987 resultados para Records control
Resumo:
BACKGROUND: Administrative or quality improvement registries may or may not contain the elements needed for investigations by trauma researchers. International Classification of Diseases Program for Injury Categorisation (ICDPIC), a statistical program available through Stata, is a powerful tool that can extract injury severity scores from ICD-9-CM codes. We conducted a validation study for use of the ICDPIC in trauma research. METHODS: We conducted a retrospective cohort validation study of 40,418 patients with injury using a large regional trauma registry. ICDPIC-generated AIS scores for each body region were compared with trauma registry AIS scores (gold standard) in adult and paediatric populations. A separate analysis was conducted among patients with traumatic brain injury (TBI) comparing the ICDPIC tool with ICD-9-CM embedded severity codes. Performance in characterising overall injury severity, by the ISS, was also assessed. RESULTS: The ICDPIC tool generated substantial correlations in thoracic and abdominal trauma (weighted κ 0.87-0.92), and in head and neck trauma (weighted κ 0.76-0.83). The ICDPIC tool captured TBI severity better than ICD-9-CM code embedded severity and offered the advantage of generating a severity value for every patient (rather than having missing data). Its ability to produce an accurate severity score was consistent within each body region as well as overall. CONCLUSIONS: The ICDPIC tool performs well in classifying injury severity and is superior to ICD-9-CM embedded severity for TBI. Use of ICDPIC demonstrates substantial efficiency and may be a preferred tool in determining injury severity for large trauma datasets, provided researchers understand its limitations and take caution when examining smaller trauma datasets.
Resumo:
Este estudo tem como objectivo conciliar aspectos da Arquivística à Boa Administração através da gestão dos documentos com efoque no controlo do circuito, da tramitação, da recuperação dos documentos e a legislação nos arquivos municipais em Moçambique no período 1933-2007. O estudo realizado em três universos: municípios de Maputo, da Beira e de Quelimane, em que se confirma que os instrumentos de controlo utilizados na circulação e recuperação dos documentos contribuem para uma boa governação, garantindo a transparência dos actos administrativos e a salvaguarda dos direitos dos cidadãos. Mostra-se que nunca se deve prescindir quer das actividades que delineiam os macro e micro processos nas instituições quer da definição prévia dos percursos documentais, da regulamentação dos procedimentos, da utilização de técnicas que permitam a recuperação dos documentos e da informação: Mostra-se a importância da formação e do conhecimento dos procedimentos pelos funcionários dos escalões autorizados a realizar, pareceres e despachos, da determinação das formas do controlo documental e da garantia no cumprimento dos prazos estabelecidos para cada percurso e, finalmente, a necessária observância prática da legislação criada para esse efeito. ABSTRACT; This case study has as a main objective the reconciliation of the filing aspects with a good Administration though the management of documents and its network, specially in the restoring of files and its legislation into the Municipal Archives of Mozambique during the period of 1933-2007. The study was based on three cities where municipal councils were created, namely: Maputo, Beira and Quelimane. Record's contrail tools used either for registering record transactions or for the access of information contained in them, ensure good governance, transparency and protection of citizen rights. We show the necessity of the activities which lead to macro and micro processes within the organization. This requires that records procedures on transactions must be established and so the guidelines for records' contrail, registration and tools for the information retrieval. We indicate procedures to be followed by authorized civil servants, the importance of their practical training and we define types of records' contrail to ensure their preservation and use in order to accomplish the national legislation.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
Information privacy is a critical success/failure factor in information technology supported healthcare (eHealth). eHealth systems utilise electronic health records (EHR) as the main source of information, thus, implementing appropriate privacy preserving methods for EHRs is vital for the proliferation of eHealth. Whilst information privacy may be a fundamental requirement for eHealth consumers, healthcare professionals demand non-restricted access to patient information for improved healthcare delivery, thus, creating an environment where stakeholder requirements are contradictory. Therefore, there is a need to achieve an appropriate balance of requirements in order to build successful eHealth systems. Towards achieving this balance, a new genre of eHealth systems called Accountable-eHealth (AeH) systems has been proposed. In this paper, an access control model for EHRs is presented that can be utilised by AeH systems to create information usage policies that fulfil both stakeholders’ requirements. These policies are used to accomplish the aforementioned balance of requirements creating a satisfactory eHealth environment for all stakeholders. The access control model is validated using a Web based prototype as a proof of concept.
Resumo:
Short-term changes in sea surface conditions controlling the thermohaline circulation in the northern North Atlantic are expected to be especially efficient in perturbing global climate stability. Here we assess past variability of sea surface temperature (SST) in the northeast Atlantic and Norwegian Sea during Marine Isotope Stage (MIS) 2 and, in particular, during the Last Glacial Maximum (LGM). Five high-resolution SST records were established on a meridional transect (53°N-72°N) to trace centennial-scale oscillations in SST and sea-ice cover. We used three independent computational techniques (SIMMAX modern analogue technique, Artificial Neural Networks (ANN), and Revised Analog Method (RAM)) to reconstruct SST from planktonic foraminifer census counts. SIMMAX and ANN reproduced short-term SST oscillations of similar magnitude and absolute levels, while RAM, owing to a restrictive analog selection, appears less suitable for reconstructing "cold end" SST. The SIMMAX and ANN SST reconstructions support the existence of a weak paleo-Norwegian Current during Dansgaard-Oeschger (DO) interstadials number 4, 3, 2, and 1. During the LGM, two warm incursions of 7°C water to occurred in the northern North Atlantic but ended north of the Iceland Faroe Ridge. A rough numerical estimate shows that the near-surface poleward heat transfer from 53° across the Iceland-Faroe Ridge up to to 72° N dropped to less than 60% of the modern value during DO interstadials and to almost zero during DO stadials. Summer sea ice was generally confined to the area north of 70°N and only rarely expanded southward along the margins of continental ice sheets. Internal LGM variability of North Atlantic (>40°N) SST in the GLAMAP 2000 compilation (Sarnthein et al., 2003, doi:10.1029/2002PA000771; Pflaumann et al., 2003, doi:10.1029/2002PA000774) indicates maximum instability in the glacial subpolar gyre and at the Iberian Margin, while in the Nordic Seas, SST was continuously low.
Resumo:
Based on Newmark-β method, a structural vibration response is predicted. Through finding the appropriate control force parameters within certain ranges to optimize the objective function, the predictive control of the structural vibration is achieved. At the same time, the numerical simulation analysis of a two-storey frame structure with magneto-rheological (MR) dampers under earthquake records is carried out, and the parameter influence on structural vibration reduction is discussed. The results demonstrate that the semi-active control based on Newmark-β predictive algorithm is better than the classical control strategy based on full-state feedback control and has remarkable advantages of structural vibration reduction and control robustness.
Resumo:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
Resumo:
Background By 2025, it is estimated that approximately 1.8 million Australian adults (approximately 8.4% of the adult population) will have diabetes, with the majority having type 2 diabetes. Weight management via improved physical activity and diet is the cornerstone of type 2 diabetes management. However, the majority of weight loss trials in diabetes have evaluated short-term, intensive clinic-based interventions that, while producing short-term outcomes, have failed to address issues of maintenance and broad population reach. Telephone-delivered interventions have the potential to address these gaps. Methods/Design Using a two-arm randomised controlled design, this study will evaluate an 18-month, telephone-delivered, behavioural weight loss intervention focussing on physical activity, diet and behavioural therapy, versus usual care, with follow-up at 24 months. Three-hundred adult participants, aged 20-75 years, with type 2 diabetes, will be recruited from 10 general practices via electronic medical records search. The Social-Cognitive Theory driven intervention involves a six-month intensive phase (4 weekly calls and 11 fortnightly calls) and a 12-month maintenance phase (one call per month). Primary outcomes, assessed at 6, 18 and 24 months, are: weight loss, physical activity, and glycaemic control (HbA1c), with weight loss and physical activity also measured at 12 months. Incremental cost-effectiveness will also be examined. Study recruitment began in February 2009, with final data collection expected by February 2013. Discussion This is the first study to evaluate the telephone as the primary method of delivering a behavioural weight loss intervention in type 2 diabetes. The evaluation of maintenance outcomes (6 months following the end of intervention), the use of accelerometers to objectively measure physical activity, and the inclusion of a cost-effectiveness analysis will advance the science of broad reach approaches to weight control and health behaviour change, and will build the evidence base needed to advocate for the translation of this work into population health practice.
Resumo:
A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.
Resumo:
The feral pig, Sus scrofa, is a widespread and abundant invasive species in Australia. Feral pigs pose a significant threat to the environment, agricultural industry, and human health, and in far north Queensland they endanger World Heritage values of the Wet Tropics. Historical records document the first introduction of domestic pigs into Australia via European settlers in 1788 and subsequent introductions from Asia from 1827 onwards. Since this time, domestic pigs have been accidentally and deliberately released into the wild and significant feral pig populations have become established, resulting in the declaration of this species as a class 2 pest in Queensland. The overall objective of this study was to assess the population genetic structure of feral pigs in far north Queensland, in particular to enable delineation of demographically independent management units. The identification of ecologically meaningful management units using molecular techniques can assist in targeting feral pig control to bring about effective long-term management. Molecular genetic analysis was undertaken on 434 feral pigs from 35 localities between Tully and Innisfail. Seven polymorphic and unlinked microsatellite loci were screened and fixation indices (FST and analogues) and Bayesian clustering methods were used to identify population structure and management units in the study area. Sequencing of the hyper-variable mitochondrial control region (D-loop) of 35 feral pigs was also examined to identify pig ancestry. Three management units were identified in the study at a scale of 25 to 35 km. Even with the strong pattern of genetic structure identified in the study area, some evidence of long distance dispersal and/or translocation was found as a small number of individuals exhibited ancestry from a management unit outside of which they were sampled. Overall, gene flow in the study area was found to be influenced by environmental features such as topography and land use, but no distinct or obvious natural or anthropogenic geographic barriers were identified. Furthermore, strong evidence was found for non-random mating between pigs of European and Asian breeds indicating that feral pig ancestry influences their population genetic structure. Phylogenetic analysis revealed two distinct mitochondrial DNA clades, representing Asian domestic pig breeds and European breeds. A significant finding was that pigs of Asian origin living in Innisfail and south Tully were not mating randomly with European breed pigs populating the nearby Mission Beach area. Feral pig control should be implemented in each of the management units identified in this study. The control should be coordinated across properties within each management unit to prevent re-colonisation from adjacent localities. The adjacent rainforest and National Park Estates, as well as the rainforest-crop boundary should be included in a simultaneous control operation for greater success.
Resumo:
Detailed knowledge of the past history of an active volcano is crucial for the prediction of the timing, frequency and style of future eruptions, and for the identification of potentially at-risk areas. Subaerial volcanic stratigraphies are often incomplete, due to a lack of exposure, or burial and erosion from subsequent eruptions. However, many volcanic eruptions produce widely-dispersed explosive products that are frequently deposited as tephra layers in the sea. Cores of marine sediment therefore have the potential to provide more complete volcanic stratigraphies, at least for explosive eruptions. Nevertheless, problems such as bioturbation and dispersal by currents affect the preservation and subsequent detection of marine tephra deposits. Consequently, cryptotephras, in which tephra grains are not sufficiently concentrated to form layers that are visible to the naked eye, may be the only record of many explosive eruptions. Additionally, thin, reworked deposits of volcanic clasts transported by floods and landslides, or during pyroclastic density currents may be incorrectly interpreted as tephra fallout layers, leading to the construction of inaccurate records of volcanism. This work uses samples from the volcanic island of Montserrat as a case study to test different techniques for generating volcanic eruption records from marine sediment cores, with a particular relevance to cores sampled in relatively proximal settings (i.e. tens of kilometres from the volcanic source) where volcaniclastic material may form a pervasive component of the sedimentary sequence. Visible volcaniclastic deposits identified by sedimentological logging were used to test the effectiveness of potential alternative volcaniclastic-deposit detection techniques, including point counting of grain types (component analysis), glass or mineral chemistry, colour spectrophotometry, grain size measurements, XRF core scanning, magnetic susceptibility and X-radiography. This study demonstrates that a set of time-efficient, non-destructive and high-spatial-resolution analyses (e.g. XRF core-scanning and magnetic susceptibility) can be used effectively to detect potential cryptotephra horizons in marine sediment cores. Once these horizons have been sampled, microscope image analysis of volcaniclastic grains can be used successfully to discriminate between tephra fallout deposits and other volcaniclastic deposits, by using specific criteria related to clast morphology and sorting. Standard practice should be employed when analysing marine sediment cores to accurately identify both visible tephra and cryptotephra deposits, and to distinguish fallout deposits from other volcaniclastic deposits.
Resumo:
The manufacturing industry is currently facing unprecedented challenges from changes and disturbances. The sources of these changes and disturbances are of different scope and magnitude. They can be of a commercial nature, or linked to fast product development and design, or purely operational (e.g. rush order, machine breakdown, material shortage etc.). In order to meet these requirements it is increasingly important that a production operation be flexible and is able to adapt to new and more suitable ways of operating. This paper focuses on a new strategy for enabling manufacturing control systems to adapt to changing conditions both in terms of product variation and production system upgrades. The approach proposed is based on two key concepts: (1) An autonomous and distributed approach to manufacturing control based on multi-agent methods in which so called operational agents represent the key physical and logical elements in the production environment to be controlled - for example, products and machines and the control strategies that drive them and (2) An adaptation mechanism based around the evolutionary concept of replicator dynamics which updates the behaviour of newly formed operational agents based on historical performance records in order to be better suited to the production environment. An application of this approach for route selection of similar products in manufacturing flow shops is developed and is illustrated in this paper using an example based on the control of an automobile paint shop.
Resumo:
Background: Personal health records were implemented with adults with learning disabilities (AWLD) to try to improve their health-care. Materials and Method: Forty GP practices were randomized to the Personal Health Profile (PHP) implementation or control group. Two hundred and one AWLD were interviewed at baseline and 163 followed up after 12 months intervention (PHP group). AWLD and carers of AWLD were employed as research interviewers. AWLD were full research participants. Results: Annual consultation rates in the intervention and control groups at baseline were low (2.3 and 2.6 visits respectively). A slightly greater increase occurred over the year in the intervention group 0.6 ()0.4 to 1.6) visits ⁄ year compared with controls. AWLD in PHP group reported more health problems at follow-up 0.9 (0.0 to 1.8). AWLD liked their PHP (92%) but only 63% AWLD and 55% carers reported PHP usage. Carers had high turnover (34%). Conclusions: No significant outcomes were achieved by the intervention.