A Pervasive Computing Approach in Medical Emergency Environments

被引:0
|
作者
Thierry, J. [1 ]
Hafner, C. [1 ]
Grasser, S. [1 ]
机构
[1] Carinthian Univ Appl Sci, Dept Med Informat Technol MedIT, A-9020 Klagenfurt, Austria
关键词
Emergency Systems; Emergency Patient Care Report Form; Hardware; Setup; Speech Recognition; Wireless Data Transmission; Mobile and Wearable Devices;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
The main priorities of an emergency physician are to rescue lives and to limit the damage to life and limb of patients as much as possible. Thus, the analysis of the situation at the accident scene and the determination of first aid methods as well as follow-on medical techniques at the hospital are the result. In order to allow an electronic and hands-free data acquisition process, CANIS - the Carinthian Notarzt (emergency physician) Information System - aims at the establishment and optimization of the information stream between the emergency rescue vehicle (ERV) and/or emergency rescue helicopter (ERH), and the receiving hospital, as well as the development of a speech-based electronic Emergency Patient Care Report Form (sEPCRF). To achieve these challenging requirements, a pervasive hardware setup must be established.
引用
收藏
页码:1058 / 1061
页数:4
相关论文
共 50 条
  • [1] A Practical Approach to Partition Applications in Pervasive Computing Environments
    Jungum, Nevin Vunka
    Mohamudally, Nawaz
    Nissanke, Nimal
    [J]. 10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 74 - 81
  • [2] LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments
    Siebert, Joanna
    Cao, Jiannong
    Lai, Yi
    Guo, Peng
    Zhu, Weiping
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (07) : 1948 - 1957
  • [3] The master key: A private authentication approach for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
  • [4] Coordination in pervasive computing environments
    Ferscha, A
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [5] Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments
    Mohammadrezaei, Mohammadreza
    Fathi, Mahsa
    Attarzadeh, Nima
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 55 - 59
  • [6] Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments
    Mohammadrezaei, Mohammadreza
    Fathi, Mahsa
    Attarzadeh, Nima
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (09): : 101 - 105
  • [7] Adaptation in pervasive computing environments: A multi-agent approach
    Menon, Vivek
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 175 - 176
  • [8] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [9] A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
    Zhu, Feng
    Carpenter, Sandra
    Zhu, Wei
    Mutka, Matt W.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (04) : 1 - 20
  • [10] Expose or not? A progressive exposure approach for service discovery in pervasive computing environments
    Zhu, F
    Zhu, W
    Mutka, MW
    Ni, L
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 225 - 234