Towards a Low- Cost Mobile Subcutaneous Vein Detection Solution Using Near- Infrared Spectroscopy. Advanced ICT Research Group (AIRG), Farmadent Pharm., 2. Maribor, Slovenia. Laboratory of Geometric Modelling and Multimedia Algorithms, Faculty of Electrical Engineering and Computer Science, University of Maribor, 2. Maribor, Slovenia. Department of Vascular Surgery, University Medical Centre Maribor, 2. Maribor, Slovenia. Institute for Media Communication, Faculty of Electrical Engineering and Computer Science, University of Maribor, 2. Maribor, Slovenia. Institute for Medical Informatics, Statistics and Documentation, Medical University of Graz, Auenbruggerplatz 2, 8. Graz, Austria. 6Institute of Information Systems and Computer Media, Graz University of Technology, Inffeldgasse 1. Graz, Austria. Copyright . This paper describes the first approach at combining paper microfluidics with electrochemiluminescent (ECL) detection. Inkjet printing is used to produce paper. Towards a Low-Cost Mobile Subcutaneous Vein Detection Solution Using Near-Infrared Spectroscopy. Lab-on-a-chip (LOC) devices integrate and scale down laboratory functions and processes to a miniaturized chip format. Many LOC devices are used in a wide array of. Existing and Potential Standoff Explosives Detection Techniques examines the scientific techniques currently used as the basis for explosives detection and determines. Free Sun Safety Education Program. The Skin Cancer Foundation has developed the free Sun Smart U education program to help teachers expose students to the importance.Welcome to the home of Oracle Solaris open source projects on java.net! This project will be a hub to provide developer information and resources for the open source. Copy and paste the generated configuration output onto your SRX series or J series device in configuration mode. The site was not too complicated.' (4/27/16) - 'Good experience and products.' (4/27/16) - 'Great website and inventory.'. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Excessive venipunctures are both time- and resource- consuming events, which cause anxiety, pain, and distress in patients, or can lead to severe harmful injuries. We propose a low- cost mobile health solution for subcutaneous vein detection using near- infrared spectroscopy, along with an assessment of the current state of the art in this field. The first objective of this study was to get a deeper overview of the research topic, through the initial team discussions and a detailed literature review (using both academic and grey literature). The second objective, that is, identifying the commercial systems employing near- infrared spectroscopy, was conducted using the Pub. Med database. The goal of the third objective was to identify and evaluate (using the IEEE Xplore database) the research efforts in the field of low- cost near- infrared imaging in general, as a basis for the conceptual model of the upcoming prototype. Although the reviewed commercial devices have demonstrated usefulness and value for peripheral veins visualization, other evaluated clinical outcomes are less conclusive. Previous studies regarding low- cost near- infrared systems demonstrated the general feasibility of developing cost- effective vein detection systems; however, their limitations are restricting their applicability to clinical practice. Finally, based on the current findings, we outline the future research direction. Introduction. This study outlines necessary steps towards developing a low- cost mobile health solution for subcutaneous vein detection using near- infrared (NIR) spectroscopy . The general purpose of this study was to gain a multidimensional understanding of previous works carried out in the field of NIR spectroscopy for the role of vein visualization . Our aim was to conceptualize (and later develop) an educational mobile medical application to primarily help to improve decision- making skills of healthcare students (i. Secondly, we wished to investigate if the available NIR spectroscopy devices were used also for other nonclinical purposes (e. Lastly, our multidisciplinary group wished to ascertain if there has been any precedent in using a standard mobile device for the purpose of vein visualization and to evaluate their scope and findings. Before proceeding, it is important to define the terminology and illustrate the background of the research used throughout this paper. Venipuncture is an everyday procedure in healthcare settings. The prevalence of a peripheral venous access line among patients admitted to hospital wards is as high as 9. Although peripheral veins are often accessed with only one needle insertion, in a substantial number of patients it is necessary to practice between 2 and 1. The main causes for the need of multiple attempts are insufficient venipuncture skills, inadequate care and maintenance . Particularly, the use of smartphones offer very promising possibilities for bringing benefits into the medical area . Moreover, Davies et al. Because of the characteristics and functionalities of its products, m- health is gradually redefining healthcare best practices. M- health entails the use of mobile devices in combination with new information and communication technologies and accessories. These devices have given rise to new possibilities in order to overcome obstacles, drive down costs, redesign care- paths and processes, augment the level of patient safety, and improve significantly the quality of care in diverse care settings, including hospital wards, emergency rooms, and homes . For example, according to a study performed by Haddock et al. For this sort of applications, a new term was introduced by the United States Food and Drug Administration (FDA): mobile medical applications (apps). Mobile medical apps are medical devices that are mobile apps, meet the definition of a medical device, and are, in their turn, an accessory to a regulated medical device or transform a mobile platform into a regulated medical device . Therefore, the main objectives of this study were as follows. The first objective was to get a deeper overview of the problems (i. NIR spectroscopy. The second objective was to identify the commercial systems employing NIR spectroscopy, to understand their composition, their effectiveness, and the relevance of clinical studies that they relied on, in addition to appraising their clinical outcomes and limitations. The third objective was to review all about the research efforts in the field of low- cost NIR spectroscopy, especially, its strengths, weaknesses, and technical features. Research Group. It is well established that when developing a medical device, it is important to involve and consider different perspectives (e. However, for a majority of mobile medical apps (available through official application stores for the major smartphone platforms; see a recent work here . Furthermore, most of them do not even mention any sort of health professionals. For example, in a study performed by Bender et al. Phase 1. As the initial step, the purpose of this phase was to gain a deeper overview about the general challenges of peripheral vein access, especially concerning the background, scope and the improvement strategies related to the handling of venipuncture. After the initial team discussions, enriched and guided by the health professionals, we carried out a detailed literature review (using academic and grey literature) about a group of interrelated terms, leading to a comprehensive knowledge about the research topic. Phase 2. In order to address the second objective (i. NIR spectroscopy), a systemic search was conducted using the Pub. Med database maintained by the National Library of Medicine at the National Institutes of Health and other sources. A search strategy (the flow can be seen in Additional File 1 in Supplementary Material S1 available online at http: //dx. NIR imaging to help visualize the vein pattern to choose the most appropriate skin point for venipuncture or cannulation. After collecting the abstracts that were returned using the search strategy, a manual review was performed to select relevant articles. Full- length articles were obtained for the most relevant abstracts. Clinical studies and efficacy studies were separated and other articles (i. The bibliography from the full- length articles was used to identify any additional journal articles that were not identified during the Boolean search. A flowchart that describes the selection process is shown in Figure 1. Figure 1: Pub. Med search strategy and literature selection process. Phase 3. One of the aims of m- health is to provide cost- effective alternatives in the form of mobile medical apps, especially in the field of diagnostics. Guided by this aim, the goal of our third objective was to identify and evaluate the research efforts in the field of low- cost NIR imaging in general. By the term low- cost research we are referring to studies (e. NIR imaging or acquisition systems from low- cost components. As our next step is to define a concept of transforming a standard mobile device into a low- cost and efficient vein visualization device, the related research findings could have a valuable impact on the design of the model and the architecture of the forthcoming device. In this sense, a systematic search was conducted using the IEEE Xplore database provided by the world. The search strategy (included in the Additional File 1 in the Supplementary Material S1) was used to identify papers covering the design or evaluation of NIR- related systems for multiple purposes, focused on their technical and usability features (e. A flowchart that describes the selection process is shown in Figure 2. Figure 2: IEEE Xplore database search strategy and literature selection process. Phase 1: Peripheral Vein Access and Venipuncture. Venipuncture, the process of obtaining intravenous (IV) access, is an everyday invasive procedure in medical settings and there are more than 1 billion venipuncture related procedures (i. IV therapies) performed per year . It is well documented that excessive venipunctures are a significant challenge in today. Especially in infants and children, recurrent attempts to insert a needle to gain access to a vein elicit anxiety, pain, and distress . Children can be difficult to catheterize due to lack of cooperation, decreased amount of subcutaneous fat, and smaller veins . An average of 2. 3. IV catheter (range 1. Less than half is inserted in the first attempt, about 2/3 is inserted after two tries, and in 5% a catheter is not inserted. There is a lower success rate in infants. In addition to the standard technique of visualization and palpation, there are four main options to complement it, as follows: (1) manual procedures with the support of local chemicals, but they have limitations, above all, in children and people with dark skin . Bring Your Own Device . Milestone Action #3. Strategy requires the Advisory Group to work with the Federal CIO Council (CIOC) to develop government- wide bring- your- own- device (BYOD). Through the BYOD Working Group, the Advisory Group and CIOC produced this document to fulfill the requirements of Milestone Action #3. This document is intended to serve as a toolkit for agencies contemplating implementation of BYOD programs. The toolkit is not meant to be comprehensive, but rather provides key areas for consideration and examples of existing policies and best practices. In addition to providing an overview of considerations for implementing BYOD, the BYOD Working Group members developed a small collection of case studies to highlight the successful efforts of BYOD pilots or programs at several government agencies. The Working Group also assembled examples of existing policies to help inform IT leaders who are planning to develop BYOD programs for their organizations. The National Institute of Standards and Technology (NIST) is also drafting several standards and guidelines focused on mobility, including: Guidelines for Managing and Securing Mobile Devices in the Enterprise. Each of these documents should provide further insight into issues associated with the implementation of BYOD solutions. The Federal Government still has more to do to address the more complicated issues related to BYOD. This includes how the government can reimburse Federal employees for voice/data costs incurred when they use their personal mobile devices instead of government- issued mobile devices, and additional security, privacy, and legal considerations including supply chain risk management and legal discovery. BYOD can be facilitated through applications native to the device, downloaded or installable applications, or even a web browser. The private and public sector entities who have adopted BYOD solutions report that allowing employees to use their personal mobile devices to access company resources often results in increased employee productivity and job satisfaction. From the Federal information security perspective, devices must be configured and managed with information assurance controls commensurate with the sensitivity of the underlying data as part of an overall risk management framework. By embracing the consumerization of Information Technology (IT), the government can address the personal preferences of its employees, offering them increased mobility and better integration of their personal and work lives. It also enables employees the flexibility to work in a way that optimizes their productivity. Such a cost- benefit analysis should take into account both potential increases in employee productivity and potential cost shifts. For example, providing employees access to government services on their personal devices should help reduce the number of government devices that are provided to staff as well as the life- cycle asset management costs associated with these devices. BYOD programs may, however, necessitate government reimbursement for voice/data costs incurred when employees use their personal mobile devices instead of government- issued mobile devices and additional enterprise infrastructure costs in handling the support of BYOD users. Additionally, overall costs may significantly increase for personnel who frequently communicate outside of the coverage area of their primary service provider and incur roaming charges. The magnitude of the issues is a function of both the sensitivity of the underlying data and the amount of processing and data storage allowed on the personal device based on the technical approach adopted. Generally speaking, there are three high- level means of implementing a BYOD program. Virtualization: Provide remote access to computing resources so that no data or corporate application processing is stored or conducted on the personal device. Walled garden: Contain data or corporate application processing within a secure application on the personal device so that it is segregated from personal data. Limited separation: Allow comingled corporate and personal data and/or application processing on the personal device with policies enacted to ensure minimum security controls are still satisfied. Gone are the days of long projects that address every demand. We must now integrate new technologies in a rapid, iterative, agile, interoperable, and secure method to meet changing market and customer needs. Device agnosticism is more important than ever. Our software, hardware, and applications must be compatible across common systems and personal devices. Our information security controls must also be consistent with existing law and standards to ensure confidentiality, integrity, and availability. Below is a list of points to consider when determining whether a BYOD program is right for your agency and its staff. The list, which is by no means exhaustive, includes policy and process considerations for Chief Information Officers, Chief Technology Officers, Chief Information Security Officers, Chief Human Capital Officers, Chief Financial Officers, Chief Acquisition Officers, and others. The BYOD Working Group members developed a small collection of case studies that highlight the successful implementation of a BYOD pilot or program at a government agency. These studies include a brief synopsis which summarizes the specific challenges, approaches, and lessons learned of each. None of the BYOD programs discussed in these case studies involve the transmission of classified information. Agencies should consider the applicability of the discussed technical and policy approaches to their own environments. Equal Employment Opportunity Commission (EEOC) was among the first of several Federal agencies to implement a BYOD pilot that allowed employees to “opt out” of the government- provided mobile device program and install third- party software on their own smartphones that enabled the use of their device for official work purposes. The State of Delaware initiated an effort to not only embrace the concept of BYOD but to realize significant cost savings by having employees turn in their State- owned device in favor of a personally- owned device, which could save the State approximately half of its current wireless expenditure. Back to top. Allowing Bring Your Own Device with Minimal Policy or Legal Implications. August 1. 3, 2. 01. Robert Hughes. Chief Information Officer. Department of the Treasury. Alcohol and Tobacco Tax and Trade Bureau (TTB)robert. Executive Summary. The Alcohol and Tobacco Tax and Trade Bureau (TTB) decided to reduce the costs, time and effort required to refresh desktop and laptop computers used for client computing needs. TTB has a widely dispersed workforce with many personnel working from home full time and over 8. Replacing desktop and laptop computers every 3 to 4 years cost TTB about $2 million and disrupted the IT program and business users for several months. TTB determined that the best solution was to centralize all client computing power and applications, user data, and user settings and allow access to TTB resources by thin client computing devices. A thin client is a computing device or program that relies on another device for computational power. However, the virtual desktop solution allowed TTB to avoid the expense of replacing hardware. The savings achieved paid for TTB’s virtual desktop implementation – which cost approximately $8. TTB $1. 2 million. The TTB virtual desktop/thin client implementation uses a small browser plugin, freely available for almost every operating system, which simply turns the end user device into a viewer and controller of the virtual desktop running in the TTB computer rooms. No data touches the end user device. As a result, the TTB virtual desktop implementation has the significant additional benefit of delivering every TTB application, with user data, to a wide range of user devices without the legal and policy implications that arise from delivering data to or allowing work to be accomplished directly on a personal device. Challenge. TTB was created as an independent bureau in the Department of the Treasury on January 2. Homeland Security Act of 2. When TTB was established, all information technology (IT) resources, including capital assets, IT personnel and the funding to procure equipment and to develop core business applications remained with the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). TTB was funded at a level sufficient only to reimburse ATF for existing service. No funding was provided for the initial purchase or subsequent replacement of any of the equipment required to establish and operate TTB’s IT Systems. In FY 2. 00. 5 TTB established an independent IT operation with no base funding to refresh infrastructure equipment. Replacing desktop and laptop computers every 3 to 4 years cost TTB about $2 million and disrupted the IT program and business users for several months. TTB decided to reduce the costs, time, and effort required to refresh client desktop and laptop computers. A thin client is a computing device or program that relies on another device for computational power. Approach. With limited funding to invest in a completely new infrastructure for the virtual desktop implementation, TTB examined its existing hardware, software and technical expertise to determine the path most likely to succeed and achieve the objectives of providing central access to all IT resources while achieving significant savings. Approximately 8. 0 percent of the Windows Servers and 2. Sun Solaris servers at TTB had been virtualized. With this success in hand, TTB was confident that a virtual desktop infrastructure could be built without purchasing numerous physical servers. The infrastructure required to deliver virtual desktop could itself be largely virtualized.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |