Abstract:The term unmanned aerial vehicle (UAV) was post-applied in the 1980s to describe remotely piloted multi-purpose, unmanned, autonomous aircraft. The terms unmanned aircraft systems with data terminal connectivity (UAS) and remotely piloted aircraft systems (RPV, RPAS—military systems) are also used. This review aims to analyze the feasibility of using UAVs to support emergency medical systems in the supply and urgent care ranges. The implementation of drones in the medical security system requires proper planni… Show more
“…Construction, ease of implementation, efficiency, safety, effectiveness, and the ability to transport items or collect data cause drones to be considered a promising technology for search and rescue missions [ 143 , 144 , 145 , 146 , 147 , 148 , 149 , 150 ], support for ground transport in dire situations [ 151 , 152 , 153 ], or disaster respond and recovery [ 143 , 144 , 146 , 154 , 155 , 156 ]. Drones can be used for the following purposes: Detection of chemical substances [ 155 ]; Disaster victim identification [ 150 ]; Firefighting operations [ 157 , 158 ]; Transport of medical products [ 151 , 159 , 160 ]; Restoring radio communication [ 149 ]; Support for police patrols [ 161 ]; Responding to the gestures of a person participating in a response mission [ 162 ]; Surveillance in areas with diverse radiation levels [ 163 ]; Detecting anomalies in pollution [ 113 ]. …”
This article aims to present the results of a bibliometric analysis of relevant literature and discuss the main research streams related to the topic of risks in drone applications. The methodology of the conducted research consisted of five procedural steps, including the planning of the research, conducting a systematic review of the literature, proposing a classification framework corresponding to contemporary research trends related to the risk of drone applications, and compiling the characteristics of the publications assigned to each of the highlighted thematic groups. This systematic literature review used the PRISMA method. A total of 257 documents comprising articles and conference proceedings were analysed. On this basis, eight thematic categories related to the use of drones and the risks associated with their operation were distinguished. Due to the high content within two of these categories, a further division into subcategories was proposed to illustrate the research topics better. The conducted investigation made it possible to identify the current research trends related to the risk of drone use and pointed out the existing research gaps, both in the area of risk assessment methodology and in its application areas. The results obtained from the analysis can provide interesting material for both industry and academia.
“…Construction, ease of implementation, efficiency, safety, effectiveness, and the ability to transport items or collect data cause drones to be considered a promising technology for search and rescue missions [ 143 , 144 , 145 , 146 , 147 , 148 , 149 , 150 ], support for ground transport in dire situations [ 151 , 152 , 153 ], or disaster respond and recovery [ 143 , 144 , 146 , 154 , 155 , 156 ]. Drones can be used for the following purposes: Detection of chemical substances [ 155 ]; Disaster victim identification [ 150 ]; Firefighting operations [ 157 , 158 ]; Transport of medical products [ 151 , 159 , 160 ]; Restoring radio communication [ 149 ]; Support for police patrols [ 161 ]; Responding to the gestures of a person participating in a response mission [ 162 ]; Surveillance in areas with diverse radiation levels [ 163 ]; Detecting anomalies in pollution [ 113 ]. …”
This article aims to present the results of a bibliometric analysis of relevant literature and discuss the main research streams related to the topic of risks in drone applications. The methodology of the conducted research consisted of five procedural steps, including the planning of the research, conducting a systematic review of the literature, proposing a classification framework corresponding to contemporary research trends related to the risk of drone applications, and compiling the characteristics of the publications assigned to each of the highlighted thematic groups. This systematic literature review used the PRISMA method. A total of 257 documents comprising articles and conference proceedings were analysed. On this basis, eight thematic categories related to the use of drones and the risks associated with their operation were distinguished. Due to the high content within two of these categories, a further division into subcategories was proposed to illustrate the research topics better. The conducted investigation made it possible to identify the current research trends related to the risk of drone use and pointed out the existing research gaps, both in the area of risk assessment methodology and in its application areas. The results obtained from the analysis can provide interesting material for both industry and academia.
“…Further strong encryption and meticulous product evaluations are needed to prevent the hijacking of drones. Governments should promote installations of more drone centres for immediate replacement and (or) the charging of batteries and also ensure the formulation of drones' utility regulations, as well as encourage aviation authorities to grant legal permissions for drone agencies [20,22,23,25,[64][65][66][67][68][69][70][71][72][73][74][100][101][102][103][104][105][127][128][129][130][131][132][133][134][135][136][137][138][139][140][175][176][177][178][179][180].…”
Section: Discussionmentioning
confidence: 99%
“…objects [69][70][71], 3D modelling of foetal heart defects [72], and glasses for the visually impaired [73]. Envision TEC and Denmark-based Widex [74] developed 3D-processed Individual Shells for Hearing Aids and Poland Institute of Pathology used 3D modelling for teaching purposes [75].…”
The substantial applicability of technological advancements to the healthcare sector and its allied segments are on the verge of questioning the abilities of hospitals, medical institutions, doctors and clinical pathologists in delivering world class healthcare facilities to the global patient community. Investigative works pertinent to the role played of technological advancements in the healthcare sector motivated this work to be undertaken. Part-I of the review addressed the applicable role play of advanced technologies such as Artificial intelligence, Big-data, Block chain, Open-Source and Cloud Computing Technologies, etc., to the healthcare sector and its allied segments. The current Part-II manuscript is critically focused upon reviewing the sustainable role of additional disrupting technologies such as Robotics, Drones, 3D-Printing, IoT, Virtual/Augmented/Mixed Reality, etc., to uncover the vast number of implicit problems encountered by the clinical community. Investigations governing the deployment of these technologies in various allied healthcare segments are highlighted in this manuscript. Subsequently, the unspoken challenges and remedial future directions are discussed thereof.
“…Ref. [7] is a review paper to discuss the security protocols for medical information using UAVs. It aimed to analyze the applicability of UAVs to support emergency medical systems in the areas of delivery and emergency urgent care.…”
In emergency situations, ensuring the secure transmission of medical information is critical. While existing schemes address on-road emergencies, off-road scenarios present unique challenges due to hazardous locations inaccessible to conventional vehicles. This research introduces a protocol for off-road emergencies, leveraging flying ad hoc networks (FANETs) formed by drones. The protocol, designed for users receiving emergency treatment, employs cryptographic techniques to protect sensitive information. To overcome the challenge of decrypting user medical records at emergency centers without the healthcare provider’s key, proxy re-encryption is employed. The control center (CC) securely generates encryption and decryption keys, facilitating the re-encryption process by the cloud server (CS) and transmission to the emergency center (E). The proposed protocol, free from pairing functions, underwent security and efficiency analyses, demonstrating resilience against chosen-ciphertext attacks (CCA) and collusion resistance (CR). Execution times of approximately 0.02 and 0.0 s for re-encryption and decryption processes, respectively, for a message size of 2000 bytes highlighted the efficiency of the protocol. The research contributes a secure and efficient proxy re-encryption protocol for off-road emergency medical information transmission within FANETs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.