Computer-based patient record data integration method based on ontology

Author(s):  
Cai Xiufen ◽  
Xu Yabin
1995 ◽  
Vol 34 (01/02) ◽  
pp. 131-139 ◽  
Author(s):  
M. A. Musen ◽  
J. van der Lei

Abstract:The developers of reviewing systems that rely on computer-based patient-record systems as a source of data need to model reviewing knowledge and medical knowledge. We simulate how the same medical knowledge could be entered in four different systems: CARE, the Arden syntax, Essential-attending and HyperCritic. We subsequently analyze how the original knowledge is represented in the symbols or syntax used by these systems. We conclude that these systems provide different alternatives in dealing with the vocabulary provided by the computer-based patient records. In addition, the use of computer-based patient records for review poses new challenges for the content of that record: to facilitate review, the reasoning of the physician needs to be captured in addition to the actions of the physician.


2010 ◽  
Vol 30 (9) ◽  
pp. 2370-2373 ◽  
Author(s):  
Jiong LANG ◽  
Yan-bing LIU ◽  
Shi-yong XIONG

Author(s):  
G Sriman Narayana ◽  
Kuruva Arjun Kumar

In privacy-enhancing technology, it has been inevitably challenging to strike a maintain balance between privacy, efficiency and usability (utility). We propose a highly practical and efficient approach for privacy-preserving integration and sharing of datasets among a group of participants. At the heart of our solution is a new interactive protocol, Secure Channel. Through Secure Channel, each participant is able to randomize their datasets via an independent and untrusted third party, such that the resulting dataset can be merged with other randomized datasets contributed by other participants group in a privacy-preserving manner. Our process does not require any public or key sharing between participants in order to integrate different datasets. This, in turn, leads to a user can understand and use easily and scalable solution. Moreover, the accuracy of a randomized dataset which are returned by the third party can be securely verified by the other participant of group. We further demonstrate Secure Channel’s general utilities, using it to construct a structure preserving data integration protocol. This is mainly useful for, good quality integration of network traffic data.


2000 ◽  
Vol 165 (3) ◽  
pp. 180-185 ◽  
Author(s):  
Nancy Staggers ◽  
Alice V. Leaderman

Sign in / Sign up

Export Citation Format

Share Document