Literature DB >> 28507610

Improving Patient Safety in Hospitals through Usage of Cloud Supported Video Surveillance.

Predrag Dašić1,2, Jovan Dašić1, Bojan Crvenković1.   

Abstract

BACKGROUND: Patient safety in hospitals is of equal importance as providing treatments and urgent healthcare. With the development of Cloud technologies and Big Data analytics, it is possible to employ VSaaS technology virtually anywhere, for any given security purpose. AIM: For the listed benefits, in this paper, we give an overview of the existing cloud surveillance technologies which can be implemented for improving patient safety.
MATERIAL AND METHODS: Modern VSaaS systems provide higher elasticity and project scalability in dealing with real-time information processing. Modern surveillance technologies can prove to be an effective tool for prevention of patient falls, undesired movement and tempering with attached life supporting devices. Given a large number of patients who require constant supervision, a cloud-based monitoring system can dramatically reduce the occurring costs. It provides continuous real-time monitoring, increased overall security and safety, improved staff productivity, prevention of dishonest claims and long-term digital archiving.
CONCLUSION: Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents.

Entities:  

Keywords:  Video Surveillance as a Service (VSaaS); cloud technology; healthcare; patient safety

Year:  2017        PMID: 28507610      PMCID: PMC5420756          DOI: 10.3889/oamjms.2017.042

Source DB:  PubMed          Journal:  Open Access Maced J Med Sci        ISSN: 1857-9655


Introduction

Surveillance systems have been in use for several decades now since the invention of Closed-circuit television (CCTV) cameras and tape recorders. Over time these systems advanced to using the computer system and IP cameras to capture, store and reproduce recordings which quickly reached limits in size, power requirements, processing, analysing and especially storage. The main obstacle is that they are all on-site based solutions. Cloud computing introduced a novel approach to how data is being managed which reflected video surveillance as well. This brought to the idea of utilising the cloud computing enormous network, storage and processing capabilities such as access control and advanced cloud search [1-5]. Video Surveillance as a Service has undergone significant scientific development since its inception. Notable research done in the area covers universal environmental surveillance system [6], intelligent surveillance video analysis service [7, 8], automatic configuration of video-surveillance [9], remote display solution [10]. The authors [11] introduced a novel approach to developing autonomic cloud application platforms, based on the vision of treating cloud platforms as sensor networks. This approach is based on intelligent re-usage of existing solution strategies and products (specifically, Stream Reasoning and the Semantic Web technology stack), to create a general-purpose autonomous framework. Video surveillance requires high-efficiency compression. The need for it has never been greater as it is estimated that the volume of saved stored and processed video surveillance data will exceed 5,800 Exabytes according to Gantz and Reinsel, 2012 [12] which is more than approximated 1.500 Exabytes by the same author. Wen, et al. 2014 [13] argues that the use of IEEE 1857-2013 encoding standard brings more than twice coding efficiency on surveillance videos compared H.264/AVC HP. One of the solutions for video compression is the Transcoding as a Services (TaaS) provided by an application service provider is Encoding.com. It uses the Amazon Web Services (AWS) platform for transcoding saved surveillance videos into different formats regarding resolution, frame rate, and bandwidth [14]. Key areas of cloud-based video surveillance are video-based detection and tracking [15], video-based person identification, and large-scale surveillance systems. A significant percentage of basic technologies for video-based detection and tracking were developed under a U.S. government-funded program called Video Surveillance and Monitoring (VSAM) [16].

Video Surveillance as a Service (VSaaS)

VSaaS cloud deployment architecture can be public, private or hybrid (a mix of two). Public architecture implies using a cloud service provider with an already set-up platform for video surveillance management. This is the most common usage scenario for VSaaS. Private architecture refers to internally hosted cloud service by a company or enterprise which used the platform for video surveillance purpose. This is rarely the case as it is harder to finance and maintain such a system. In Fig. 1 an example is given of VSaaS framework developed by Hossain, 2014 [17]. We will briefly describe the underlying mechanism of the given framework:
Figure 1

Example of VSaaS framework. Source: (Hossain, 2014)

Example of VSaaS framework. Source: (Hossain, 2014) Video content is provided by sensor devices (cameras) from various sources of the application using push-pull mechanism. The main component is the Publish-subscribe broker which routes the data from the cloud to clients based on current subscription. All processes are regulated by the Cloud manager whose purpose is to manage the interaction between clients and components directory Multimedia surveillance service directory contains all of the functionalities of the service designed service-oriented architecture (SOA) architectural pattern. Resource allocation manager has a purpose of managing and allocating various VM resources for running the surveillance system and associated services. Monitoring and metering component tracks resources usage and provides statics of usage and billing. The beginning of video surveillance was based on Closed-circuit television (CCTV) systems which were developed in the early 1950s. It had no means of storing recording, only monitoring by security employees. With the invention of videocassette recorder in the mid-1960s, it became possible to combine existing CCTV systems with the new device to store and delete surveillance material. The technology significantly improved video surveillance with the introduction of Digital Video Recorder (DVR). Although first development proposals date the to mid 1980s, first commercial usage started in late 1990s. It offered a lot more storage space and faster seeking of recorded material and native PC support. Internet protocol (IP) networks appeared shortly after the invention of the IP camera in the late 1990s, and by 2005 video surveillance was based on Internet/Intranet systems. VSaaS appeared in the early 2010s and since then it presents the most advanced surveillance system available for mass usage. The future of surveillance is without doubt intelligent cloud based systems which are currently being developed and examined in small beta tests. Advances in neural networks and machine learning are growing at a rapid pace and will without question bring unprecedented security applications.

Applications of VSaaS in improving patient’s safety

Health is the most valuable possession and should be preserved for as long as possible. Still, even social insurance experts working in healing facilities need to manage issues, for example, robbery, disagreements regarding conceivable negligence or even the abducting of babies. Tragically, not every gathered guest go to the healing centre to wish their friends and family a fast recuperation. The transparently available and for the most part opened rooms make it simple for potential cheats to take the centre as well as patient property, which frequently causes noteworthy budgetary misfortunes for the healing centre. As a rule definite images from surveillance cameras in lobbies, at crisis exits, close lifts or in the compensation office, prompt to a positive distinguishing proof of the culprit. Particularly in serious care units, patients are for the most part not able to convey a decay of their condition to restorative staff. Video reconnaissance empowers staff to screen patients all day, every day – for in a crisis it is the snappy response of the treating doctors which decides a patient’s odds to survive. In sedative recuperation rooms, the patients’ conditions are likewise just checked from the medical caretakers’ room. AvaSys is a remote patient perception framework that empowers both visual and sound checking of patients at danger of self-mischief, including falls, the expulsion of lifesaving gadgets, and elopement. A versatile truck positioned in the patient room has a camera with skillet and zoom capacity and great, two-way sound (Figure 2). It functions by Wi-Fi to a remote perception station kept an eye on by a PCT that watches over upwards of 10 patients all the while on a solitary screen. At the point when a patient hints at getting up, the screen tech utilises the sound to request that the patient stays put while at the same time alarming a medical attendant using telephone or radio. On the off chance that the sitter can’t divert the patient, a STAT alert on the unit sounds.
Figure 2

Portable system for critical health patient monitoring

Portable system for critical health patient monitoring There are numerous cases reporting children being kidnapped from infant nurseries. Keeping in mind the end goal to guarantee that the babies may nap gently as well as their parents may rest in peace; numerous doctors’ facilities utilise video observation frameworks. Thus, no one enters the infant ward unnoticed. The frameworks’ adaptability takes into consideration the checking framework to be associated with a get to control framework so that no unapproved people access the premises. Regularly in the outcome of hard surgeries or complicated births, the question emerges regardless of whether errors were made amid the technique. Any such question can be settled rapidly and definitively on account of cutting edge video reconnaissance. Computerised recording frameworks are much of the time being utilised amid surgeries with a specific end goal to have the capacity to audit the entire methodology at a later date. In consistence with sterilised instructions, the recorder is not situated in the working area but rather for the most part in an isolated room. Information assurance is likewise ensured at all circumstances. On the pre-operation talk, which must occur before each surgery, the patient is made mindful of the likelihood to record the surgery and after that chooses whether or not he or she needs to make utilisation of it [18]. There are some developed systems which introduce intelligent software systems in hospital surveillance which can increase the number of rooms and areas being monitored by only notifying the operator in case of set rule breach [19, 20]. These systems can further be enhanced by adding robotic sub-systems which can in some cases even replace human operator in charge of notifying the personnel about detected events [21]. According to Brown, 2015 [22] about one million patients fall in USA hospitals facilities every year, which is a devastating number. The greater part of these falls are identified with toileting (45%) and impulsivity (31%), and a disturbing 80% to 90% of patient falls are not seen. Around 30% of patient falls result in harm, and of those, 4% to 6% result in genuine damage. Additionally, falls frequently cause huge patient and family trouble bringing about a postponement in recovery. A low-cost system for prevention of falls is proposed by Rawashdeh et al. 2012 [23]. In Figure 3 is given an example of software detecting a patient fall and raising the alarm to the operator is given.
Figure 3

Example of fall detection software

Example of fall detection software Healthcare services offices procure quiet spectators (in some cases called persistent sitters) or dole out staff to screen patients at hazard for falls or on suicide watch, and the individuals who are befuddled or disturbed. Dissimilar to private-obligation individual care associates, a patient onlooker’s sole duty is to advise staff when the patient takes part in conceivably self-damaging conduct, for example, getting up without help or hauling out tubes. Onlookers by and large get time-based compensation, an unreimbursed cost. Some human services offices must request that the patient’s family give sitters, forcing a weight for working relatives. Healthcare services associations can bring down the expenses of patient perception utilising top notch (HD) video reconnaissance and two-way correspondences. With the perception arrangement, prepared staff in a focal operations focus can watch various patients over the office’s current system, rapidly alarming staff when intercession is required. Figure 4 shows the centralised patient observation setup. Healthcare industry can greatly benefit from cloud-based surveillance, especially from video analytics software such as motion analysis. The authors Lee, and Chung, 2012 [24] developed an algorithm capable of detecting falls of patients in healthcare institutions and removing shadows from objects thus greatly increasing false detection. Such a system of detection can be implemented to monitor patients movement in real-time by automatically notifying hospital staff of unfortunate event such as falling or undesired movement.
Figure 4

Monitoring station for multiple locations with a hospital

Monitoring station for multiple locations with a hospital Cloud-based video surveillance can serve as a data source for Applied Behavior Analysis (ABA) which can help the researcher to better understand human habits and behaviour patterns. For example, the authors Kröckel and Bodendorf, 2010 [25] presented a concept of using data mining methods on images obtained by video surveillance. The analysis is performed for customer trajectories, paths through the retail environment, while image processing is done using OpenCV Computer Vision Library. Results about patterns and clusters are obtained by the different method of data mining. The health sector has proven to have reduced incidents [26] with installed physical security measures. Application of VSaaS in hospitals can greatly influence the early detection of incidents (fights, falls, unauthorised access, vandalism), reduce overall security costs (less security personnel needed, less hardware and technical maintenance personnel, no Digital Video Recording (DVR) devices required) and can provide behavioural analysis. In research by Anderson et al. 2014 [27] the authors proved that monitoring staff members hygiene routine improved the regularity of washing hands in hospitals. In a paper by Frank, 2013 [28] video surveillance lowered the number of incidents in a psychiatric facility by enabling faster response to incidents by supervising staff. Similar conclusions were extracted from a study by Nolan & Volavka 2006 [29] where video recordings served as a source for analysis to reduce violent events. While monitoring proves successful in mental health facilities, there are also rising concerns about ethical violations which may arise [30]. One of the developed techniques applicable in health provider environments is a 3-D imaging technique which pairs high-resolution night-vision cameras with GPS to increase the capabilities of passive imaging surveillance. The technique was developed by Schwartz, 2011 [31] and uses camera models and GPS to derive a registered point cloud from multiple night-vision images. These point clouds are used to generate 3-D scene models and extract real-world positions of mission critical objects. This enables precise geo-positioning in a low-light environment. A supportive hardware solution comes from company Avigilon, which developed Light Catcher technology capable of capturing video with colour detail in extreme low-light environments. The authors Xu, and Wu, 2010 [32] proposed new approach for a Smart Video Surveillance System (SVSS) that uses canonical stereo configuration to set up a pair of static cameras to support a salient map to control a Pan-Tilt-Zoom (PTZ) camera/cameras, which captures high-definition image /video of the interesting moving object in the surveillance area for further forensic investigations. Concepts that underlie several of the key techniques, including detection of moving objects in the video, tracking in two and three dimensions, object classification, and object structure analysis [33]. In Table 1 a state-of-the-art technology for smart video surveillance application is given.
Table 1

List of component technologies and supporting approaches for smart video surveillance

Component technologySupporting approach
Object detectionAdaptive background subtraction with healing and salient motion detection.
Two-dimensional object trackingMaximum likelihood classification scheme to resolve foreground pixels into the component objects.
Three-dimensional wide-baseline stereo object trackingUsing two overlapping views of the scene and locating the same scene point in the two views using two PTZ cameras. 3D night-vision stereoscopic photogrammetry
Object classificationAn image-based approach and a video tracking-based approach.
Object structure analysisDetection technique uses the smoothed silhouette of the foreground object, as segmented using background subtraction.
Face cataloger applicationThe face cataloger uses computer-controlled PTZ cameras driven by a 3-D wide-baseline stereo tracking system. The PTZ cameras automatically acquire zoomed-in views of a person’s head without constraining the subject to be at a particular location.
List of component technologies and supporting approaches for smart video surveillance

Ethical concerns for video surveillance in hospitals

In an on­line world the dangers to private data are numerous as they can originate from staff, patients, relatives, or inconsequential people who may attempt to adjust, harm or uncover data to influence its trustworthiness or privacy. This might be because of physical activity or some likeness thereof or subsequently of an advanced assault. For instance, data held carefully is at danger of revelation if an unapproved individual can read classified subtle elements off a PC screen; similarly at hazard is electronic data that is deficiently secured empowering somebody to duplicate, alter or erase secret data. In both these illustrations, it is more than likely that the revelation will not be-be identified. On account of adjustment or erasure these might be identified by review projects or staff individuals; however, recognition is not ensured, and the outcome could bring about mischief or passing to a patient. The effect on the doctor’s facility could be serious because of the resultant case and terrible reputation [34]. As per driving medicinal services legal counsellor Kirk J. Nahra “A security break that uncovers generous wellbeing data could prompt to different sorts of protection mischief (humiliation, notoriety damage, and so forth.)” [35]. People may pick up data that permits them to trade off, shakedown or influence the notoriety of someone else by furnishing them with medicinal, individual and money related subtle elements that could be utilised against them. In this manner, data security rehearses should be inspected keeping in mind the end goal to dodge breaks that could prompt to case. There is some research done by Thomas 1995 [36] and Vaught, 2004 [37] which discuss privacy and ethical breaches of video surveillance in paediatric facilities and wards. While there are positive sides of monitoring young children, some argue that such surveillance should not be made covert and that all involved parties must be fully informed of existing surveillance systems. Healing centres need to guarantee that the standards in the Privacy Policy are adhered to by all staff, temporary workers and associations who handle the doctor’s facility’s data. This is especially essential when the data is being handled and put away off-site. Gauges for assurance of this data should be incorporated into contracts for both staff and contracted associations keeping in mind the end goal to maintain a strategic distance from breaks of the arrangement. Ruptures of arrangement are all the more frequent because of the absence of mindfulness or comprehension of the issues, or staff is working under undue worry than to plain conduct [38]. Instruction and preparing projects ought to be executed to guarantee that absence of mindfulness is not a reason for approach ruptures. Strategies for worthy utilisation of data and data frameworks should be produced, executed and policed. In conclusion, this paper presented modern applications of Video Surveillance as a Service for healthcare services from both scientific and general public view. Available literature covers a wide scope of application issues and solutions; however, more effort is needed in automation of intelligent data analysis since the amount of data exceeds current software and hardware capabilities. Beside intelligent data analysis more development is needed in the area of video compression and transfer to support high definition streaming without the need of using intermediary storage with pre-compression function. Maintaining secure environments is of imperative importance especially in times of increased terrorist activities, political and economic crisis and unstable conflict regions. VSaaS reduces overall costs and offers unsurpassed technological possibilities compared to traditional systems which should be fully utilised. Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents.
  7 in total

1.  Parents, lies, and videotape: covert video surveillance in pediatric care.

Authors:  Wayne Vaught
Journal:  J Clin Ethics       Date:  2004

2.  Video recording in the assessment of violent incidents in psychiatric hospitals.

Authors:  Karea A Nolan; Jan Volavka
Journal:  J Psychiatr Pract       Date:  2006-01       Impact factor: 1.325

3.  Video Surveillance in Mental Health Facilities: Is it Ethical?

Authors:  Tali Stolovy; Yuval Melamed; Arnon Afek
Journal:  Isr Med Assoc J       Date:  2015-05       Impact factor: 0.892

4.  Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

Authors:  Emily E Tanner-Smith; Benjamin W Fisher
Journal:  J Youth Adolesc       Date:  2015-02-27

5.  [Video surveillance in psychiatric hospitals--pro & contra].

Authors:  Udo Frank
Journal:  Psychiatr Prax       Date:  2013-04-04

6.  Visual sensor based abnormal event detection with moving shadow removal in home healthcare applications.

Authors:  Young-Sook Lee; Wan-Young Chung
Journal:  Sensors (Basel)       Date:  2012-01-05       Impact factor: 3.576

7.  Video observation of hand hygiene practices during routine companion animal appointments and the effect of a poster intervention on hand hygiene compliance.

Authors:  Maureen E C Anderson; Jan M Sargeant; J Scott Weese
Journal:  BMC Vet Res       Date:  2014-05-07       Impact factor: 2.741

  7 in total
  1 in total

Review 1.  Potentials and Challenges of Pervasive Sensing in the Intensive Care Unit.

Authors:  Anis Davoudi; Benjamin Shickel; Patrick James Tighe; Azra Bihorac; Parisa Rashidi
Journal:  Front Digit Health       Date:  2022-05-17
  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.