Search results for " Computerized"
showing 10 items of 14 documents
Determinants of homonym and synonym rates of record linkage in disease registration.
1996
AbstractReliable record linkage is an essential component of the quality of population-based disease registration. Quality assessment of disease registries should, therefore, include quantitative approaches to describe the extent of record-linkage errors. The homonym and synonym rates have been proposed for this purpose. The homonym rate quantifies the proportion of distinct patients excluded from registration due to erroneous linkage with other patients. The synonym rate quantifies the proportion of unrecognized duplicate notifications on patients already registered in the registry. This paper provides an algebraic assessment of the determinants of both rates. It is shown how the homonym a…
Evaluation of Record Linkage Methods for Iterative Insertions
2009
Summary Objectives: There have been many developments and applications of mathematical methods in the context of record linkage as one area of interdisciplinary research efforts. However, comparative evaluations of record linkage methods are still underrepresented. In this paper improvements of the Fellegi-Sunter model are compared with other elaborated classification methods in order to direct further research endeavors to the most promising methodologies. Methods: The task of linking records can be viewed as a special form of object identification. We consider several non-stochastic methods and procedures for the record linkage task in addition to the Fellegi-Sunter model and perform an e…
Computerized prediction of perforating appendicitis in children.
1989
Computers and the Internet in cardiac care: Will cardiology rise to this extraordinary opportunity?
1997
E-health progresses in Romania
2006
The paper is presenting the recent evolution of e-health aspects in Romania. Data presented are based on governmental reports. Surveys organized by the "Lucian Blaga" University of Sibiu and studies carried on by the national Institute for Research and Development in Informatics (I.C.I.) have shown that Romania has important health problems, from cardio vascular diseases (CVD) to cancer and infectious diseases, a high score on mortality and morbidity and a low one on natality. Poor management of the health sector did not help to solve all these problems. In the last 14 years there were several attempts to reform healthcare but none succeeded until now. The health insurance system is operati…
PASSIM – an open source software system for managing information in biomedical studies
2007
Abstract Background One of the crucial aspects of day-to-day laboratory information management is collection, storage and retrieval of information about research subjects and biomedical samples. An efficient link between sample data and experiment results is absolutely imperative for a successful outcome of a biomedical study. Currently available software solutions are largely limited to large-scale, expensive commercial Laboratory Information Management Systems (LIMS). Acquiring such LIMS indeed can bring laboratory information management to a higher level, but often implies sufficient investment of time, effort and funds, which are not always available. There is a clear need for lightweig…
Adherence to growth hormone (GH) therapy in naïve to treatment GH-deficient children: data of the Italian Cohort from the Easypod Connect Observation…
2019
Background: With the use of non-objective measurement, adherence to growth hormone (GH) therapy has been reported suboptimal in a large proportion of patients, and poor adherence has been shown to affect short-term growth response in patients receiving GH treatment. Objective: The Easypod™ electronic device allows objective measurement of adherence. In this study, we report 3-year prospective adherence data of the Italian cohort of naïve GH deficient (GHD) children extrapolated from the Easypod Connect Observational Study (ECOS) database. Patients and methods: Seventy-three GHD children naïve to GH treatment were included in the analysis. 22 Italian centers participated in the study. Result…
Should CT scan be performed when CRP is elevated after colorectal surgery? Results from the inflammatory markers after colorectal surgery study.
2017
Summary Introduction Serum concentration of C-reactive protein (CRP) that exceeds a pre-defined threshold between the 3rd and 5th postoperative day is a reliable marker of infectious complications after colorectal surgery. However, the optimal strategy to follow when a high CRP is found has not been defined. The aim of this study was to analyze the usefulness of computed tomography (CT) scan in this situation in a prospective cohort of patients following colorectal surgery. Methods Between November 2011 and April 2015, patients at two surgical centers who had undergone elective colorectal resection with anastomosis and who had a CRP > 12.5 mg/dL on the 4th postoperative day (POD) were prosp…
Transvestibular Urethrolysis.
2011
Bladder outlet obstruction with obstructive and irritative urinary symptoms may be a complication of surgery for female urinary incontinence. In presence of persistent symptoms the therapy is surgical and usually consists in an accurate urethrolysis. The way of approach is generally transvaginal. In this paper we propose and describe our experience with a transvestibular approach.From 1995 to 2009 18 women who had undergone anti-incontinence surgery (TVT 12 pts, TOT 3 pts, Burch retropubic colposuspension 3 pts) with obstruction and/or irritative symptoms underwent to a transvestibular urethrolysys. Five patients had urinary retention the other patients had post voiding residual urine100 ml…
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
2009
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…