Phototherapy is the standard treatment for severe cases of hyperbilirubinemia in newborns. Phototherapy exposes the infants to light in the range of 400-500 nm to isomerize unconjugated bilirubin in the skin. Any light source that produces this wavelength can be used, including the sun (though there is a risk of sunburn), fluorescent or halogen lamps, or, more recently, light-emitting diodes. Despite the well-established efficacy of phototherapy devices and their relative simplicity-being not much more than a floor lamp-phototherapy devices are too expensive for developing world hospitals to purchase, with typical hospital models ranging from US$3,000 to US$5,000. In addition, the resource-poor setting presents a more challenging engineering problem than most. Phototherapy devices are frequently donated to developing world hospitals. However, donated phototherapy devices typically run for no more than a few months once donated and, even then, offer little value to some hospitals. Given this background, we set out to design a phototherapy device specifically for use in the developing world. As a minimum, we knew that it had to have a light source with an extraordinarily long life span and have battery backup so that it could run during frequent power outages. Our design uses LEDs and is powered by a car or motorcycle battery. In this article, we present the full engineering design cycle, staring with needs identification and continuing through several cycles of engineering field trials and results with comments on the differences between the engineering design cycle executed in, and for, the developing world.
This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma 6σ framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.
A network made of individuals connected based on their communication behaviour using mobile phones can be called as a Mobile Social Network. Mapping and measuring of interactions and flows between people across mobile social networks are being performed extensively in an attempt to understand the intriguing patterns of human behaviour. Such analyses can help in arriving at useful inferences for improving the accuracy of 'Targeted Advertisements'. This paper makes one such attempt to extract the demographics (i.e gender and economic status) of a person based on his/her connectivity in his/her respective social network(s) and mobile phone usage over a period of time. The need for prediction arises from the fact that, for prepaid users, the demographics are either unavailable or inaccurate. The results produced are evaluated and standardized based on proven statistics pertaining to the nation considered. We use candlestick charts to compare the experimental results.
Abstract-Distance learning using internet as q communication medium has been successful for instructional education. The paradigm of instructional education deals with a real time interaction between a tutor and students. The next phase of internet powered distance education is to enable laboratory based education. This can be achieved by providing an interactive, collaborative experience and live access to the equipment while an experiment is being conducted. The key objective of this study is to provide remote access capability for engineering laboratories and create cyber-enabled, hands-on laboratory environments. The primary challenges for a cyber-enabled laboratory include technological issues related to communication infrastructure as well as non-technical issues such as determining collaborative interaction among remote students. Based on these challenges, we have evaluated and developed software & hardware components to provide a streamlined, web-centric laboratory experience for remote access students.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.