Challenges in Providing Access to Health Facilities for Rural Citizens in Developing Countries

Challenges in Providing Access to Health Facilities for Rural Citizens in Developing Countries

© 2021 by IJETT Journal
Volume-69 Issue-8
Year of Publication : 2021
Authors : Mohd S M Deris, Mohamad A Mohamed, Rajina R Mohamed, Mohd N Derahman, Abd R Mamat, Mohd F A Kadir, Ahmad F A Abidin
DOI :  10.14445/22315381/IJETT-V69I8P205

How to Cite?

Mohd S M Deris, Mohamad A Mohamed, Rajina R Mohamed, Mohd N Derahman, Abd R Mamat, Mohd F A Kadir, Ahmad F A Abidin, "Challenges in Providing Access to Health Facilities for Rural Citizens in Developing Countries," International Journal of Engineering Trends and Technology, vol. 69, no. 8, pp. 36-40, 2021. Crossref,

One of the challenges faced by the IT industry is to provide access to medical care for citizens living in rural areas. Rural areas in some non-developed countries may be physically hardly accessible to the outside world. For that, it will be difficult for those who live in such an area to get access to hospital services. Some illnesses that normally need immediate medical care may end up with fatality to the bearer. In light of this, we survey through the possibility of providing such a virtual appointment in replacement of a physical visit to the rural citizen so that doctors and hospitals can reach out to them. As the basic requirement, the area should have internet coverage, whether wired or wireless. For every household to connect to the application, they need to have a smartphone or computer. As a result, we proposed a simple framework for the online doctor application, which should serve the needs of the public.

Telemedicine, E-health, Online Doctor, Rural Coverage, Digital Doctor.

[1] Nicolini D. The work to make telemedicine work: a social and articulative view. Soc Sci Med. 62(11) (2006) 2754-67, 2006.
[2] Pal A, Mbarika VW, Cobb-Payton F, Datta P, McCoy S. Telemedicine diffusion in a developing country: the case of India. IEEE Trans Inf Technol Biomed 9(1) (2005) 59-65.
[3] Femi E, Foluso A, Temitope O, Vekima N, Carole D, Victor M, Telemedicine Diffusion in a Developing Country: A Case of Nigeria, Science Journal of Public Health 5(4) (2017) 341-346.
[4] Jetty A, Moore, MA, Coffman M, Petterson S, Bazemore A. Rural Family Physicians Are Twice as Likely to Use Telehealth as Urban Family Physicians. Telemed J E Health 24(4) (2018) 268?276.
[5] Smith AC, Bensink M, Armfield N, Stillman J, Caffery L. Telemedicine and Rural Health Care Applications. J Postgrad M 51(2) (2005) 86-93.
[6] Canadian Paediatric Society. Avoiding infection: What to do at the doctor’s office. Paediatr Child Health 13(5) (2008) 420–421.
[7] Reed VT, Margo E, Michael LH. Telehealth. The New England Journal of Medicine 377(16) (2017) 1585-1592.
[8] Czaplik M, Bergrath S, Rossaint R, et al. Employment of telemedicine in emergency medicine. Clinical requirement analysis, system development, and first test results. Methods Inf Med. 53(2) (2014) 99?107.
[9] Deloitte. eVisits: the 21st-century house call. Available at hnology-media-telecommunications/deloitte-au-tmt-evisits- 011014.pdf
[10] Heidi G. Need an appointment right away? Consider a virtual doctor visit. Harvard Health Publishing. Available at a-virtual-doctors-visit-2016091610206
[11] Carlo C, Gabriele P, Giuseppe P. Telemedicine for Developing Countries: A Survey and Some Design Issues. Appl Clin Inform 7 (2016) 1025-1050.
[12] Internet Users Survey 2016: Statistical Brief Number Twenty. Malaysian Communications and Multimedia Commission. Available at 016.pdf
[13] Lazare L, Kire J. Analysis of the Advantages and Disadvantages of Android and iOS Systems and Converting Applications from Android to iOS Platform and Vice Versa. American Journal of Software Engineering and Applications 6(5) (2017) 116-120.
[14] Pankaj D K, Gitanjali S. Scalable database management in cloud computing. Procedia Computer Science 70:658-667, (2015).
[15] Khansari N. Kale, G. Survey on one-time password. International Journal of Computer Engineering & Applications. IX(Iii), 1–7.
[16] Ioannis T, Apostolos PF, Nicolas S. Security and Efficiency Analysis of One Time Password. PCI `16 Proceedings of the 20th Pan-Hellenic Conference on Informatics, November (2016) 10-12, Patras, Greece.
[17] Kalaikavitha E, Phil M, Juliana G. Secure Login Using Encrypted One Time Password (OTP) and Mobile Based Login Methodology. International Journal of Engineering and Science 2(10) (2013) 14– 17.
[18] Alexander U, Adam B, Colleen H. Advanced Encryption Standard Analysis with Multimedia Data on Intel AES-Ni Architecture. International Journal of Computer Science and Applications 13(2) (2016) 89-105.
[19] Eldefrawy MH, Alghathbar K, Khan MK. OTP-Based Two-Factor Authentication Using Mobile Phones, 2011 Eighth International Conference on Information Technology: New Generations, Las Vegas, NV (2011) 327-331.
[20] Mohamed MA. A survey on elliptic curve cryptography. Applied Mathematical Sciences 8(153-156) (2014) 7665-7691.
[21] Rivest RL, Shamir A, Adlemmaan L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM. 21(2) (1978) 120-126.
[22] ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory 31(4) (1985) 469-472.
[23] Koblitz N. Elliptic curve cryptosystems. Math. Comp. (1987) 48:203-209.
[24] Diffie W, Hellman M. New directions in cryptography. IEEE Trans. Info.Theory 22 (1976) 644-654.
[25] Chlouverakis KE, JC Sprott. Chaotic Hyperjerk Systems. Chaos, Solitons & Fractals 28 (2005) 739–746.
[26] Sambas A, Mamat M, Arafa AA, Mahmoud GM, Mohamed MA, Sanjaya WSM. A new chaotic system with line of equilibria: Dynamics, passive control, and circuit design. International Journal of Electrical and Computer Engineering 9(4) (2019) 2336-2345.
[27] Pehlivan I, Uyaroglu Y. A new chaotic attractor from general Lorenz system family and its electronic experimental implementation. Turk J Elec Eng & Comp Sci 18(2)(2010) 171- 184.
[28] Vaidyanathan S, Sambas A, Mohamed MA, Mamat M, Sanjaya WSM. A new hyperchaotic hyperjerk system with three nonlinear terms, its synchronization, and circuit simulation. International Journal of Engineering and Technology(UAE) 7(3) (2018) 1585- 1592.
[29] Vaidyanathan S, King ST, Sambas A, Mohamed MA, Mamat M. A new chaotic jerk system with three nonlinearities and synchronization via adaptive backstepping control. International Journal of Engineering and Technology(UAE) 7(3) (2018) 1936- 1943.
[30] Baptista MS. Cryptography with chaos. Physics Letters A 240(1-2) (1998) 50-54.
[31] Pecora LM, Carroll TL. Synchronization in chaotic systems. Phys. Rev. Lett. 64 (1990) 821-825.
[32] Radwan AG, AbdElHaleem S H, Abd-El-Hafiz S K. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review. Journal of Advanced Research 7(2) (2016) 193-208.