Cargando…
Cursor on Target: Research for a Sensor Network
Terrorism, epidemics, natural, and man-made disasters have increased over the last decade, prompting ongoing evaluation and incremental rebuilding of the American public health system (Chan, Killeen, Griswold, & Lenert, 2004a; Yu, Brock, Mecozzi, Tran, & Kost, 2010). In February 2002, the Ce...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
University of Illinois at Chicago Library
2012
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3615829/ https://www.ncbi.nlm.nih.gov/pubmed/23569647 http://dx.doi.org/10.5210/ojphi.v4i3.4275 |
_version_ | 1782265052839018496 |
---|---|
author | Stevenson, G Naiman, M Valenta, AL Boyd, AD |
author_facet | Stevenson, G Naiman, M Valenta, AL Boyd, AD |
author_sort | Stevenson, G |
collection | PubMed |
description | Terrorism, epidemics, natural, and man-made disasters have increased over the last decade, prompting ongoing evaluation and incremental rebuilding of the American public health system (Chan, Killeen, Griswold, & Lenert, 2004a; Yu, Brock, Mecozzi, Tran, & Kost, 2010). In February 2002, the Center for Disease Control (CDC) identified six focus areas to generate response capacities to bioterrorism and public emergencies. According to one focus area, information sharing and alert notifications between systems and public health agencies must be continuous and automatic (Popovich, Henderson, & Stinn, 2002) Advancements in technology set the stage for this uninterrupted data-sharing requirement to be met; for example, “smart devices” can digitally record and transmit information and text messages from remote disaster sites using wireless ad hoc networks. In this context, medical systems and personnel can provide enhanced patient support from the extraction point to the hospital, even when normal landline infrastructure has been damaged. However, care may be restricted due to the limited recognition of proprietary information and the distance between the transmitter and collector system. This article suggests that overcoming these limitations necessitates the adoption of interoperability by basic operations and illustrates how an Internet Protocol called Cursor-on-Target can facilitate communication between open source and propriety systems. |
format | Online Article Text |
id | pubmed-3615829 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2012 |
publisher | University of Illinois at Chicago Library |
record_format | MEDLINE/PubMed |
spelling | pubmed-36158292013-04-08 Cursor on Target: Research for a Sensor Network Stevenson, G Naiman, M Valenta, AL Boyd, AD Online J Public Health Inform Articles Terrorism, epidemics, natural, and man-made disasters have increased over the last decade, prompting ongoing evaluation and incremental rebuilding of the American public health system (Chan, Killeen, Griswold, & Lenert, 2004a; Yu, Brock, Mecozzi, Tran, & Kost, 2010). In February 2002, the Center for Disease Control (CDC) identified six focus areas to generate response capacities to bioterrorism and public emergencies. According to one focus area, information sharing and alert notifications between systems and public health agencies must be continuous and automatic (Popovich, Henderson, & Stinn, 2002) Advancements in technology set the stage for this uninterrupted data-sharing requirement to be met; for example, “smart devices” can digitally record and transmit information and text messages from remote disaster sites using wireless ad hoc networks. In this context, medical systems and personnel can provide enhanced patient support from the extraction point to the hospital, even when normal landline infrastructure has been damaged. However, care may be restricted due to the limited recognition of proprietary information and the distance between the transmitter and collector system. This article suggests that overcoming these limitations necessitates the adoption of interoperability by basic operations and illustrates how an Internet Protocol called Cursor-on-Target can facilitate communication between open source and propriety systems. University of Illinois at Chicago Library 2012-12-19 /pmc/articles/PMC3615829/ /pubmed/23569647 http://dx.doi.org/10.5210/ojphi.v4i3.4275 Text en ©2013 the author(s) http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/ojphi/about/submissions#copyrightNotice This is an Open Access article. Authors own copyright of their articles appearing in the Online Journal of Public Health Informatics. Readers may copy articles without permission of the copyright owner(s), as long as the author and OJPHI are acknowledged in the copy and the copy is used for educational, not-for-profit purposes. |
spellingShingle | Articles Stevenson, G Naiman, M Valenta, AL Boyd, AD Cursor on Target: Research for a Sensor Network |
title | Cursor on Target: Research for a Sensor Network |
title_full | Cursor on Target: Research for a Sensor Network |
title_fullStr | Cursor on Target: Research for a Sensor Network |
title_full_unstemmed | Cursor on Target: Research for a Sensor Network |
title_short | Cursor on Target: Research for a Sensor Network |
title_sort | cursor on target: research for a sensor network |
topic | Articles |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3615829/ https://www.ncbi.nlm.nih.gov/pubmed/23569647 http://dx.doi.org/10.5210/ojphi.v4i3.4275 |
work_keys_str_mv | AT stevensong cursorontargetresearchforasensornetwork AT naimanm cursorontargetresearchforasensornetwork AT valentaal cursorontargetresearchforasensornetwork AT boydad cursorontargetresearchforasensornetwork |