Fig. 4From: A secure approach to monitoring emergency health resourcesCommunication modesBack to article page