1. 2 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future.

Slides:



Advertisements
Similar presentations
Erin Davis Wilmington University. Definition: A technique used to artificially replicate specific components of reality to achieve a desired goal. (Dunn,
Advertisements

Aspire Vertical Markets Banking, Finance and Insurance.
Teaching with Pre-Programmed Scenarios
Pie(s) in the Sky Mark Crovella Boston University Computer Science.
May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
RAHMAN HOSPITALS SCHOOL OF NURSING. RAHMAN HOSPITALS SCHOOL OF NURSING.
Using Computer-Simulated Case-Based Scenarios to Improve Learning Department of Health Professions College of Health & Public Affairs University of Central.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Leader Or Manager? Adrian Taylor St. Mary’s High School Building Leadership Capacity Setting Your Compass Middle Manager Or Middle Leader?
20 minute presentation, 5 minute Q/A Scottsdale Police Department
Emergency Department Thoracotomy: A Hybrid Simulation With A Clinical Outcome.
Grantee: Horizon House Primary Care Partner: Delaware Valley Community Health Cohort: 3 Region: 5 Location: Philadelphia, PA Project Director: Lawrence.
Module 5: Configuring Access for Remote Clients and Networks.
Video Remote Interpreting “Finding the Best Fit” Douglas Newton, CSC, SC: L.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Doctors Train in Second Life Savanna Millen MIS 304 April 6, 2009.
Pressure, Flow, and Resistance Understanding the relationship among pressure, flow and resistance can help you understand how cardiac output and vascular.
Presented By Michelle Decker Elements Laws Classroom It’s our responsibility.
1 Internet Access Bandwidth Management at The University of Pennsylvania Deke Kassabian, Sr. Tech. Director University of Pennsylvania & The MAGPI GigaPoP.
The Technology Presentation prepared by Warren Frost.
CCC Team Assessment of Care Coordination Capacity February 26, 2014 Care Coordination Collaborative California Institute for Mental Health Care Coordination.
Certified Nursing Assistant Jillian O’Neil. 1.Miami University –Kinesiology + Dietetics CNA Certification (May, June 2012) 2.Dietetic internship + Exam.
Using Outreach & Enabling Services to Support the Goals of a Patient-Centered Medical Home Oscar C. Gomez, CEO Health Outreach Partners Health Resources.
Lifestyle Medicine 101 Presented by ACLM Professionals in Training Executive Board 2014.
Simulation and its Future in Education Shahzad Waheed, MD, FAAP, FRCP(C)
Towards a Multi-Agency Knowledge Broker Network
Heart Structures and Sounds Grade 11 University Biology Appealing To Different Learning Styles Caitlin Boutros – HS Science.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Ambulatory Infusion Center Business Plan
Staff Development and the Change Process
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Medical Education and the Lambda Grid Parvati Dev, PhD Stanford University SUMMIT Lab Parvati Dev, PhD Stanford University SUMMIT Lab.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Applications Health Sciences July Distributed Medical Informatics Education  Covers a broad range of fields including electronic medical records.
Internet2 Health Sciences Mary Kratz Internet2 Health Science Manager March Spring Member Meeting International Session.
Computing Fundamentals Module Lesson 6 — Using Technology to Solve Problems Computer Literacy BASICS.
Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 8 Ethics in IT Societies II.
The Value of a School Nurse New York Statewide School Health Services Center.
Scott Armburger Director of Computing Services Franklin Area School District
Adopting Simulation Technology to Teach Veterinary Emergency Response By Angela Clendenin ALEC 640 – Theory of Change October 20, 2015.
Lecturer: Dalia Mirghani
Public Libraries: Iowa City Public Library created the Expanding Access to Consumer Health Electronic Resources Program with help from a grant from the.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
End to End Performance Initiative . Context for E2E Performance High performance backbones are in place Now, under certain conditions within particular.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
CENTRE INTERUNIVERSITAIRE DE CALCUL DE GRENOBLE University of Pennsylvania.
1 Internet Bandwidth Management at The University of Pennsylvania Deke Kassabian, Sr. Tech. Director University of Pennsylvania & The MAGPI GigaPoP October.
Using Technology to Solve Problems Unit 2 Mod 2 SO 7.
Athletic Training Chapter 2 Sports Therapy Mr. Cox.
A Cost Effective Centralized Single parameter Patient Monitoring System Abstract Lack of Medical monitoring equipment's in rural areas of underdeveloped.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Internet2 Applications & Engineering Ted Hanss Director, Applications Development.
[Hospital Name] [Date]. 2 [Insert Hospital Logo Here]
The Value of a School Nurse
Presented By Michelle Decker
Lecturer: Dalia Mirghani
New concepts of training in extension work
OPS235: Configuring a Network Using Virtual Machines – Part 2
Firewall.
Virtual Hospitals: a panel presentation
Respiratory Simulation
Presentation transcript:

1

2 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

3 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

4 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

5 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

6 STATIC MODELS

7 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

8 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

9 RESUSCI ANNE™ MANIPULATIVE MODEL

10 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

11 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

12 COMPUTER CONTROLLED MODELS

13 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

14 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

15 ANIMATED SIMULATION

16 TYPES OF SIMULATION Static Models Computer Controlled Models Animated Simulations Manipulative Models

17 COST OF A SIMULATOR

18 COST OF A SIMULATOR True Cost Of A Simulator Simulator - $75,000 Operator cost - $50,000 per year x 5 yrs. Room - $5000 Total = $330,000 (5 years)

19 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

20 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

21

22 Role of MAGPI GigaPoP Sponsored Participant Relationship with University of Pennsylvania Technical resources and options Liaison to Internet2 staff, resources, and I2 community Support for extension of activity to Saint Francis University Support for extension of activity to rural PA community Promote awareness of CERMUSA/SFU initiatives

23

24

25

26 A strong partnership

27 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

28 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

29

30 USING SIMULATION MODELS ON I2 I2 Uniformed Services University of the Health Sciences National Library of MedicineSaint Francis University ISDN IP

31 Heart Rate Pulse Oximetry (O 2 ) Blood Pressure

32 Commodity Internet I2

33

34

35 Which of the following life threatening conditions held the highest priority in the initial treatment of the patient? Respiratory arrest

36 How does the condition occur with this patient? Pulmonary edema

37 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

38 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

39 RESEARCH OBJECTIVES Create patient simulation classes to train medical providers from a distance. Evaluate the effectiveness of providing specialized medical simulation training from a distance. Demonstrate teaching effectiveness of Internet2.

40 USING SIMULATION MODELS ON I2 7/23/03 Uniformed Services University of the Health Sciences National Library of MedicineSaint Francis University MAGPI 11/21/03

41 Inserting a Swan-Ganz catheter

42 Emergency Room Vital Signs monitor

43 Heart rate Arterial blood pressure Pulmonary pressure Central venous pressure Pulse oximetry

44 Digital Video Transport System (DVTS)

45

46

47 This simulation experience was a valuable use of my time. N=53

48 SELF REPORT ON MONITOR VIEWING N = 42 %Amount > 50% / x ER / Waveform / x / > 50% ER / Waveform 7

49 I prefer this simulation over a comparable lecture on the same material. N=53

50 I would like to participate in more distance education exercises with the simulator. N=53

51 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

52 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

53 Firewall Issues… Using DVTS: Both Computers had IP addresses connected directly to the Abilene network, so no firewall issues were encountered. Abilene Network

54 Firewall Issues… Using H.323: The Polycom at USUHS was located behind their firewall, which prevented CERMUSA from connecting. Abilene Network X Firewall Blocked Ports: 1720 – H.323 Setup Port Dynamic UDP Ports

55 Firewall Issues… Using H.323: To get around the firewall, we filed Paperwork with USUHS’s IT department. Ports 1720 and a range of dynamic UDP ports were opened to allow traffic from CERMUSA’s network to pass through. Abilene Network Traffic Permitted!

56 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

57 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

58 SIMTECH VIRTUAL EMERGENCY ROOM The Virtual Emergency Room (Stanford University) simulates a team learning situation. Real people enter the world as “avatars” and play their roles. The patient is totally simulated. Courtesy Parvati Dev Stanford University

59

60 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

61 TODAY’S AGENDA What are medical simulators? Role of MAGPI GigaPoP The experiments –1 st year –2 nd year Security issues The future

62

63