the explosive growth of technology, GPS navigation, and smartphones. Ridesharing services…
Abstract
Uber had pioneered the growth and delivery of modern ridesharing services by leveraging the explosive growth of technology, GPS navigation, and smartphones. Ridesharing services had expanded across the world, growing rapidly in the United States, China, India, Europe, and Southeast Asia. Even as these services expanded and gained popularity, however, the pickup experience for drivers and riders did not always meet the expectations of either party. Pickups were complicated by traffic congestion, faulty GPS signals, and crowded pickup venues. Flawed pickups resulted in rider dissatisfaction and in lost revenues for drivers. Uber had identified the pickup experience as a top strategic priority, and a team at Uber, led by group product manager Birju Shah, was tasked with designing an automated solution to improve the pickup experience. This involved three steps. First, the team needed to analyze the pickup experience for various rider personas to identify problems at different stages in the pickup process. Next, it needed to create a model for predicting the best rider location for a pickup. The team also needed to develop a quantitative metric that would determine the quality of the pickup experience. These models and metrics would be used as inputs for a machine learning.
Details
Keywords
The purpose of this paper is to illustrate the outcomes of the RED (Routing on Empirical Data) Project, a three year cross‐jurisdictional collaborative undertaking in the State of…
Abstract
Purpose
The purpose of this paper is to illustrate the outcomes of the RED (Routing on Empirical Data) Project, a three year cross‐jurisdictional collaborative undertaking in the State of California that significantly improved the efficiency of the State's wireless 9‐1‐1 emergency communications system.
Design/methodology/approach
The Project's approach looked at historical wireless call data over a three‐year period and created accurate jurisdictional shapefiles to identify actual call origination and determine statistically which Public Safety Answering Point (PSAP) should receive wireless 9‐1‐1 calls routed to a particular wireless sector.
Findings
The findings or outcomes of the project were that busy signals previously in the 9‐1‐1 system were dramatically reduced to 2.3 per cent of total call volume in 2011 from 42.4 per cent of total call volume in 2007. This occurred with a concurrent 29 per cent increase in call volume over the same time period.
Practical implications
The practical and social implications for improvement in public safety are significant given the improvements in emergency response time that the project's outcome provides. Exponential increases in wireless phone usage over the past decade makes review of emergency communication infrastructure essential to ensure expeditious delivery of emergency services to the 9‐1‐1 calling public. Whether fire, ambulance or law enforcement response is required, when delay is inserted into the process of answering 9‐1‐1 calls, a reduction in the likelihood of a positive outcome occurs.
Originality/value
The outcomes of the RED Project show that Local and State government collaboration using empirical data studies can ensure emergency communication systems are optimized and ready for Next Generation technologies.
Details
Keywords
Sreedhar Madhavaram, Victor Matos, Ben A. Blake and Radha Appan
This paper aims to focus on the role of information and communication technologies (ICTs) in preparation for and management of human and/or nature induced disasters.
Abstract
Purpose
This paper aims to focus on the role of information and communication technologies (ICTs) in preparation for and management of human and/or nature induced disasters.
Design/methodology/approach
Drawing from the phenomenal growth of ICTs, initiatives aimed at disaster management, stakeholder theory, prior research and the successful development and implementation of 9-1-1 (emergency telephone service of the USA), this paper explores ICTs in the context of human and/or nature induced disasters.
Findings
This paper discusses a new ICT for mitigating disaster management, scans, using stakeholder theory, relevant initiatives and prior research to identify the stakeholders relevant for successful preparation for and management of disasters, and draws from the 9-1-1 example to discuss how ICTs can be successfully developed and adopted.
Research limitations/implications
There are opportunities for researchers to develop ICTs that can make countries, developing and developed, more efficient and effective in their preparation for and management of nature and human induced disasters. In addition, researchers can investigate the role of stakeholders in facilitating the adoption of new ICTs developed for disaster management. Researchers could also help public policy in designing the most efficient and effective programs for the adoption of new ICTs.
Practical/implications
As an example of new ICTs that can potentially mitigate the effect of disasters, this paper discusses the E711 text-message mobile phone service (named “I am OK”) and provides a description of how this protocol operates and can be implemented. There are tremendous opportunities to develop new ICTs in the context of disaster management.
Social/implications
This paper argues that ICTs such as E711 can have a major impact on all countries in general and poor and developing nations in particular. Specifically, in the bottom of the pyramid (BOP) markets, developing ICTs for BOP market in the context of managing human and nature induced disasters and ensuring the diffusion of such ICT innovations is both critical and challenging.
Originality/value
This paper discusses the role and importance of ICTs in disaster management, identifies relevant stakeholders, discusses how ICTs can be diffused and implemented and calls on and hopes to provide an impetus to research on ICTs that can aid in the preparation for and the management of disasters.
Details
Keywords
Qiwei Han, Margarida Abreu Novais and Leid Zejnilovic
The purpose of this paper is to propose and demonstrate how Tourism2vec, an adaptation of a natural language processing technique Word2vec, can serve as a tool to investigate…
Abstract
Purpose
The purpose of this paper is to propose and demonstrate how Tourism2vec, an adaptation of a natural language processing technique Word2vec, can serve as a tool to investigate tourism spatio-temporal behavior and quantifying tourism dynamics.
Design/methodology/approach
Tourism2vec, the proposed destination-tourist embedding model that learns from tourist spatio-temporal behavior is introduced, assessed and applied. Mobile positioning data from international tourists visiting Tuscany are used to construct travel itineraries, which are subsequently analyzed by applying the proposed algorithm. Locations and tourist types are then clustered according to travel patterns.
Findings
Municipalities that are similar in terms of their scores of their neural embeddings tend to have a greater number of attractions than those geographically close. Moreover, clusters of municipalities obtained from the K-means algorithm do not entirely align with the provincial administrative segmentation.
Details
Keywords
Ingrid Burbey and Thomas L. Martin
Location‐prediction enables the next generation of location‐based applications. The purpose of this paper is to provide a historical summary of research in personal…
Abstract
Purpose
Location‐prediction enables the next generation of location‐based applications. The purpose of this paper is to provide a historical summary of research in personal location‐prediction. Location‐prediction began as a tool for network management, predicting the load on particular cellular towers or WiFi access points. With the increasing popularity of mobile devices, location‐prediction turned personal, predicting individuals' next locations given their current locations.
Design/methodology/approach
This paper includes an overview of prediction techniques and reviews several location‐prediction projects comparing the raw location data, feature extraction, choice of prediction algorithms and their results.
Findings
A new trend has emerged, that of employing additional context to improve or expand predictions. Incorporating temporal information enables location‐predictions farther out into the future. Appending place types or place names can improve predictions or develop prediction applications that could be used in any locale. Finally, the authors explore research into diverse types of context, such as people's personal contacts or health activities.
Originality/value
This overview provides a broad background for future research in prediction.
Details
Keywords
Eileen M. Decker, Matthew Morin and Eric M. Rosner
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…
Abstract
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.
Details
Keywords