• Title/Summary/Keyword: electronic records process

Search Result 127, Processing Time 0.028 seconds

An Automatic LOINC Mapping Framework for Standardization of Laboratory Codes in Medical Informatics (의료 정보 검사코드 표준화를 위한 LOINC 자동 매핑 프레임웍)

  • Ahn, Hoo-Young;Park, Young-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1172-1181
    • /
    • 2009
  • An electronic medical record (EMR) is the medical system that all the test are recorded as text data. However, domestic EMR systems have various forms of medical records. There are a lot of related works to standardize the laboratory codes as a LOINC (Logical Observation Identifiers Names and Code). However the existing researches resolve the problem manually. The manual process does not work when the size of data is enormous. The paper proposes a novel automatic LOINC mapping algorithm which uses indexing techniques and semantic similarity analysis of medical information. They use file system which is not proper to enormous medical data. We designed and implemented mapping algorithm for standardization laboratory codes in medical informatics compared with the existing researches that are only proposed algorithms. The automatic creation of searching words is being possible. Moreover, the paper implemented medical searching framework based on database system that is considered large size of medical data.

  • PDF

An Efficient Wavelet Image Coder for Portable Embedded System (포터블 임베디드 시스템을 위한 웨이블릿 영상 부호화기)

  • Part, Sung-Wook;Cho, Do-Hyun;Park, Jong-Wook
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.52-58
    • /
    • 2006
  • In order to provide an efficient way to processing with limited resources, we propose a wavelet coder that operates with little memory usage on the portable embedded system. In order to reduce redundancy in coding process caused by repetitive scanning of wavelet coefficients, the proposed coder uses a 2D significance coefficient array (SCA) which records the bit-level information of wavelet coefficients. The 2D SCA improves memory usage and processing speed required for image coding because it can perform significance check and bit coding of coefficients simultaneously.

A draft instrument on the international carriage of goods and the outstanding issues (유엔 국제화물 운송협약(초안)과 주요 쟁점 연구)

  • Choi, Jae-Sun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.223-247
    • /
    • 2004
  • United Nations Commission on International Trade Law(hereinafter"UNCITRAL"), the core legal body of the United Nations system in the field of international trade law, is currently in the process of preparing a draft instrument on the international carriage of goods. In order to facilitate and prompt for new draft instrument, Working Group Ⅲ was established under the auspicious of UNCITRAL in 2002. Working Group, which was composed of all member countries of UNCITRAL, considered the text of preliminary draft instrument on the carriage of goods by sea. According to the Working Group's report, this new convention deals with issues relating to the international ocean carriage of goods such as the scope of application, the period of responsibility of the carrier, liability of the carrier, obligations of the shipper and transport documents including electronic records. In the course of the second reading, however, there are lots of outstanding issues to deliberate and consider for formulating new version of the ocean cargo liability convention. One of the substantial issues is the snail's pace of progress in last sessions. Therefore legal adviser and industry representatives assume the next UNCITRAL meeting, in Vienna, Nov. 29-Dec. 10, would be more critical to complete the convention.

  • PDF

A Study on the Expanded Description Elements for the Management of National Artifacts (국가행정박물 관리를 위한 기술요소확장에 관한 연구)

  • Kim, Jeong-Sim;Roh, Soo-Jeong;Nam, Young-Joon
    • Journal of Information Management
    • /
    • v.41 no.1
    • /
    • pp.145-172
    • /
    • 2010
  • National artifacts has the same physical characteristics to general artifacts and the evidential value which was produced during the public working. National artifacts different from paper and electronic records about physical properties. So it should be doing the expanded process. In this study, the ISAD(G), MODS, RAD and CDWA based on Korean Record Management Law by comparing and analysing of the technical elements was being extracted, The descriptive elements of national artifacts is pull by conclusion of the analysis.

Implementing Rule-based Healthcare Edits

  • Abdullah, Umair;Shaheen, Muhammad;Ujager, Farhan Sabir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.116-132
    • /
    • 2022
  • Automated medical claims processing and billing is a popular application domain of information technology. Managing medical related data is a tedious job for healthcare professionals, which distracts them from their main job of healthcare. The technology used in data management has a sound impact on the quality of healthcare data. Most of Information Technology (IT) organizations use conventional software development technology for the implementation of healthcare systems. The objective of this experimental study is to devise a mechanism for use of rule-based expert systems in medical related edits and compare it with the conventional software development technology. A sample of 100 medical edits is selected as a dataset to be tested for implementation using both technologies. Besides empirical analysis, paired t-test is also used to validate the statistical significance of the difference between the two techniques. The conventional software development technology took 254.5 working hours, while rule-based technology took 81 hours to process these edits. Rule-based technology outperformed the conventional systems by increasing the confidence value to 95% and reliability measure to 0.462 (which is < 0.5) which is three times more efficient than conventional software development technology.

A Study on the Conflict Between the Call for Journalists' Phone Records and the Shield Law: Focusing on the Review of Paragraph 2, Article 13 of the Act of Protection of the Secrecy of Correspondence (기자의 통화내역 조회와 취재원 보호 간의 갈등: 통신비밀보호법 제13조 제2항 논의를 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.25
    • /
    • pp.103-133
    • /
    • 2004
  • Korean citizens enjoy not only the freedom of communication but also the secrecy of electronic communication. Article 18 of the Constitution of the Republic of Korea prescribes that the secrecy of correspondence should not be infringed. Namely, all citizens enjoy guaranteed privacy of correspondence. But many people have been experiencing the infringement of those rights. The purpose of this paper is to evaluate whether Paragraph 2, Article 13 of the Act on Protection of the Secrecy of Correspondence infringes on the constitutional rights of privacy of electronic communication. The results of this study indicate that the law violates the Constitution. Paragraph 3, Article 12 (Personal Liberty, Personal Integrity) of the constitution stipulates that "Warrants issued by a judge through due process (upon the request of a prosecutor) have to be presented in case of arrest, detention, seizure, or search." However, prosecutors, the police, and National Intelligence Service have made numerous inquiries calling for the journalists' telephone records without warrants issued by a judge. So, this study suggests that the paragraph should be amended to be compatible with the Constitution. Meanwhile, journalists should make a more concerted effort to protect their news sources in exercising constitutionally protected freedom of the press.

  • PDF

A Study of Metadata for Long-Term Preservation of Digital Research Outcome (디지털 연구성과물의 장기보존을 위한 메타데이터에 관한 연구)

  • Jang, Bo-Seong;Nam, Young-Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.4
    • /
    • pp.281-309
    • /
    • 2011
  • This research designed and proposed metadata elements for the long-term preservation of digital research outcomes collected and managed in electronic file form. Metadata structure of both domestic and foreign agencies that manage research outcomes and CERIF and PREMIS-preserved preservation metadata were referred to design the metadata elements. The metadata design was divided into research information, bibliographic information and archival information. Research information is divided into project, name and institution, and composed of eight top-level elements and 29 sub-level elements. Bibliographic information is composed of 13 top-level elements as the source of research reports. Archival information is composed of 18 top-level elements and 62 sub-level elements as the elements for context, structure, contents and management process of the electronic records.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

A Client-Side App Model for Classifying and Storing Documents

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif;Khalifa, Mahmoud;Alsharani, Mohammed Mujib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.225-233
    • /
    • 2022
  • Due to the large number of documents that are important to people and many of their requests from time to time to perform an essential official procedure, this requires a practical arrangement and organization for them. When necessary, many people struggle with effectively arranging official documents that enable display, which takes a lot of time and effort. Also, no mobile apps specialize in professionally preserving essential electronic records and displaying them when needed. Dataset consisting of 10,841 rows and 13 columns was analyzed using Anaconda, Python, and Mito Data Science new tool obtained from Google Play. The research was conducted using the quantitative descriptive approach. The presented solution is a model specialized in saving essential documents, categorizing according to the user's desire, and displaying them when needed. It is possible to send in an image or a pdf file. Aside from identifying file kinds like PDFs and pictures, the model also looks for and verifies specific file extensions. The file extension and its properties are checked before sharing or saving it by applying the similarity algorithm (Levenshtein). Our method effectively and efficiently facilitated the search process, saving the user time and effort. In conclusion, such an application is not available, which facilitates the process of classifying documents effectively and displaying them quickly and easily for people for printing or sending to some official procedures, and it is considered one of the applications that greatly help in preserving time, effort, and money for people.