Construction of Perioperative Preoperative Evaluation Platform Based on Privacy Protection

2021 ◽  
Vol 11 (2) ◽  
pp. 462-468
Author(s):  
Dashun Wei ◽  
Delin Zhang ◽  
Ruiguo Dong

The perioperative preoperative evaluation occupies an important guiding position in the perioperative process, but the data to be evaluated has the characteristics of clutter, inefficiency, and high redundancy, and the manual evaluation effect is difficult to guarantee. This article proposes the concept of constructing a regional perioperative pre-operative evaluation platform, collecting medical data in a certain spatial area, and using data mining technology to mine hidden associations in medical data to provide a reference for pre-operative evaluation. We propose a verification mining method based on the original frequent item mining technology, which greatly improves the mining speed. At the same time, to protect privacy, when publishing data in the FP-tree mode, we count the support of decision attributes and the order of item set. The experimental results show that while satisfying the privacy protection, it has high mining accuracy and has certain clinical feasibility.

2011 ◽  
Vol 52-54 ◽  
pp. 1421-1426
Author(s):  
Xin Jin ◽  
Gang Sun ◽  
Chun Juan Liu

This document focuses on the case that optimization direction is hard to determine in aerodynamic optimization processes, and proposes an intelligent approach based on ANN learning, followed by result visualization using data mining technology. It can not only help visualize the optimization process (qualitative analysis), but also determine the optimization direction (quantitative calculation), which can save time of frequent CFD calculation and obviously improve efficiency in aerodynamic optimization.


QJM ◽  
2021 ◽  
Vol 114 (Supplement_1) ◽  
Author(s):  
Osama Salah Mohamed El Sharkawy ◽  
Zeinab Anwar El kabbany ◽  
Neveen Tawakol Younis ◽  
Khaled Aboulfotouh Ahmad ◽  
Ahmed Darwish Mahmoud ◽  
...  

Abstract Objective To select patients with drug resistant epilepsy following up in Pediatrics Neurology Outpatient Clinic of Children's Hospital, Ain Shams University who are candidates for epilepsy surgery and to detect outcome of epilepsy surgery in such children as regards seizures control. Methods This prospective study was conducted over a period of 36 months and comprises of 3 stages. Stage 1 includes selection of candidates for epilepsy surgery and preoperative evaluation. Evaluation included clinical assessment, video EEG, MRI epilepsy protocol. Stage 2 include surgery phase where decision of surgery was made by a multidisciplinary team. Stage 3 includes post-operative evaluation as regards Seizures frequency, Seizures Severity using Chalfont score, Engel Epilepsy Surgery Outcome Scale and the International League Against Epilepsy (ILAE) outcome classification. Data was tabulated and analyzed with SSPS package for windows. Results 17 patients underwent epilepsy surgery. Results revealed significant decrease in seizures frequency and severity at 6 and 12 months after surgery. As regards Engel Epilepsy Surgery Outcome Scale 11 (64.7%) patients were class I at 12 months. As regards the ILAE outcome classification 10 (58.8%) patients are class 1 at 12 months. Conclusions epilepsy surgery can be a hope for patients with drug resistant epilepsy who are well selected and evaluated preoperatively. New studies on larger number and for longer duration are recommended.


2017 ◽  
Vol 117 (1) ◽  
pp. 90-109 ◽  
Author(s):  
Eui-Bang Lee ◽  
Jinwha Kim ◽  
Sang-Gun Lee

Purpose The purpose of this paper is to identify the influence of the frequency of word exposure on online news based on the availability heuristic concept. So that this is different from most churn prediction studies that focus on subscriber data. Design/methodology/approach This study examined the churn prediction through words presented the previous studies and additionally identified words what churn generate using data mining technology in combination with logistic regression, decision tree graphing, neural network models, and a partial least square (PLS) model. Findings This study found prediction rates similar to those delivered by subscriber data-based analyses. In addition, because previous studies do not clearly suggest the effects of the factors, this study uses decision tree graphing and PLS modeling to identify which words deliver positive or negative influences. Originality/value These findings imply an expansion of churn prediction, advertising effect, and various psychological studies. It also proposes concrete ideas to advance the competitive advantage of companies, which not only helps corporate development, but also improves industry-wide efficiency.


2014 ◽  
Vol 8 (2) ◽  
pp. 13-24 ◽  
Author(s):  
Arkadiusz Liber

Introduction: Medical documentation ought to be accessible with the preservation of its integrity as well as the protection of personal data. One of the manners of its protection against disclosure is anonymization. Contemporary methods ensure anonymity without the possibility of sensitive data access control. it seems that the future of sensitive data processing systems belongs to the personalized method. In the first part of the paper k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, and (k,e)-Anonymity methods were discussed. these methods belong to well - known elementary methods which are the subject of a significant number of publications. As the source papers to this part, Samarati, Sweeney, wang, wong and zhang’s works were accredited. the selection of these publications is justified by their wider research review work led, for instance, by Fung, Wang, Fu and y. however, it should be noted that the methods of anonymization derive from the methods of statistical databases protection from the 70s of 20th century. Due to the interrelated content and literature references the first and the second part of this article constitute the integral whole.Aim of the study: The analysis of the methods of anonymization, the analysis of the methods of protection of anonymized data, the study of a new security type of privacy enabling device to control disclosing sensitive data by the entity which this data concerns.Material and methods: Analytical methods, algebraic methods.Results: Delivering material supporting the choice and analysis of the ways of anonymization of medical data, developing a new privacy protection solution enabling the control of sensitive data by entities which this data concerns.Conclusions: In the paper the analysis of solutions for data anonymization, to ensure privacy protection in medical data sets, was conducted. the methods of: k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, (k,e)-Anonymity, (X,y)-Privacy, lKc-Privacy, l-Diversity, (X,y)-linkability, t-closeness, confidence Bounding and Personalized Privacy were described, explained and analyzed. The analysis of solutions of controlling sensitive data by their owner was also conducted. Apart from the existing methods of the anonymization, the analysis of methods of the protection of anonymized data was included. In particular, the methods of: δ-Presence, e-Differential Privacy, (d,γ)-Privacy, (α,β)-Distributing Privacy and protections against (c,t)-isolation were analyzed. Moreover, the author introduced a new solution of the controlled protection of privacy. the solution is based on marking a protected field and the multi-key encryption of sensitive value. The suggested way of marking the fields is in accordance with Xmlstandard. For the encryption, (n,p) different keys cipher was selected. to decipher the content the p keys of n were used. The proposed solution enables to apply brand new methods to control privacy of disclosing sensitive data.


Sign in / Sign up

Export Citation Format

Share Document