• Title/Summary/Keyword: Medical Access

Search Result 874, Processing Time 0.03 seconds

A Research on Automatic Data Extract Method for Herbal Formula Combinations Using Herb and Dosage Terminology - Based on 『Euijongsonik』 - (본초 및 용량 용어를 이용한 방제구성 자동추출방법에 대한 연구 -『의종손익』을 중심으로-)

  • Keum, Yujeong;Lee, Byungwook;Eom, Dongmyung;Song, Jichung
    • Journal of Korean Medical classics
    • /
    • v.33 no.4
    • /
    • pp.67-81
    • /
    • 2020
  • Objectives : This research aims to suggest a automatic data extract method for herbal formula combinations from medical classics' texts. Methods : This research was carried out by using Access of Microsoft Office 365 in Windows 10 of Microsoft. The subject text for extraction was 『Euijongsonik』. Using data sets of herb and dosage terminology, herbal medicinals and their dosages were extracted. Afterwards, using the position value of the character string, the formula combinations were automatically extracted. Results :The PC environment of this research was Intel Core i7-1065G7 CPU 1.30GHz, with 8GB of RAM and a Windows 10 64bit operation system. Out of 6,115 verses, 19,277 herb-dosage combinations were extracted. Conclusions : In this research, it was demonstrated that in the case of classical texts that are available as data, knowledge on herbal medicine could be extracted without human or material resources. This suggests an applicability of classical text knowledge to clinical practice.

Study to increase the utilization of Korean Medical treatment about atopic dermatitis by investigating patients trend on online communities (아토피피부염 온라인 커뮤니티를 통해 본 환자들의 경향과 한의학적 치료이용률을 높이기 위한 방안 연구)

  • Lee, Myung-Ku;Kim, Sang-Hyun;Kim, An-Na;Jang, Hyun-Chul
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.29 no.4
    • /
    • pp.131-141
    • /
    • 2016
  • Objectives : The purpose of this study is to understanding the patients thought of Korean Medical treatment and to suggest an improvement in utilization of Korean Medicine treatment about atopic dermatitis. Methods : We had investigate atopic dermatitis online community by classifying the post by treatment type, feature type of the information and by content to know the patients latest tendency. And then compare the result to understand the patients thought of Korean Medical treatment. Results : Most of the post was experiential information and about 67% of the post was about symptom and treatment. Especially there had lot of interest about there treatment information and self-treatment. By contrast Korean Medical treatment type has lower rate then other type of treatment about symptom and treatment and the information was not specific. This result may influence on utilization of Korean Medical treatment. Conclusions : To solve this problem patients needs easy access to Korean Medical treatment and more information about there treatment.

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

Development of educational programs for managing medical information utilizing medical data generation and analysis techniques (의료 데이터 발생과 분석기술을 활용한 의료정보관리 교육용 프로그램 개발)

  • Choi, Joonyoung
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.377-386
    • /
    • 2017
  • This study has developed a medical information management educational program that can improve the management ability of medical information. The educational medical information management program was developed for 8mnths uing VB. The database utilized the ACCESS Database, which allows learners to easily understand and understand the structure of the data. The learners enter data in the discharge analysis and the cancer registration program and the incomplete program after analyze the medical records. After entering and saving data, medical information management programs can be used to understand and analyze the structure of the database to generate medical information. The educational programs can improve the ability of learners to manage medical information by extracting the necessary data from the database directly through SQL and creating various medical information. However, although the medical information management program is an educational program, there is no evaluation system for the learners program operation. Accordingly, the next studies should develop the assessment system of the medical information management program for learners evaluation.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

The Assessment of Patients Satisfaction with Healthcare Services Provided in the Hawtat Bani Tamim During the COVID-19 Pandemic

  • Ahmed Saied Rahama, ABDALLAH;Mohammed Omar Musa, MOHAMMED
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.10 no.2
    • /
    • pp.41-48
    • /
    • 2023
  • This study aims to evaluate patients' satisfaction with healthcare services in Hawtat Bani Tamim Governorate during the spread of coronavirus. The importance of this study stems from the fact that Covid-19 is challenging countries all over the world. The study adopted a questionnaire for collecting the data. The sample size reached 231 members. The study applied descriptive statistics and inferential statistical methods to obtain the result of the study. The analysis of the data revealed that most of the participants are satisfied with the healthcare services in hospitals and health centers during the Corona pandemic, Health precautions and distancing measures were applied appropriately, Vaccination against corona was available in health centers and easy to access, and rapid response of health care service providers to patients' requests. The participant's opinions showed that the application of Mawid is a suitable method to access healthcare services during Corona, the application is more efficient in providing the required healthcare services and facilitating their access to healthcare services. In addition, patient satisfaction with the "My health" application provided fast and convenient services during the Corona pandemic and provided medical consultations easily.

The Type of Medical Service Desired by Those Communities Which at Present have None (일부(一部) 무의면 주민(住民)들이 원(願)하는 의료시설의 형태(形態)에 관(關)한 조사(調査))

  • Lee, Dong-Bae
    • Journal of Preventive Medicine and Public Health
    • /
    • v.11 no.1
    • /
    • pp.49-58
    • /
    • 1978
  • To try to determine the type of medical service wanted by the rural population, in Chungnam Province, a survey amongst the populations of 6 counties was conducted; Within the 6 counties, 2 local communities, which had no access to local medical services, were surveyed. The 12 communities were actively involved in Sae-maul activities, and total number of households surveyed, was 822. The survey was conducted over a 1 month period, from July 16th, 1976, thru August 20th, and the followings are the results, summarised. 1. The largest number of respondents desired a combination of Public Health Center and Country Hospital, followed in order by Private Clinic and Modern Medical Facility. 2. The respondents, aged under 40 years, desired the Private Clinic type medical service, whilst those over 40 years of age, wanted the County Hospital, and as the numbers in this age bracket, were larger, so the ratio was much higher. 3. Sex, educational background, and occupation did not play any particular emphasis in the decisions. 4. Monthly income affected the responses to the survey. These in the lower-income bracket, wanted the County Hospital, and the ratio was high. These in the high income bracket desired the Modern Medical Service, accordingly. Those with an income of 50,000 won or less, amongst the low-income bracket, favored the Public Health Sub-center type of service. The ratio for this service was very high.

  • PDF