Cargando…

Cursor on Target: Research for a Sensor Network

Terrorism, epidemics, natural, and man-made disasters have increased over the last decade, prompting ongoing evaluation and incremental rebuilding of the American public health system (Chan, Killeen, Griswold, & Lenert, 2004a; Yu, Brock, Mecozzi, Tran, & Kost, 2010). In February 2002, the Ce...

Descripción completa

Detalles Bibliográficos
Autores principales: Stevenson, G, Naiman, M, Valenta, AL, Boyd, AD
Formato: Online Artículo Texto
Lenguaje:English
Publicado: University of Illinois at Chicago Library 2012
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3615829/
https://www.ncbi.nlm.nih.gov/pubmed/23569647
http://dx.doi.org/10.5210/ojphi.v4i3.4275
_version_ 1782265052839018496
author Stevenson, G
Naiman, M
Valenta, AL
Boyd, AD
author_facet Stevenson, G
Naiman, M
Valenta, AL
Boyd, AD
author_sort Stevenson, G
collection PubMed
description Terrorism, epidemics, natural, and man-made disasters have increased over the last decade, prompting ongoing evaluation and incremental rebuilding of the American public health system (Chan, Killeen, Griswold, & Lenert, 2004a; Yu, Brock, Mecozzi, Tran, & Kost, 2010). In February 2002, the Center for Disease Control (CDC) identified six focus areas to generate response capacities to bioterrorism and public emergencies. According to one focus area, information sharing and alert notifications between systems and public health agencies must be continuous and automatic (Popovich, Henderson, & Stinn, 2002) Advancements in technology set the stage for this uninterrupted data-sharing requirement to be met; for example, “smart devices” can digitally record and transmit information and text messages from remote disaster sites using wireless ad hoc networks. In this context, medical systems and personnel can provide enhanced patient support from the extraction point to the hospital, even when normal landline infrastructure has been damaged. However, care may be restricted due to the limited recognition of proprietary information and the distance between the transmitter and collector system. This article suggests that overcoming these limitations necessitates the adoption of interoperability by basic operations and illustrates how an Internet Protocol called Cursor-on-Target can facilitate communication between open source and propriety systems.
format Online
Article
Text
id pubmed-3615829
institution National Center for Biotechnology Information
language English
publishDate 2012
publisher University of Illinois at Chicago Library
record_format MEDLINE/PubMed
spelling pubmed-36158292013-04-08 Cursor on Target: Research for a Sensor Network Stevenson, G Naiman, M Valenta, AL Boyd, AD Online J Public Health Inform Articles Terrorism, epidemics, natural, and man-made disasters have increased over the last decade, prompting ongoing evaluation and incremental rebuilding of the American public health system (Chan, Killeen, Griswold, & Lenert, 2004a; Yu, Brock, Mecozzi, Tran, & Kost, 2010). In February 2002, the Center for Disease Control (CDC) identified six focus areas to generate response capacities to bioterrorism and public emergencies. According to one focus area, information sharing and alert notifications between systems and public health agencies must be continuous and automatic (Popovich, Henderson, & Stinn, 2002) Advancements in technology set the stage for this uninterrupted data-sharing requirement to be met; for example, “smart devices” can digitally record and transmit information and text messages from remote disaster sites using wireless ad hoc networks. In this context, medical systems and personnel can provide enhanced patient support from the extraction point to the hospital, even when normal landline infrastructure has been damaged. However, care may be restricted due to the limited recognition of proprietary information and the distance between the transmitter and collector system. This article suggests that overcoming these limitations necessitates the adoption of interoperability by basic operations and illustrates how an Internet Protocol called Cursor-on-Target can facilitate communication between open source and propriety systems. University of Illinois at Chicago Library 2012-12-19 /pmc/articles/PMC3615829/ /pubmed/23569647 http://dx.doi.org/10.5210/ojphi.v4i3.4275 Text en ©2013 the author(s) http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/ojphi/about/submissions#copyrightNotice This is an Open Access article. Authors own copyright of their articles appearing in the Online Journal of Public Health Informatics. Readers may copy articles without permission of the copyright owner(s), as long as the author and OJPHI are acknowledged in the copy and the copy is used for educational, not-for-profit purposes.
spellingShingle Articles
Stevenson, G
Naiman, M
Valenta, AL
Boyd, AD
Cursor on Target: Research for a Sensor Network
title Cursor on Target: Research for a Sensor Network
title_full Cursor on Target: Research for a Sensor Network
title_fullStr Cursor on Target: Research for a Sensor Network
title_full_unstemmed Cursor on Target: Research for a Sensor Network
title_short Cursor on Target: Research for a Sensor Network
title_sort cursor on target: research for a sensor network
topic Articles
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3615829/
https://www.ncbi.nlm.nih.gov/pubmed/23569647
http://dx.doi.org/10.5210/ojphi.v4i3.4275
work_keys_str_mv AT stevensong cursorontargetresearchforasensornetwork
AT naimanm cursorontargetresearchforasensornetwork
AT valentaal cursorontargetresearchforasensornetwork
AT boydad cursorontargetresearchforasensornetwork