Using Cell Phones for data entry to a Dengue decision support system

Overview Team Application Funding Contact
 

Introduction

Dengue virus, which is transmitted primarily by the yellow fever mosquito Aedes aegypti, is the most common cause of arboviral disease in tropical and subtropical areas of the world. Annual worldwide cases are estimated to exceed 50 million for dengue fever (DF) and range from 250,000-500,000 for the more serious dengue hemorrhagic fever (DHF) disease manifestation. The dengue situation in the Americas has become critical in recent years with a steadily rising case load and increasing ratios of DHF to DF cases. In the absence of a vaccine against dengue virus, control of the mosquito vector is the primary option for preventing and controlling dengue outbreaks.

In developing countries with critical needs for prevention and control of infectious diseases, large amounts of data are often being collected but only rarely processed and analyzed in a rational manner allowing for evidence-based decision-making. This is, in large part, because information is collected on paper forms which then gather dust on the shelf until they finally are discarded. Lack of electronic systems for data entry, storage and analysis creates untenable situations where a poor factual basis for decision-making results in decisions of uncertain quality regardless of the competence of the decision-maker. At Colorado State University, we are addressing these issues for one important mosquito-borne infectious disease, dengue, through development of a computer-based Dengue Decision Support System (DDSS).

Use of electronic devices, such as laptops, Personal Digital Assistants (PDAs) or cell phones for capture of data in the field and direct input into a central database is an aspect of the DDSS project. Potential for use of such devices would add value to the DDSS through streamlining of data capture and entry and removal of the time-consuming and error-prone step of entering data from paper sheets filled out in the field into the DDSS database using electronic data entry screens in the desktop/laptop version of the DDSS software. Compared to laptops or PDAs, cell phones are less expensive and also eliminate the need for physical means of data transmission via USB flash drives etc. Use of cell phones exploits existing communications infrastructure and also introduces near real time monitoring and potential for rapid feedback to field data collectors. There also are aspects of improved data integrity, including removal of the need for interpretation of paper forms filled out with substandard penmanship and removal of the tedious and error-prone process of manual entry of data from paper forms into an electronic database. Further, there is an explosive growth of mobile telephone networks in the developing world and the International Telecommunications Union predicts that 75 percent of people in Latin America will own a cell phone within the next 3 years (http://www.itu.int/net/home/index.aspx).

Using cell phones, vector control teams can visit homes near where the cases occurred. Capture data from the field and either send it directly to the main server, or saving it in a local cell phone database (e.g., to save internet connection time or when server is not available. Figure 2 shows the workflow of the vector control activities. An agent visits selected addresses in the infected area. However, instead of collecting data on paper forms, the agent uses the cell phone data collection application. Data collected by the application can be sent directly to the center where the main server that runs the DDSS resides (i.e., the health institute that is performing the study).

Architecture

The cellphone application is developed using the Android platform. Android offers royalty free and open source development environment including, the operating system, the VM, Eclipse plug-in developing tool, an emulator for testing the application before installing it on a phone, and tools for encrypting and publishing the application. All the client side applications are developed in Java, a local database (residues on the cell phone), is used by the application. The database is developed with SQlite, which is the database system that Android supports.

In order to provide a robust application, the cell phone can connect to the main server using three options:

  1. Continuous Internet Access: the user collects data and sends it instantly to the main server over the web. This option can be used when the cell phone is always connected to the web and data collected is needed instantly.
  2. Periodic Indirect Access: The user collects data and saves it in the application database. When the user finishes his or her daily task, the user sends the data to the main server over the web. Using this option, operational cost can be minimized since the cell phone does not have to be connected always to the web. The user can use the cell phone Wi-Fi to access the web from a designated point. Therefore, there will be no cost on sending the data.
  3. Desktop/laptop Data Transfer: The user collects data and saves it in the application database. When users return to the center, collected data on the phones are downloaded to a desktop or labtop. This option can be used when the cell phone cannot access the web.

Figure 3 shows the main components of the cell phone application. The application has two units for interacting with the DDSS application on the main server: (1) Web Interface, which performs a set of web services to get data from the DDSS application, and (2) SMS Interface, which processes messages sent from the DDSS application. The Core unit performs calls to the other units in the application including The DB layer which is used to manage the local database, and the user interface unit, which includes a set of forms for getting inputs from users.

Workflow

1. Application Installation: When the application is installed on the cell phone, the application performs several web service calls to the main server using which, the application gets the tasks assigned to the cell phone, the types of these tasks, related settings to these tasks, and the agents information. After the application gets installed, the login screen is called and displayed.

2. Authorization and authentication: The application only saves information for users and tasks that are authorize to work on the cell phone. Cell phone is authenticated using the phone IMEI number and the SIM card number. The agent is identified by a pre-chosen username and password. The agent provides his/her username upon which, the application loads tasks assigned to the user and activates the dropdown list of tasks. The user then provided his/her password and chooses a task to work on. Figure 3 shows the login screen before and after the agent enters the username. The figure was taken while running the application on the Android emulator with specs of a NexusOne phone.

Figure 3: Login screen, before (left) and after (right) the agent enters username.

 

3. Task management: The agent can view and manage assigned subtasks using two forms. The first form, shown in Figure 4 (left), displays the subtasks assigned to the agent. An agent can choose a subtask and perform data collection. Subtasks are a set of addresses of premises assigned to an agent. Subtasks are categorized into 3 groups

  1. Available premises: These are the premises that the agents need to visit and survey. When the agent starts his/her job, all premises will be of this category.
  2. Premises to revisit: Sometimes an agent might visit a premise and arrange with the residents to come back on a later time. Such premises are added to this list. The agent can choose premises from this list to revisit on the scheduled time. However, if the agent cannot do the revisit, or the task administrator decides not to perform revisiting, the subtask can be saved without surveyed information.
  3. Completed Premises: Premises that an agent visits and successfully collected data for them are considered completed. Moreover, if an agent was not allowed to enter the house, or did not find anyone in the house, such premises are also considered completed.

Furthermore, the agent has the option of viewing the status of all assigned subtasks. As shown in Figure 4, left screenshot, the agent can sent all completed subtasks to the main server. This option can be used by the agent when the connection is not available when the premises were visited.

Fingure 4: Task Managment.

 

4. Data collection: The application provides a GUI that the agent can use to collect data for a premise. As shown in figure 5, the agent first selects the status of the premise (entry granted, no one home, entry denied, or revisit). If entry is granted, The rest of the form gets enabled and the agent can use the form to collect data. The data form displays a list of containers types that can be found either inside the house or outside (i.e., in the backyard) . These container types are sent to the application when it is installed. Therefore, can be changed depending on where the application is going to be used. For each container type, the agent reports how many such containers are found, how many of them contain water, how many contain pupae, and how many contain larvae. As shown in Figure 5, the agent can either type in the numbers or use the +/- button to increase/decrease the numbers. The application performs the following validations:

  1. The number of containers that contain water should not exceed the total number of containers.
  2. The number of containers that contain larvae should not exceed the number of containers with water, since larvae do not live in dry containers.
  3. The number of containers that contain pupae should not exceed the number of containers with water, since pupae do not live in dry containers.

Using the "send" button, the agent can send the collected data directly to the main server. The agent can also choose to save the data locally in the database and sent all collected data periodically.

Figure 5: Data collection form: On the left, selection of premises status. On the right, filling data for containers.

 

 

 
All rights reserved. Design by Fadi Wedyan