235 research outputs found

    The Empirical Foundations of Teleradiology and Related Applications: A Review of the Evidence

    Full text link
    Introduction: Radiology was founded on a technological discovery by Wilhelm Roentgen in 1895. Teleradiology also had its roots in technology dating back to 1947 with the successful transmission of radiographic images through telephone lines. Diagnostic radiology has become the eye of medicine in terms of diagnosing and treating injury and disease. This article documents the empirical foundations of teleradiology. Methods: A selective review of the credible literature during the past decade (2005?2015) was conducted, using robust research design and adequate sample size as criteria for inclusion. Findings: The evidence regarding feasibility of teleradiology and related information technology applications has been well documented for several decades. The majority of studies focused on intermediate outcomes, as indicated by comparability between teleradiology and conventional radiology. A consistent trend of concordance between the two modalities was observed in terms of diagnostic accuracy and reliability. Additional benefits include reductions in patient transfer, rehospitalization, and length of stay.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/140295/1/tmj.2016.0149.pd

    Preface

    Get PDF

    The Acquisition and Analysis of Electroencephalogram Data for the Classification of Benign Partial Epilepsy of Childhood with Centrotemporal Spikes

    Get PDF
    In this thesis, I will expand upon each step in the process of acquiring and analyzing electroencephalogram (EEG) for the classification of benign childhood epilepsy with centrotemporal spikes. Despite huge advancements in the field of health informatics—natural language processing, machine learning, predictive modeling—there are significant barriers to the access of clinical data. These barriers include information blocking, privacy policy concerns, and a lack of stakeholder support. We will see that these roadblocks are all responsible for stunting biomedical research in some way, including my own experiences in acquiring the data for the second chapter of this thesis. This second chapter expands upon just one possible advancement that can be achieved when researchers attain clinical data (in this case, EEG data). BECTS is a type of epilepsy that only displays epileptiform activity on night-time EEGs. We hypothesize that a brain affected by BECTS is also developmentally different during the daytime, and based on this assumption, our analysis aims to uncover these electrodynamic distinctions. After course-graining raw EEG segments, we extracted sample entropy, recurrence rate, laminarity, and determinism using recurrence quantitative analysis. Our results displayed two major findings. First, awake BECTS and control patients can be classified with no overlap using all of these features. Second, BECTS patients show differences in sleep state RQA values from centrotemporal and non-centrotemporal regions. We cannot confirm if these differences display epileptiform activity, however, because we do not have controls for sleep studies. With proper development and implementation, this research has the potential to become a clinical decision support tool and decrease the need for inconvenient sleep studies

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Steps towards adaptive situation and context-aware access: a contribution to the extension of access control mechanisms within pervasive information systems

    Get PDF
    L'évolution des systèmes pervasives a ouvert de nouveaux horizons aux systèmes d'information classiques qui ont intégré des nouvelles technologies et des services qui assurent la transparence d'accès aux resources d'information à n'importe quand, n'importe où et n'importe comment. En même temps, cette évolution a relevé des nouveaux défis à la sécurité de données et à la modélisation du contrôle d'accès. Afin de confronter ces challenges, differents travaux de recherche se sont dirigés vers l'extension des modèles de contrôles d'accès (en particulier le modèle RBAC) afin de prendre en compte la sensibilité au contexte dans le processus de prise de décision. Mais la liaison d'une décision d'accès aux contraintes contextuelles dynamiques d'un utilisateur mobile va non seulement ajouter plus de complexité au processus de prise de décision mais pourra aussi augmenter les possibilités de refus d'accès. Sachant que l'accessibilité est un élément clé dans les systèmes pervasifs et prenant en compte l'importance d'assurer l'accéssibilité en situations du temps réel, nombreux travaux de recherche ont proposé d'appliquer des mécanismes flexibles de contrôle d'accès avec des solutions parfois extrêmes qui depassent les frontières de sécurité telle que l'option de "Bris-de-Glace". Dans cette thèse, nous introduisons une solution modérée qui se positionne entre la rigidité des modèles de contrôle d'accès et la flexibilité qui expose des risques appliquées pendant des situations du temps réel. Notre contribution comprend deux volets : au niveau de conception, nous proposons PS-RBAC - un modèle RBAC sensible au contexte et à la situation. Le modèle réalise des attributions des permissions adaptatives et de solution de rechange à base de prise de décision basée sur la similarité face à une situation importanteÀ la phase d'exécution, nous introduisons PSQRS - un système de réécriture des requêtes sensible au contexte et à la situation et qui confronte les refus d'accès en reformulant la requête XACML de l'utilisateur et en lui proposant une liste des resources alternatives similaires qu'il peut accéder. L'objectif est de fournir un niveau de sécurité adaptative qui répond aux besoins de l'utilisateur tout en prenant en compte son rôle, ses contraintes contextuelles (localisation, réseau, dispositif, etc.) et sa situation. Notre proposition a été validé dans trois domaines d'application qui sont riches des contextes pervasifs et des scénarii du temps réel: (i) les Équipes Mobiles Gériatriques, (ii) les systèmes avioniques et (iii) les systèmes de vidéo surveillance.The evolution of pervasive computing has opened new horizons to classical information systems by integrating new technologies and services that enable seamless access to information sources at anytime, anyhow and anywhere. Meanwhile this evolution has opened new threats to information security and new challenges to access control modeling. In order to meet these challenges, many research works went towards extending traditional access control models (especially the RBAC model) in order to add context awareness within the decision-making process. Meanwhile, tying access decisions to the dynamic contextual constraints of mobile users would not only add more complexity to decision-making but could also increase the possibilities of access denial. Knowing that accessibility is a key feature for pervasive systems and taking into account the importance of providing access within real-time situations, many research works have proposed applying flexible access control mechanisms with sometimes extreme solutions that depass security boundaries such as the Break-Glass option. In this thesis, we introduce a moderate solution that stands between the rigidity of access control models and the riskful flexibility applied during real-time situations. Our contribution is twofold: on the design phase, we propose PS-RBAC - a Pervasive Situation-aware RBAC model that realizes adaptive permission assignments and alternative-based decision-making based on similarity when facing an important situation. On the implementation phase, we introduce PSQRS - a Pervasive Situation-aware Query Rewriting System architecture that confronts access denials by reformulating the user's XACML access request and proposing to him a list of alternative similar solutions that he can access. The objective is to provide a level of adaptive security that would meet the user needs while taking into consideration his role, contextual constraints (location, network, device, etc.) and his situation. Our proposal has been validated in three application domains that are rich in pervasive contexts and real-time scenarios: (i) Mobile Geriatric Teams, (ii) Avionic Systems and (iii) Video Surveillance Systems

    CITIES: Energetic Efficiency, Sustainability; Infrastructures, Energy and the Environment; Mobility and IoT; Governance and Citizenship

    Get PDF
    This book collects important contributions on smart cities. This book was created in collaboration with the ICSC-CITIES2020, held in San José (Costa Rica) in 2020. This book collects articles on: energetic efficiency and sustainability; infrastructures, energy and the environment; mobility and IoT; governance and citizenship

    2023/2024 University of the Pacific San Francisco Catalog

    Get PDF
    corecore