2009
DOI: 10.3109/03091900903336902
|View full text |Cite
|
Sign up to set email alerts
|

Wireless technology in the evolution of patient monitoring on general hospital wards

Abstract: The evolution of patient monitoring on general hospital wards is discussed. Patients on general wards are monitored according to the severity of their conditions, which can be subjective at best. A report by the Commission for Healthcare Audit and Inspection in 2008 indicated dissatisfaction with patient monitoring. Commitment to providing quality health service by healthcare organizations encourages the implementation of other mechanisms for patient care. Remote patient monitoring (RPM), by supplementing the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 25 publications
0
21
0
Order By: Relevance
“…The lack of mobility caused by wired monitoring systems is discussed by Baisa [3]. Although some wireless monitoring systems have been proposed [4,5], they are being introduced in hospital wards which potentially impact on a number of issues including privacy.…”
Section: Technology Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The lack of mobility caused by wired monitoring systems is discussed by Baisa [3]. Although some wireless monitoring systems have been proposed [4,5], they are being introduced in hospital wards which potentially impact on a number of issues including privacy.…”
Section: Technology Reviewmentioning
confidence: 99%
“…[6]. Garfinkel et al [4] categorizes two threats associated with the use of personal tagging: individual threats and corporate data threats. It is the first of these which is of concern to patients whose data could be intercepted and tracked by third parties.…”
Section: Final Word On Ethical Issuesmentioning
confidence: 99%
“…This equation can be further developed to calculate the energy consumption profile of various random access protocols. Energy consumed to transmit a packet depends on the packet structure such as the length of a packet and the number of overhead bits, transmission data rate, distance between a transmitter and a receiver, minimum SNR requirements of a receiver as shown by (3). Number of overhead bits used in a transmission will depend on the MAC protocol.…”
Section: Tlmentioning
confidence: 99%
“…In some cases retransmission of packets could significantly increase the energy consumption of a node. Retransmissions can be initiated either due to poor channel conditions or higher traffic levels in a network as shown by (3). A node consumes certain amount of energy as shown by (2).…”
Section: Tlmentioning
confidence: 99%
See 1 more Smart Citation