13,235 research outputs found

    The Value of Information Technology-Enabled Diabetes Management

    Get PDF
    Reviews different technologies used in diabetes disease management, as well as the costs, benefits, and quality implications of technology-enabled diabetes management programs in the United States

    Context Aware Computing for The Internet of Things: A Survey

    Get PDF
    As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201

    Becker Medical Library Annual Report 2015

    Get PDF

    Complex Care Management Program Overview

    Get PDF
    This report includes brief updates on various forms of complex care management including: Aetna - Medicare Advantage Embedded Case Management ProgramBrigham and Women's Hospital - Care Management ProgramIndependent Health - Care PartnersIntermountain Healthcare and Oregon Health and Science University - Care Management PlusJohns Hopkins University - Hospital at HomeMount Sinai Medical Center -- New York - Mount Sinai Visiting Doctors Program/ Chelsea-Village House Calls ProgramsPartners in Care Foundation - HomeMeds ProgramPrinceton HealthCare System - Partnerships for PIECEQuality Improvement for Complex Chronic Conditions - CarePartner ProgramSenior Services - Project Enhance/EnhanceWellnessSenior Whole Health - Complex Care Management ProgramSumma Health/Ohio Department of Aging - PASSPORT Medicaid Waiver ProgramSutter Health - Sutter Care Coordination ProgramUniversity of Washington School of Medicine - TEAMcar

    Delivering Computer-Based Training Within State Prisons

    Get PDF
    Internet-connected devices are ubiquitous, and our built environment allows us to tap into formerly impossible solutions. As our world increasingly depends on technology to operate, one demographic cannot gain exposure to internet-connected devices or web-based educational programs: incarcerated individuals. The Department of Justice reports that 5 out of 6 State Prisoners are arrested and returned to prison within nine years of their initial release. Research shows that education is a pathway to reducing the U.S. prison population. Individuals who participated in any educational program are 43 percent less likely to return to prison.1 Prisons in the United States often partner with local organizations to provide job training and certification to incarcerated individuals, but few offer technical-vocational skills. Many programs rely exclusively on a partnership with a local college or lack the knowledge base to teach computer networking. By utilizing Docker containers to provide secure and isolated computerbased training, currently incarcerated individuals can increase their education beyond teacher-led classroom instruction. Providing computer access in prison presents significant security and accessibility challenges. The NIST Risk Management Framework implements proven cyber security access frameworks that help prevent unauthorized use. This study shows that combining robust cyber security frameworks with isolated Docker containers running the ToyNet learning suite helps break the cycle of recidivism among individuals incarcerated across the United States

    Med-e-Tel 2017

    Get PDF

    The New York City Health and Hospitals Corporation: Transforming a Public Safety Net Delivery System to Achieve Higher Performance

    Get PDF
    Describes the results of the public benefit corporation's improvement initiatives -- a common clinical information system for continuity, coordination on chronic disease management, teamwork and continuous innovation, and access to appropriate care

    Enabling Data-Driven Transportation Safety Improvements in Rural Alaska

    Get PDF
    Safety improvements require funding. A clear need must be demonstrated to secure funding. For transportation safety, data, especially data about past crashes, is the usual method of demonstrating need. However, in rural locations, such data is often not available, or is not in a form amenable to use in funding applications. This research aids rural entities, often federally recognized tribes and small villages acquire data needed for funding applications. Two aspects of work product are the development of a traffic counting application for an iPad or similar device, and a review of the data requirements of the major transportation funding agencies. The traffic-counting app, UAF Traffic, demonstrated its ability to count traffic and turning movements for cars and trucks, as well as ATVs, snow machines, pedestrians, bicycles, and dog sleds. The review of the major agencies demonstrated that all the likely funders would accept qualitative data and Road Safety Audits. However, quantitative data, if it was available, was helpful
    corecore