788.11J Presentation “sensors for phishing” (CodeBlue(Health care)) Presented by Amr Ahmed Bhnasawi.

Slides:



Advertisements
Similar presentations
Routing in mobile ad hoc networks Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University
Advertisements

Adapting to new technologies: wireless and PDAs Mary Peterson Royal Adelaide Hospital / Institute of Medical & Veterinary Science Adelaide, Australia
Presented by Renae Foor. 1. Define Computerized Physician Order Entry System 2. Describe hardware/software 3. Review the information system 4. Assess.
WIFI WIFI (wireless-fidelity) is used in hospitals to connect multiple computers and tablets to the same network so that doctors can access their patients.
© Siemens AG 2001 Software & Systems Architectures - Mobile Computing Proposed Research Topics Cooperation between Siemens and UCB March 27, 2001 Visit.
EEC 693/793 Wireless Sensor Networks A Short Name of your Paper’s Title Student Name.
Introduction to Computers. Michael R. Izzo
International conference INNOVATIVE INFORMATION TECHNOLOGIES - IIT – 2007.
Chp 1 Electronic Medical Records Lesson 4: Electronic Medical Records.
Various Types of Health Information Systems Health Informatics 489 Spring 2015.
CSE646 Mary Nitya Tharakan Person #  Unlike traditional sensors like UV and infrared sensors, ZigBee sensors are in use.  RTLS supports features.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
By Brett Kotowski.  Wireless telecommunication device that sends signals from patient to healthcare provider.  Minimizes trips to hospital patient needs.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
International Conference on Computer Convergence Technology 2011 Tie Hua Zhou Database/Bioinformatics Laboratory Chungbuk National.
Lesson 8 Operating Systems
IC3 Chapter 8 Computer Fundamentals
Wirelessly Accessible Sensor Populations (WASP) for Elderly Care Monitoring Presented by Student Name: Ashraf Youssef Mostafa.
Global Forum on Law, Justice and Development October 10,
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
788.11J Presentation “sensors for phishing” (i.e., your short name of the paper’s title) Presented by Student Name.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Sensor networks on a mobile platform University of Missouri-Columbia Ryan Donnelly, Paul Baskett, Tiancheng Zhaung Smartphones have many sensors and collectively.
CodeBlue – Wireless Sensor Networks for Emergency Medical Care Matt Welsh, David Malan, Breanne Duncan, and Thaddeus Fulford-Jones Harvard University Steve.
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
Vaman Robot Smart Systems™. Every Mobile Unit and our Robot accessorise innovation credential will enable all vacuumed services of as you’re Bodyguard,
MOHD AFIF RASHDAN B SHAFIE 11B07116 NANTHINI D/O VELLA 11B07115 BACHELOR OF COMPUTER SCIENCE NETWORK AND SECURITY SUPERVISOR : EN. AKHYARI NASIR.
Presented by Elizabeth Lee Kelsey Madden Judith Mercatili
© 2005 Victor Shnayder – Harvard University 1 CodeBlue: A Wireless Sensor Network for Medical Care and Disaster Response Victor Shnayder Harvard University.
Enterprise Computing With Aspects of Computer Architecture Jordan Harstad Technology Support Analyst Arizona State University.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
By: Dr Alireza Kazemi.  Computer science, the study of complex systems, information and computation using applied mathematics, electrical engineering.
Telemedicine Foundations of Technology Telemedicine © 2013 International Technology and Engineering Educators Association STEM  Center for Teaching and.
Improving Patient Health Outcomes in Acute Care Hospital Settings Using Mobile Wireless Technology and Handheld Computers Research Team Maureen Farrell,
Weems CSE  CompE Transition 2007 BSCSE PRE-PROFESSIONAL (54 hours) GENERAL EDUCATION (24 hours) PROFESSIONAL (49 hours) 3302 Programming Languages 3310.
JTC 1 SWG-A N 110 replaces SWG-A N 086 November 29, 2005 Title: Report of the Task Group 1 Breakout on Domains (replaces SWG-A N 086) Jennifer… Can you.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Subcutaneous Insulin Order Set Order Sets and Pathways Grey Bruce Health Network (GBHN) is a collaboration of 3 corporations, CCAC and.
Science: Learning Experience 10
The Telemedicine & Advanced Technology Research Center (TATRC)
ADOPTION OF HHC’S  Adoption of mobile technologies is a process of social interaction between users, environment and organizations.  Organizational,
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
Medical Informatics Project Proposal Olivia Questore.
788.11J Presentation CodeBlue: A sensor network for medical Care Ren-Shiou Liu.
Credit:  An operating system is the program that is loaded into the computer  coordinates all the activities among.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Embedded, Real-Time and Wireless Systems Professor Jack Stankovic Department of Computer Science University of Virginia June 2, 2005.
Virtual Collaborations Virtual Collaborations StructuresProjects contribute material create case studies build agendas build processes build infrastructure.
788.11J Presentation Volcano Monitoring Deploying a Wireless Sensor Network on an Active Volcano Phani Arava.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
788.11J Presentation Wearable Wireless Body Area Networks (WWBAN) Presented by Jingjing He.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Visit us at OHIMA Booth #54 FTP noun, verb noun 1. File Transfer Protocol: a software protocol for exchanging information between computers over a network.
Health Science Career Pathways Judylyn Hobson RN 1 Objective 1.01.
Villamor,Austine Rose B.. HISTORY Informatics came from the fench word informatique which means computing and was first used as medical informatics during.
Cross-health enterprises Medical Data Management on the EGEE grid
Security Issues.
Virtual Private Networks (VPN)
برامج النظام Software Systems
Printers.
Authentication Protocol
Provider Educational Seminar
788.11J Presentation “Robot Navigation using a Sensor Network ”
Computers: Tools for an Information Age
Presented by Bijendra Vishal
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
CompTIA A+ Objectives Edition.
USN Introduction Computer Engineering Sejin Oh.
Internal components of a computer.
Computers: Tools for an Information Age
Presentation transcript:

788.11J Presentation “sensors for phishing” (CodeBlue(Health care)) Presented by Amr Ahmed Bhnasawi

The Main Idea This system must allow physicians, nurses, and others to assign quickly access rights to patient data and to determine handoff credentials when a patient is transferred to another unit or hospital.

The Main Achievements This project is supported by grants from the National Science Foundation, National Institutes of Health, U.S. Army, as well as generous gifts from Sun Microsystems, Microsoft Corporation, Intel Corporation, Siemens AG, and ArsLogica. CodeBlue is also being used by the AID-N Project at Johns Hopkins Applied Physics Laboratory.

The Challenges Communication challenges  secure,reliable, ad hoc communication among groups of sensors and mobile, handheld devices. Computational challenges  have very limited computational power, and traditional security and encryption techniques are not well-suited to this domain Programming challenges  a cohesive communication and programmingmodel to underlie the system’s operation  software for sensor nodes is very low-level and does not provide higher-level services

Pictures

Innovation The CodeBlue system is currently under development. You can download a prototype release of the CodeBlue software and hardware description files here: codeblue/release codeblue/release

References [1] [2] Sensor Networks reference Book [3]