5,595 research outputs found

    Say Good-Bye to the Silos and Hello to Collaboration: A New Curriculum Approach

    Get PDF
    In sharp contrast with the customary traditions of educational silos in the delivery of knowledge and understanding, this paper presents a true interdisciplinary curriculum that is designed to supply the community with graduates who are prepared to take on diverse roles in health care and information management. The complexity of our modern communities and their anticipated futuristic needs suggest that graduates in health care must be able to apply more than a traditional singular knowledge domain to articulate problems and provide solutions to those problems in meaningful ways. The curriculum approach presented will facilitate interdisciplinary knowledge learning from existing classes, foster faculty collaboration, and enhance the resource sharing and integration. In essence, this new curriculum collapses the boundaries of education silos

    Microsoft or Google Web 2.0 Tools for Course Management

    Get PDF
    While Web 2.0 has no universal definition, it always refers to online interactions in which user groups both provide and receive content with the aim of collective intelligence. Since 2005, online software has provided Web 2.0 collaboration technologies, for little or no charge, that were formerly available only to wealthy organizations. Academic institutions at all levels are experimenting with these technologies to improve student learning experiences, and prepare them for a world in which work can be effectively accomplished through collaboration over the Internet, and geographic and time differences become increasingly irrelevant in sharing knowledge. Web 2.0 technologies are not limited to enriching course content. They can also be incorporated into the management and the delivery of college courses as well as the coordination of virtual teams. Detailed comparisons of the two most popular Web 2.0 office technologies from Google and Microsoft are provided in this teaching tip with examples of ways that Google online applications are used in support of managing a large college-wide computing introductory course

    A Neural-Net Gaussian Machine for Optimal Local Access Network Design

    Get PDF
    Local access network design often involves the solution of a capacitated concentrator location problem (CCLP). In contrast to the conventional single-capacitated CCLP, this paper presents a generalized CCLP (GCCLP) in which n given end-user nodes are to be connected to concentrators located at m available sites, and each concentrator is subject to two capacity constraints - its effective data processing rate (Kbits/sec) and the available number of circuit ports. The objective of GCCLP is to ensure that each end-user node is connected to exactly one concentrator such that neither of its capacity constraints is violated while the total communication costs are minimized. Since GCCLP is combinatorially explosive, large problems may not be practically solved by an exact method. In this paper, rather, an artificial intelligence solution engine, a Gaussian Machine, is developed for solving GCCLP. Our preliminary computational results indicate that this AI-based solution algorithm is a feasible alternative for solving GCCLP

    Relationships, Caring, and Near Misses: Michael’s Story

    Get PDF
    Health care errors are costly to both patients, insurance companies, and put additional strain on existing resources. This research paper is a case study about a patient’s experience in health care with the electronic health care record and the information used to deliver care. This case study will demonstrate that although the electronic health care record does provided information, the information contained within it can be confusing, contribute to health care errors, near misses, and may have an impact on health provider relationships with patients. Information and systems issues are identified with recommendations to help avert health care errors and near misses in the context of the electronic health care record and health service delivery

    The Second International Conference on Health Information Technology Advancement

    Get PDF
    TABLE OF CONTENTS I. Message from the Conference Co-Chairs B. Han and S. Falan …………………………....….……………. 5 II. Message from the Transactions Editor H. Lee …...………..………….......………….……….………….... 7 III. Referred Papers A. Emerging Health Information Technology and Applications The Role of Mobile Technology in Enhancing the Use of Personal Health Records Mohamed Abouzahra and Joseph Tan………………….……………. 9 Mobile Health Information Technology and Patient Care: Methods, Themes, and Research Gaps Bahae Samhan, Majid Dadgar, and K. D. Joshi…………..…. 18 A Balanced Perspective to Perioperative Process Management Jim Ryan, Barbara Doster, Sandra Daily, and Carmen Lewis…..….…………… 30 The Impact of Big Data on the Healthcare Information Systems Kuo Lane Chen and Huei Lee………….…………… 43 B. Health Care Communication, Literacy, and Patient Care Quality Digital Illness Narratives: A New Form of Health Communication Jofen Han and Jo Wiley…..….……..…. 47 Relationships, Caring, and Near Misses: Michael’s Story Sharie Falan and Bernard Han……………….…..…. 53 What is Your Informatics Skills Level? -- The Reliability of an Informatics Competency Measurement Tool Xiaomeng Sun and Sharie Falan.….….….….….….…. 61 C. Health Information Standardization and Interoperability Standardization Needs for Effective Interoperability Marilyn Skrocki…………………….…….………….… 76 Data Interoperability and Information Security in Healthcare Reid Berryman, Nathan Yost, Nicholas Dunn, and Christopher Edwards.…. 84 Michigan Health Information Network (MiHIN) Shared Services vs. the HIE Shared Services in Other States Devon O’Toole, Sean O’Toole, and Logan Steely…..……….…… 94 D. Health information Security and Regulation A Threat Table Based Approach to Telemedicine Security John C. Pendergrass, Karen Heart, C. Ranganathan, and V.N. Venkatakrishnan …. 104 Managing Government Regulatory Requirements for Security and Privacy Using Existing Standard Models Gregory Schymik and Dan Shoemaker…….…….….….… 112 Challenges of Mobile Healthcare Application Security Alan Rea………………………….……………. 118 E. Healthcare Management and Administration Analytical Methods for Planning and Scheduling Daily Work in Inpatient Care Settings: Opportunities for Research and Practice Laila Cure….….……………..….….….….… 121 Predictive Modeling in Post-reform Marketplace Wu-Chyuan Gau, Andrew France, Maria E. Moutinho, Carl D. Smith, and Morgan C. Wang…………...…. 131 A Study on Generic Prescription Substitution Policy as a Cost Containment Approach for Michigan’s Medicaid System Khandaker Nayeemul Islam…….…...……...………………….… 140 F. Health Information Technology Quality Assessment and Medical Service Delivery Theoretical, Methodological and Practical Challenges in Designing Formative Evaluations of Personal eHealth Tools Michael S. Dohan and Joseph Tan……………….……. 150 The Principles of Good Health Care in the U.S. in the 2010s Andrew Targowski…………………….……. 161 Health Information Technology in American Medicine: A Historical Perspective Kenneth A. Fisher………………….……. 171 G. Health Information Technology and Medical Practice Monitoring and Assisting Maternity-Infant Care in Rural Areas (MAMICare) Juan C. Lavariega, Gustavo Córdova, Lorena G Gómez, Alfonso Avila….… 175 An Empirical Study of Home Healthcare Robots Adoption Using the UTUAT Model Ahmad Alaiad, Lina Zhou, and Gunes Koru.…………………….….………. 185 HDQM2: Healthcare Data Quality Maturity Model Javier Mauricio Pinto-Valverde, Miguel Ángel Pérez-Guardado, Lorena Gomez-Martinez, Martha Corrales-Estrada, and Juan Carlos Lavariega-Jarquín.… 199 IV. A List of Reviewers …………………………..…….………………………208 V. WMU – IT Forum 2014 Call for Papers …..…….…………………20

    Conference Co-Chairs’ Message

    Get PDF

    Optimal Telecommunication Facility Planning Under Uncertainty

    Get PDF
    In this paper, we address an important telecommunication network design issue through a new approach that incorporates significant uncertainty in the input data. In particular, we focus on locating communication hubs in a star-star network with both demand and cost uncertainties. The research model determines 1) the number of hubs tobe employed, 2) the location of hubs within a given set of pre-determined sites, and 3) the assignment of end-user nodes to these communication hubs without violating their line capacities. The total system cost includes the fixed costs of installing hubs, and the variable costs of connecting end-user nodes to selected hubs. It is assumed that the demand imposed by any end-user node is not known a priori. Furthermore, each end-user node imposes a variable cost that depends on both the processing demand anda time-varying communication charge. The incorporation of uncertainty in end-user demands, and hence the communication costs, adds a new dimension to network management and facility plannin

    Quenched chiral logarithms in lattice QCD with overlap Dirac quarks

    Full text link
    We examine quenched chiral logarithms in lattice QCD with overlap Dirac quarks. From our data of m_pi^2, we determine the coefficient of quenched chiral logarithm delta = 0.203(14), 0.176(17), 0.193(17) and 0.200(13) for lattices of sizes 8^3 times 24, 10^3 times 24, 12^3 times 24 and 16^3 times 32 respectively. Also, for the first three lattice sizes, we measure the index susceptibility of the overlap Dirac operator, and use the exact relation between the index susceptibility and the eta' mass in quenched chiral perturbation theory to obtain an independent determination of delta = 0.198(27), 0.173(24), 0.169(22), which are in good agreement with those determined from m_pi^2.Comment: Lattice2002(chiral), 3 pages, 2 figure

    Light quark masses in quenched QCD with exact chiral symmetry

    Full text link
    The parameters in the pseudoscalar meson mass formula in quenched chiral perturbation theory to one-loop order are determined by quenched lattice QCD with overlap Dirac operator, and from which the light quark masses are determined with the experimental inputs of pion and kaon masses, and the pion decay constant. Our results are mu,d=5.3±0.3 m_{u,d} = 5.3 \pm 0.3 MeV, and ms=115±8 m_s = 115\pm 8 MeV, in the MSˉ \bar{MS} scheme at scale μ=2 \mu = 2 GeV.Comment: 5 pages, LaTeX, in v2: the missing numerical factor in (13) is restored, and the physical quark masses (16)-(17) are in good agreement with the current lattice world averag
    corecore