978 resultados para Defense information, Classified
Resumo:
Background and aims: Machine learning techniques for the text mining of cancer-related clinical documents have not been sufficiently explored. Here some techniques are presented for the pre-processing of free-text breast cancer pathology reports, with the aim of facilitating the extraction of information relevant to cancer staging.
Materials and methods: The first technique was implemented using the freely available software RapidMiner to classify the reports according to their general layout: ‘semi-structured’ and ‘unstructured’. The second technique was developed using the open source language engineering framework GATE and aimed at the prediction of chunks of the report text containing information pertaining to the cancer morphology, the tumour size, its hormone receptor status and the number of positive nodes. The classifiers were trained and tested respectively on sets of 635 and 163 manually classified or annotated reports, from the Northern Ireland Cancer Registry.
Results: The best result of 99.4% accuracy – which included only one semi-structured report predicted as unstructured – was produced by the layout classifier with the k nearest algorithm, using the binary term occurrence word vector type with stopword filter and pruning. For chunk recognition, the best results were found using the PAUM algorithm with the same parameters for all cases, except for the prediction of chunks containing cancer morphology. For semi-structured reports the performance ranged from 0.97 to 0.94 and from 0.92 to 0.83 in precision and recall, while for unstructured reports performance ranged from 0.91 to 0.64 and from 0.68 to 0.41 in precision and recall. Poor results were found when the classifier was trained on semi-structured reports but tested on unstructured.
Conclusions: These results show that it is possible and beneficial to predict the layout of reports and that the accuracy of prediction of which segments of a report may contain certain information is sensitive to the report layout and the type of information sought.
Resumo:
This research addressed practice related problems from a medico-legal perspective and aims to provide a working tool that aids GPs to comply with best practice protocols. The resulting bag was developed in collaboration with General Practitioners, clinicians and members of the Medical Defense Union. Using proven methods developed within the Healthcare & Patient Safety Lab (e.g. DOME, Ambulance) to establish an evidence-based brief, this research used task, equipment and consumables analysis to determine minimum requirements and preferred layouts for task optimisation. The research established that clinicians require three distinct functions in their workspace: laying out, organisation and information retrieval. Feedback from clinicians indicates that this working tool allows them to access information and equipment wherever they may be and suggests an improvement from current practice. The research is now into a second year where the design of the bag will be refined and tested. Lifestyle and demographic changes such as the ageing population and increased prevalence of chronic diseases require more consistent standards of primary care, and care that is well coordinated and integrated (Imison, et al., 2011). Many guidelines exist relating to general practice and the doctor’s bag (NSLMC, 2008, RACGP, 2010, RCGP, 2008 and Hiramanek, 2004), however there is no standard in the UK that regulates the shape and materials of the bag or its contents. Doctors may use any sort of vessel to transport their equipment and consumables to a patient’s location. Furthermore, treating a patient in their own home, outside an ideal clinical environment, presents its own complications. A looks-like, works-like bag prototype and information system that will be used in clinical trials, the results of which will determine the manufacturing of a new, standardised bag for clinical treatment used by members of the Medical Defence Union.
Resumo:
This paper examines empirically the relative influence of the degree of endangerment of wildlife species and their stated likeability on individuals' allocation of funds for their conservation. To do this, it utilises data obtained from the IUCN Red List, and likeability and fund allocation data obtained from two serial surveys of a sample of the Australian public who were requested to assess 24 Australian wildlife species from three animal classes: mammals, birds and reptiles. Between the first and second survey, respondents were provided with extra information about the focal species. This information resulted in the dominance of endangerment as the major influence on the allocation of funding of respondents for the conservation of the focal wildlife species. Our results throw doubts on the proposition in the literature that the likeability of species is the dominant influence on willingness to pay for conservation of wildlife species. Furthermore, because the public's allocation of fund for conserving wildlife species seems to be more sensitive to information about the conservation status of species than to factors influencing their likeability, greater attention to providing accurate information about the former than the latter seems justified. Keywords: Conservation of wildlife species; Contingent valuation; Endangerment of species; Likeability of species; Willingness to pay
Resumo:
Developments in information technology will drive the change in records management; however, it should be the health information managers who drive the information management change. The role of health information management will be challenged to use information technology to broker a range of requests for information from a variety of users, including he alth consumers. The purposes of this paper are to conceptualise the role of health information management in the context of a technologically driven and managed health care environment, and to demonstrat e how this framework has been used to review and develop the undergraduate program in health information management at the Queensland University of Technology.
Resumo:
Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g., within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.