An Updated “Call Database” to Support Lab Consultation and Quality Improvement Projects

2019 ◽  
Vol 152 (Supplement_1) ◽  
pp. S3-S3
Author(s):  
Niklas Krumm ◽  
Noah Hoffman

Abstract Clinical laboratories may have “on-call” residents and fellows, a practice that assists the laboratory in providing quality support to clinicians and provides valuable clinical experience to trainees. A Call Database may be used as a tool to facilitate call handoffs, as an educational resource and knowledge base for trainees, and as a call logging and review tool as required by the Accreditation Council for Graduate Medical Education (ACGME). The Call Database at our institution currently contains over 51,000 entries and is used by all clinical pathology residents and fellows while “on call.” Prior versions of our Call Database (first developed in 2004 and updated in 2014) were self-hosted applications with limited feature sets that were difficult to support; moreover, they provided few guarantees around electronic protected health information (ePHI), a topic of increasing concern as HIPAA compliance among clinical laboratories is increasingly audited. A review of the current application also identified that it has limited usefulness in supporting faculty review of calls, does not easily allow structured data entry for quality improvement projects, and lacks features commonly seen in modern web applications (eg, rich text editing and file attachments). Here we describe the latest update to our existing Call Database addressing these feature limitations. In addition, we discuss our approach to using a modern cloud-based infrastructure design that address prior shortcomings in data security, user management, and ease of development. The updated Call Database is a single-page web application, compatible with a wide range of local and cloud environments. We updated the user interface with features such as auto-saving of entries, rich text entry, file attachments, and topic tagging. Several new features facilitate the faculty review process: (1) a dedicated “review mode” for rapid viewing and commenting of relevant calls, (2) automated weekly emails by topic sent to faculty, and (3) a user “mention” feature so that trainees can solicit the opinion of faculty in the text of a call or comment itself. Finally, we provide support for customizing the structured data fields of call entries, which enables support of quality improvement and monitoring projects via the call database (eg, a customized entry for monitoring use of specific send-out tests, massive transfusion reactions, etc.). Our application delivers a modern, performant, and easy to use call database for use by trainees and faculty alike. We utilize the Amazon Cloud (AWS) to host the application and have developed a specific set of compliance and risk review documents to address HIPAA compliance. Future work will incorporate user feedback and will focus on supporting the implementation of our application at other sites or clinical pathology residency programs.

2016 ◽  
Vol 1 (2) ◽  
pp. 46-62
Author(s):  
Taufik Ramadan Firdaus

Currently the Internet became one of the media that can not be separated, as well as a wide variety of applications supplied her. As the development of technologies, reliance on Web applications also increased. However, web applications have a wide range of threats, one of it is a CSRF (Cross-Site Request Forgery). This study uses CSRF (Cross-Site Request Forgery) Protection. CSRF (Cross-Site Request Forgery) Protection is a treatment method that has a variety of ways, one of which uses a token in the session when the user login. Token generated at login will be used as a user id that the system of web applications to identify where the request originated.  The results of this study are expected in order to increase web application defenses against CSRF (Cross-Site Request Forgery), so that web application users will be able to feel safe in using the Internet and its various feature. Reduced level of attacks on web applications. So that visitor traffic on the web application can be increased.


2020 ◽  
pp. 16-20
Author(s):  
Marina Ozhiganova ◽  
◽  
Emil Kurtametov ◽  

Security of network systems has become a necessity, as more and more important information is stored and used online. The spread of web applications opens up new attack vectors. Traditional security mechanisms, such as firewalls, are not designed to protect web applications and therefore do not provide adequate protection. Current attacks cannot be prevented only by blocking ports 80 (HTTP) and 443 (HTTPS). Preventative measures (such as web application firewall rules) are not always possible. Signature methods for detection are always behind the actual event. Protocol-enforced network firewalls usually provide the first line of defense, delaying most major attacks on the network perimeter. They mainly work on the network, session, and transport layers of the reference network model (OSI). Developers have significantly expanded the capabilities of network firewalls to control the integrity of a wide range of top-level protocols, such as DNS, FTP, HTTP, SMTP, and TFTP. Standard firewalls can help restrict or allow access to network ports. Although application proxy firewalls exist, they cannot understand the specific content of all web applications run by an enterprise. The purpose of this article is to study the features of using machine learning in web application protection. Methods of web application security and learning neural networks were studied. The result of this work is a theoretical overview of the neural network security of a web application.


Author(s):  
Mariano Rico ◽  
Óscar Corcho ◽  
José Antonio Macías ◽  
David Camacho

Current web application development requires highly qualified staff, dealing with an extensive number of architectures and technologies. When these applications incorporate semantic data, the list of skill requirements becomes even larger, leading to a high adoption barrier for the development of semantically enabled Web applications. This paper describes VPOET, a tool focused mainly on two types of users: web designers and web application developers. By using this tool, web designers do not need specific skills in semantic web technologies to create web templates to handle semantic data. Web application developers incorporate those templates into their web applications, by means of a simple mechanism based in HTTP messages. End-users can use these templates through a Google Gadget. As web designers play a key role in the system, an experimental evaluation has been conducted, showing that VPOET provides good usability features for a representative group of web designers in a wide range of competencies in client-side technologies, ranging from amateur HTML developers to professional web designers.


Heritage ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 710-724
Author(s):  
Bruno Fanini ◽  
Daniele Ferdani ◽  
Emanuel Demetrescu

Today, Web3D technologies and the rise of new standards, combined with faster browsers and better hardware integration, allow the creation of engaging and interactive web applications that target the field of cultural heritage. Functional, accessible, and expressive approaches to discovering the past starting from the present (or vice-versa) are generally a strong requirement. Cultural heritage artifacts, decorated walls, etc. can be considered as palimpsests with a stratification of different actions over time (modifications, restorations, or even reconstruction of the original artifact). The details of such an articulated cultural record can be difficult to distinguish and communicate visually, while entire archaeological sites often exhibit profound changes in terms of shape and function due to human activities over time. The web offers an incredible opportunity to present and communicate enriched 3D content using common web browsers, although it raises additional challenges. We present an interactive 4D technique called “Temporal Lensing”, which is suitable for online multi-temporal virtual environments and offers an expressive, accessible, and effective way to locally peek into the past (or into the future) by targeting interactive Web3D applications, including those leveraging recent standards, such as WebXR (immersive VR on the web). This technique extends previous approaches and presents different contributions, including (1) a volumetric, temporal, and interactive lens approach; (2) complete decoupling of the involved 3D representations from the runtime perspective; (3) a wide range applications in terms of size (from small artifacts to entire archaeological sites); (4) cross-device scalability of the interaction model (mobile devices, multi-touch screens, kiosks, and immersive VR); and (5) simplicity of use. We implemented and developed the described technique on top of an open-source framework for interactive 3D presentation of CH content on the web. We show and discuss applications and results related to three case studies, as well as integrations of the temporal lensing with different input interfaces for dynamically interacting with its parameters. We also assessed the technique within a public event where a remote web application was deployed on tablets and smartphones, without any installation required by visitors. We discuss the implications of temporal lensing, its scalability from small to large virtual contexts, and its versatility for a wide range of interactive 3D applications.


2008 ◽  
Vol 8 (3) ◽  
pp. 363-392 ◽  
Author(s):  
JAN WIELEMAKER ◽  
ZHISHENG HUANG ◽  
LOURENS VAN DER MEIJ

AbstractProlog is an excellent tool for representing and manipulating data written in formal languages as well as natural language. Its safe semantics and automatic memory management make it a prime candidate for programming robust Web services. Although Prolog is commonly seen as a component in a Web application that is either embedded or communicates using a proprietary protocol, we propose an architecture where Prolog communicates to other components in a Web application using the standard HTTP protocol. By avoiding embedding in external Web servers, development and deployment become much easier. To support this architecture, in addition to the transfer protocol, we must also support parsing, representing and generating the key Web document types such as HTML, XML and RDF. This article motivates the design decisions in the libraries and extensions to Prolog for handling Web documents and protocols. The design has been guided by the requirement to handle large documents efficiently. The described libraries support a wide range of Web applications ranging from HTML and XML documents to Semantic Web RDF processing. The benefits of using Prolog for Web-related tasks are illustrated using three case studies.


1994 ◽  
Vol 33 (05) ◽  
pp. 454-463 ◽  
Author(s):  
A. M. van Ginneken ◽  
J. van der Lei ◽  
J. H. van Bemmel ◽  
P. W. Moorman

Abstract:Clinical narratives in patient records are usually recorded in free text, limiting the use of this information for research, quality assessment, and decision support. This study focuses on the capture of clinical narratives in a structured format by supporting physicians with structured data entry (SDE). We analyzed and made explicit which requirements SDE should meet to be acceptable for the physician on the one hand, and generate unambiguous patient data on the other. Starting from these requirements, we found that in order to support SDE, the knowledge on which it is based needs to be made explicit: we refer to this knowledge as descriptional knowledge. We articulate the nature of this knowledge, and propose a model in which it can be formally represented. The model allows the construction of specific knowledge bases, each representing the knowledge needed to support SDE within a circumscribed domain. Data entry is made possible through a general entry program, of which the behavior is determined by a combination of user input and the content of the applicable domain knowledge base. We clarify how descriptional knowledge is represented, modeled, and used for data entry to achieve SDE, which meets the proposed requirements.


1996 ◽  
Vol 35 (03) ◽  
pp. 261-264 ◽  
Author(s):  
T. Schromm ◽  
T. Frankewitsch ◽  
M. Giehl ◽  
F. Keller ◽  
D. Zellner

Abstract:A pharmacokinetic database was constructed that is as free of errors as possible. Pharmacokinetic parameters were derived from the literature using a text-processing system and a database system. A random data sample from each system was compared with the original literature. The estimated error frequencies using statistical methods differed significantly between the two systems. The estimated error frequency in the text-processing system was 7.2%, that in the database system 2.7%. Compared with the original values in the literature, the estimated probability of error for identical pharmacokinetic parameters recorded in both systems is 2.4% and is not significantly different from the error frequency in the database. Parallel data entry with a text-processing system and a database system is, therefore, not significantly better than structured data entry for reducing the error frequency.


2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


The linear electrical properties of muscle fibres have been examined using intracellular electrodes for a. c. measurements and analyzing observations on the basis of cable theory. The measurements have covered the frequency range 1 c/s to 10 kc/s. Comparison of the theory for the circular cylindrical fibre with that for the ideal, one-dimensional cable indicates that, under the conditions of the experiments, no serious error would be introduced in the analysis by the geometrical idealization. The impedance locus for frog sartorius and crayfish limb muscle fibres deviates over a wide range of frequencies from that expected for a simple model in which the current path between the inside and the outside of the fibre consists only of a resistance and a capacitance in parallel. A good fit of the experimental results on frog fibres is obtained if the inside-outside admittance is considered to contain, in addition to the parallel elements R m = 3100 Ωcm 2 and C m = 2.6 μF/cm 2 , another path composed of a resistance R e = 330 Ωcm 2 in series with a capacitance C e = 4.1 μF/cm 2 , all referred to unit area of fibre surface. The impedance behaviour of crayfish fibres can be described by a similar model, the corresponding values being R m = 680 Ωcm 2 , C m = 3.9 μF/cm 2 , R e = 35 Ωcm 2 , C e = 17 μF/cm 2 . The response of frog fibres to a step-function current (with the points of voltage recording and current application close together) has been analyzed in terms of the above two-time constant model, and it is shown that neglecting the series resistance would have an appreciable effect on the agreement between theory and experiment only at times less than the halftime of rise of the response. The elements R m and C m are presumed to represent properties of the surface membrane of the fibre. R e and C e are thought to arise not at the surface, but to be indicative of a separate current path from the myoplasm through an intracellular system of channels to the exterior. In the case of crayfish fibres, it is possible that R e (when referred to unit volume) would be a measure of the resistivity of the interior of the channels, and C e the capacitance across the walls of the channels. In the case of frog fibres, it is suggested that the elements R e , C e arise from the properties of adjacent membranes of the triads in the sarcoplasmic reticulum . The possibility is considered that the potential difference across the capacitance C e may control the initiation of contraction.


Sign in / Sign up

Export Citation Format

Share Document