4,142 research outputs found

    A HIERACHICAL MODEL FOR MEDICAL REGISTRATIONS

    Get PDF
    The aim of this paper is to improve solutions for developing and improving medical and pharmaceutical services. We made a SWOT analyze of SIUI in order to build a document management system and create medical registration papers, based on collaborative editing and international medical standard. This model was focused on hierarchical decomposition of PHR and EHR records, using modular solution, which stores all data in XML files. It requires a system that is simple to use and allows users to focus their efforts on the content rather that on the technology used to create it. This approach allows a great flexibility in handling document and user interaction.medical registrations, HME standards, PHR, SIUI, hierarchical decomposition

    Enhancing pharmaceutical packaging through a technology ecosystem to facilitate the reuse of medicines and reduce medicinal waste

    Get PDF
    The idea of reusing dispensed medicines is appealing to the general public provided its benefits are illustrated, its risks minimized, and the logistics resolved. For example, medicine reuse could help reduce medicinal waste, protect the environment and improve public health. However, the associated technologies and legislation facilitating medicine reuse are generally not available. The availability of suitable technologies could arguably help shape stakeholders’ beliefs and in turn, uptake of a future medicine reuse scheme by tackling the risks and facilitating the practicalities. A literature survey is undertaken to lay down the groundwork for implementing technologies on and around pharmaceutical packaging in order to meet stakeholders’ previously expressed misgivings about medicine reuse (’stakeholder requirements’), and propose a novel ecosystem for, in effect, reusing returned medicines. Methods: A structured literature search examining the application of existing technologies on pharmaceutical packaging to enable medicine reuse was conducted and presented as a narrative review. Results: Reviewed technologies are classified according to different stakeholders’ requirements, and a novel ecosystem from a technology perspective is suggested as a solution to reusing medicines. Conclusion: Active sensing technologies applying to pharmaceutical packaging using printed electronics enlist medicines to be part of the Internet of Things network. Validating the quality and safety of returned medicines through this network seems to be the most effective way for reusing medicines and the correct application of technologies may be the key enabler

    Toward the development of a knowledge-based construction schedule planning system

    Get PDF
    This research attempts to model and prototype a knowledge-based system for use in the construction industry to accomplish the automatic generation of initial construction schedules. The schedule can be transformed into a logical network that provides a physical representation of the construction operations plan. The prototype system, which requires symbolic processing and reasoning, is developed based on an intensive modeling that rationally examines industry practice. The model identifies work breakdown and precedence relationship as the two major concepts in schedule planning. Work breakdown is concerned with the identification of construction activities that result in the completion of project elements. Precedence relationship is related to the sequencing of construction tasks based on the constraints of scheduling. The knowledge structure of the prototype system is composed of databases, heuristics and algorithms. The databases consist of facts used to represent the structured hierarchy of activities and the formalized task precedence relationships. The heuristics are rules used to determine the breakdown of activities into scheduling modules, the appropriate level of detail and the precedence conditions. The algorithms are procedures used for activity breakdown, task sequencing and task redundancy The current application, scheduling a reinforced concrete building, is specifically prototyped to evaluate the model and the effectiveness of the system. A knowledge system shell M.l is used to prototype this schedule planning system. The prototype has been evaluated by conducting a laboratory experiment on inexperienced schedulers. By measuring the quality and the time of performance, the results of this experiment have suggested that the system can be an effective productivity tool to construction schedulers and planners. The ability of the system to improve the quality of construction schedules further suggests that the model developed is rigorous enough to warrant its continued development into a production standard system --Abstract, pages ii-iii

    Mobile Identity, Credential, and Access Management Framework

    Get PDF
    Organizations today gather unprecedented quantities of data from their operations. This data is coming from transactions made by a person or from a connected system/application. From personal devices to industry including government, the internet has become the primary means of modern communication, further increasing the need for a method to track and secure these devices. Protecting the integrity of connected devices collecting data is critical to ensure the trustworthiness of the system. An organization must not only know the identity of the users on their networks and have the capability of tracing the actions performed by a user but they must trust the system providing them with this knowledge. This increase in the pace of usage of personal devices along with a lack of trust in the internet has driven demand for trusted digital identities. As the world becomes increasingly mobile with the number of smart phone users growing annually and the mobile web flourishing, it is critical to implement strong security on mobile devices. To manage the vast number of devices and feel confident that a machine’s identity is verifiable, companies need to deploy digital credentialing systems with a strong root of trust. As passwords are not a secure method of authentication, mobile devices and other forms of IoT require a means of two-factor authentication that meets NIST standards. Traditionally, this has been done with Public Key Infrastructure (PKI) through the use of a smart card. Blockchain technologies combined with PKI can be utilized in such a way as to provide an identity and access management solution for the internet of things (IoT). Improvements to the security of Radio Frequency Identification (RFID) technology and various implementations of blockchain make viable options for managing the identity and access of IoT devices. When PKI first began over two decades ago, it required the use of a smart card with a set of credentials known as the personal identity verification (PIV) card. The PIV card (something you have) along with a personal identification number (PIN) (something you know) were used to implement two-factor authentication. Over time the use of the PIV cards has proven challenging as mobile devices lack the integrated smart card readers found in laptop and desktop computers. Near Field Communication (NFC) capability in most smart phones and mobile devices provides a mechanism to allow a PIV card to be read by a mobile device. In addition, the existing PKI system must be updated to meet the demands of a mobile focused internet. Blockchain technology is the key to modernizing PKI. Together, blockchain-based PKI and NFC will provide an IoT solution that will allow industry, government, and individuals a foundation of trust in the world wide web that is lacking today

    Limited Liability Property

    Get PDF
    This Article offers a theory of secured credit that aims to answer fundamental questions that have long percolated in the bankruptcy and secured transactions literatures. Are security interests property rights, contract rights, or something else? Why do secured creditors enjoy a priority right that, in bankruptcy, requires them to be paid in full before other debt holders recover anything? Should we care that secured credit creates distributional unfairness when companies cannot pay their debts? This Article argues that security interests are best understood as a form of “limited liability property.” Limited liability—the privilege of being legally shielded from liability that would normally apply—has long been considered the quintessential feature of equity interests. But limited liability is in fact a critical feature of security interests as well. When examined closely, security interests enable their holders to assert several privileges of ownership without bearing any of ownership’s concomitant burdens. In seeking to explain security interests, this Article offers a comprehensive account of capital investment more generally, systematically examining the various property-like interests held in corporate capital structures. Though critics have bemoaned the inequity associated with the priority right in bankruptcy—a secured debtholder can get all its assets back in the event of a bankruptcy while unsecured creditors like unpaid employees get nothing—this priority right is an inevitable consequence of recognizing security interests as a form of direct ownership. The real problem lies in the scope of secured debt holders’ limited liability protections. While equity holders enjoy limited liability, in return they are paid only after other claims in the event of insolvency. Secured lenders, by contrast, collect first, and are thus arguably overprotected. Understanding security interests as limited liability property, then, offers a more elegant way to understand capital investment at the theoretical level while also helping us recognize when and where our system of secured debt may need reform

    Limited Liability Property

    Get PDF
    This Article offers a theory of secured credit that aims to answer fundamental questions that have long percolated in the bankruptcy and secured transactions literatures. Are security interests property rights, contract rights, or something else? Why do secured creditors enjoy a priority right that, in bankruptcy, requires them to be paid in full before other debt holders recover anything? Should we care that secured credit creates distributional unfairness when companies cannot pay their debts? This Article argues that security interests are best understood as a form of “limited liability property.” Limited liability—the privilege of being legally shielded from liability that would normally apply—has long been considered the quintessential feature of equity interests. But limited liability is in fact a critical feature of security interests as well. When examined closely, security interests enable their holders to assert several privileges of ownership without bearing any of ownership’s concomitant burdens. In seeking to explain security interests, this Article offers a comprehensive account of capital investment more generally, systematically examining the various property-like interests held in corporate capital structures. Though critics have bemoaned the inequity associated with the priority right in bankruptcy—a secured debtholder can get all its assets back in the event of a bankruptcy while unsecured creditors like unpaid employees get nothing—this priority right is an inevitable consequence of recognizing security interests as a form of direct ownership. The real problem lies in the scope of secured debt holders’ limited liability protections. While equity holders enjoy limited liability, in return they are paid only after other claims in the event of insolvency. Secured lenders, by contrast, collect first, and are thus arguably overprotected. Understanding security interests as limited liability property, then, offers a more elegant way to understand capital investment at the theoretical level while also helping us recognize when and where our system of secured debt may need reform
    • 

    corecore