ITU Workshop: “Radio-Activity Safety and Security Threats Protection and Telemedical Support for Irradiated People” Telebiometrics: Enhancing Telepresence.

Slides:



Advertisements
Similar presentations
Public Health and Healthcare Issues. Public Health and Healthcare.
Advertisements

The benefits of using object identifiers for quantities and units in human physiology Jean-Paul Lemaire Associate Rapporteur of ITU-T SG 17/Q.9 (Telebiometrics)
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
International Telecommunication Union Committed to connecting the world 4 th ITU Green Standards Week Paolo Gemma WG2 Coordinator, ITU-T Focus Group on.
Department of Labor HSPD-12
APPLICATION OF COMPUTER IN MEDICINE BY MASHAEL SAUD ALHARBI.
Establishment of a Training Dosimetry Laboratory in Cairo University Dr. Hassan Fathy for NSPA.
Computational Biology: A Measurement Perspective Alden Dima Information Technology Laboratory
Security Controls – What Works
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Session - 25 MULTIDATABASE CASE Electronic Health Matakuliah: M0184 / Pengolahan Data Distribusi Tahun: 2005 Versi:
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
PART IX: EMERGENCY EXPOSURE SITUATIONS Module IX.1: Generic requirements for emergency exposure situations Lesson IX.1-2: General Requirements Lecture.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Karthiknathan Srinivasan Sanchit Aggarwal
Authentication Approaches over Internet Jia Li
WHO EURO – ECEH, Bonn Methods and models to estimate the impact of transport on health and the environment in cities Pierpaolo Mudu THE PEP INTERNATIONAL.
Biometric Devices Certification (Authentication) For UIDAI Application Workshop on Performance testing in operational environment 18 th June 2012.
The Nature of Disease.
NURS 4006 Nursing Informatics
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Integrating Digital and Mobile Health: From Next Generation Sensors to Cloud Analytics Speakers: Yohan Lee, PhD; Ernest Sohn DISCLAIMER: The views and.
Thomas S. Tenforde NCRP President 67 th Meeting of the NEA Committee on Radiation Protection and Public Health Paris, France May 12-14, 2009 Overview of.
Olga E. SegouDr. Stelios C.A. Thomopoulos Integrated Systems.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Generating and sharing large datasets: Moving out of our measurement comfort Rita Kukafka and Pamela M. Kato October 16-17, 2012 Bruxelles, Belgique.
 CS 5380 Software Engineering Chapter 11 Dependability and Security.
Summary of Current and Planned Reports and Conferences of the National Council on Radiation Protection and Measurements Thomas S. Tenforde President Interagency.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Internet of Things (Ref: Slideshare)
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Role of Technical Agencies Responsible for Hazard Assessment, Monitoring, Observations, Data and Analysis Dr. David Green National Oceanic and Atmospheric.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Intelligent Traffic Environmental System (ITES-AIR)
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
788.11J Presentation Wearable Wireless Body Area Networks (WWBAN) Presented by Jingjing He.
(I)WRM indicators A GWP PERSPECTIVE Water Country Briefs Project Diagnostic Workshop, Geneva, December 2010 Mike Muller : GWP-TEC.
Sustaining Technology Enhanced Learning Large-scale multidisciplinary Research The STELLAR Network of Excellence A European FP7 project Marie Joubert.
IntroOH-1 CSE 5810 Remote Health Care Monitoring by Wearable Sensors and Mobile Devices Kanchan Jha Computer Science & Engineering Department The University.
Unobtrusive Authentication Using ACTIvity Related and Soft BIOmetrics
Outline Sensys SensMetrics Solution SensMetrics Performance Measures
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Business process management (BPM)
Issues need harmonization
Ch.22 INTRUSION DETECTION
Occupational Radiation Protection during High Exposure Operations
Testbed for Medical Cyber-Physical Systems
Outline Introduction Standards Project General Idea
Business process management (BPM)
EMV® 3-D Secure - High Level Overview
Health Catalyst Care Management Suite
Impact of new technologies on regulation
Controlling Sensors Efficiently with MCUs
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Reading Integration Kevin Johnson.
Unit 2: Fundamentals of Computer Systems
Maintaining order and safety in a city is no small task
H2020 Infoday on Photonics Topics
ITU-T activity in ICT security
Water’s Digital Future Jablanka Uzelac, Managing Director
Overview Motivation Objectives Case study Technical approach
Presentation transcript:

ITU Workshop: “Radio-Activity Safety and Security Threats Protection and Telemedical Support for Irradiated People” Telebiometrics: Enhancing Telepresence Hierarchical Networks ITU, GENEVA SWITZERLANDAUGUST, 2011

Architectural Overview of Telepresence Hierarchical Network: Briefly delineate the network layers and their function. Review the flow of information and physiological limitations Present the network challenges and advantages Telebiometrics and Standardization: The importance of Physiological Standardization Interoperability Integrating Wetware/Hardware/Software Urgency and Benefits Market Validation: Market Segmentation Real World Applications Market Trends Agenda ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

Telepresence Hierarchical Network by layer Consciousness and Computation Sampling Environments Wetware Integration Algorithm Filtration/Security (Signal/Noise) Primary Detection via the 5 - Senses Information Sensory Perception Sensor Layer (Hardware and Software) ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

Telebiometrics and Standardization: Interoperability Market Timing Hardware, Software, and Wetware Urgency and Benefits ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

Benefits Each person contains unique biological features and habits, information obtained from the body is difficult to steal or replicate. Telebiometrics enables a reliable from of identification and can provide a more robust fraud and identity theft protection than other methods. Monitor, Identify, Authenticate, Repeatable Measurements Expedite Management of the Crisis Optimize the use of scarce resources Platform of Quantifiable Biological Metrics Quality of Health (QOH) Combining Data from multiple sites. Improve statistical Analysis Share Imaging Data Telebiometrics: Platform of Life Benefits and Urgency Telebiometrics Wetware Hardware Software ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

The Role of Telebiometrics in Managing the Aftermath of a Radiation Incident Phase 4. Select medical protocol based on the spacial coordinates of radiation contamination Phase 2. Determine Radiation Exposure Phase 1. Remove Clothes and Wash Patient After an ionizing radiation incident and the ensued confusion Telebiometrics technology may be used to significantly expedite the management of the crisis, optimizing the use of scarce resources. Diagram 1, below, offers a qualitative process flow for a small-scale radiation event. Time and an error-free intervention are of essence in radiation incidents. Telebiometrics may be employed during phases 2, 3 and 4, shown below, to help identify the individual, associate the measured radiation contamination with a unique ID, and assist authorities to match the appropriate treatment to the individual. For example, Telebiometrics’ feature can work in concert with utilizing the primary principles of radiation safety, i.e., time/distance/shielding, in phase 2 and the ensued medical care to the appropriate individual in phases 3 and 4. In addition to the multimodal biometrics systems, gathering data from different sensors and contexts, the radiation dosimetry data, acquired in phase 3, may be used by a medical practitioner for short- and a long-term follow-up of the exposed individuals. Further, following the standard for Quantities and Units set by ITU-T Study Group 17, the anonymized data from different sites may be combined to improve statistical analysis and share imaging data via telemedicine. Data mining of the collected meta-data may be used to accurately correlate biological reaction under different scales of a radiation incident. Dr. Kevin Khadivi (Radiation Imaging Scientist) ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks Acute Care

Telebiometrics – Market Validation: Market Segmentation Real World Applications Market Trends ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

Target Applications Port Entry Gaming Mobile Identity Environmental Impact Telemedicine Automotive Safety

Urban Inforgraphics using Telebiometrics ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

Automotive Application Telebiometric Sensing ITU, GENEVA SWITZERLANDAUGUST, 2011 Telebiometrics: Enhancing Telepresence Hierarchal Networks

THANK YOU!