• Title/Summary/Keyword: information routine

Search Result 386, Processing Time 0.028 seconds

Current status of routine use of Patient-Reported Outcome in the tertiary hospital clinical setting in Republic of Korea (대한민국 상급 종합병원 임상현장에서 환자자기평가결과(Patient-Reported Outcome)의 일상적인 사용 현황)

  • Bang, Garam;Kang, Danbee;Cho, Juhee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.32 no.2
    • /
    • pp.74-83
    • /
    • 2022
  • Objective: There is a growing movement to introduce Patient-Reported Outcome (PRO) to clinical settings. This study aimed to investigate the routine use of PRO in tertiary hospital clinical settings. Methods: From January 2016 to December 2018, the usage status of Patient-Reported Outcome Measures (PROMs) submitted to the electronic medical record of a tertiary hospital clinical setting was investigated. Descriptive analysis was conducted to investigate the usage status of PROMs by 42 departments. Also, the most frequently used PROMs by departments, the purpose of measurement, the use rate of verified PROMs were investigated. Results: The PROMs accounted for 66% (98) of the 148 Instruments. Of the 98 PROMs, 64% (63) were using a validation Korean version of PROMs. Only about 1% of total outpatient visits applied PROMs, and among them, it was frequently used in urology (13%), orthopedics (8%), and otolaryngology (5%). The use rate of the validated PROMs was found to be 64%. Conclusions: The use of PROMs in domestic clinical settings was found to be very limited and frequently used only in specific departments. It is essential to use a PROMs that has been validated according to guidelines, as the use of validated PROMs will provide beneficial information to health professionals and also for the patient health improvement by objectively measuring the patient's health status.

Exploring the Use of Information Technology in Dietetics Practice among Clinical Dietitians

  • Wong Karine;Ham Sunny;Forsythe Hazel W.
    • Journal of Community Nutrition
    • /
    • v.7 no.3
    • /
    • pp.149-155
    • /
    • 2005
  • This exploratory study investigated the software programs utilized by clinical dietitians and their perceptions on the use of information technology. The study focused on the use of specialized software for dietetics, general software for any office use and the Internet. A self-administered survey was used to collect data from clinical dietitians identified in the Kentucky Dietetic Association Directory 2003-2004. The survey was conducted in March through April, 2004. A total of 22 responses were collected, which yielded a response rate of $68\%$. Findings suggest that computer use has become a routine for optimal clinical practice ; major specialized software programs are used for nutrition assessment, nutrition analysis and menu development. Use of specialized software appears to be unassociated with dietitians' age and years of experience ; however, the associations are indicated between use of specialized software and education level as well as their specialty ; word processing and spreadsheet are the major general software used. Internet is used mainly for information search and communication. Respondents perceived that overall work efficiency and productivity significantly increased with computer use. The complexity of software is the major barrier encountered so training is the most needed support by the department. Strategic promotion on the use of specialized software should be targeted to the management team of the hospitals/facilities.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Library Services in Information Society (정보사회의 도서관봉사)

  • Chun Myung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.27
    • /
    • pp.161-181
    • /
    • 1994
  • As information technologies are applied to the libraries in information society, the library services have been changing its feature. Therefore, the purpose of this paper is to explore and to establish a paradigm of the library services in information society. It is hypothesized that the application of information technologies leads to the change of the library services in information society. To prove the hypothesis, the data were collected from various research results carried out in the developed countries and by observing various libraries where the information technologies are extensively applied. The findings are as follows: 1. As information technologies are applied to the library, many new library services emerge for the society. 2. As the electronic data replace the paper data, the collection of a library becomes the collection of the libraries in the world. Therefore, the accessibility to the information network is more important than to own information in the library. Librarians select various electronic data according to the library policy which distinguishes their own library collection from others. The policy also solves the various problems related to weeding and preserving library collection. And the use of CD-ROM selection tools enable library users to select their own data. Now, the censorship becomes the concems of the library users, not the library. 3. The catalogs are reorganized for the electronic data for the international use. The most important information in the catalog is the location of the data and the multi access to the data are necessary. 4. As the information technologies are applied in book selection, cataloguing, information retreival and circulation, the library users are enable to service themselves in the library. And most of the routine works related to the information service are taken over by the library staffs. Professional librarians engage in user education, information marketing and fund raising. 5. Public libraries in information society serves those who have no access to the information. They help the illiterates. patients in the hospital, prisoners, and homeless in the city. Therefore, the information technologies enhance the role of librarians in professional work in the library as well as in the information society.

  • PDF

Can Health Information Technology Really Improve Patient Safety? (의료정보기술은 환자안전을 향상시키는가?)

  • Lee, JaeHo
    • Quality Improvement in Health Care
    • /
    • v.19 no.1
    • /
    • pp.16-26
    • /
    • 2013
  • Health information technology (HIT) is one of the most familiar tools to healthcare providers. It is used in routine practice to reduce cost, to improve clinical performance, and to improve patient safety. Patient safety is the driving force of recent expansion of HIT industry. But there are many evidences that it can be harmful to patient safety. Role of HIT and HIT-related error became big issues because more and more healthcare providers and healthcare organizations are willing to adopt it. Adoption rate of HIT in Korea is higher than that of United States. But researches of HIT regarding patient safety are rare. In this article, types of HIT, their mechanisms of improving patient safety and HIT-related errors were reviewed. Status of HIT in terms of patient safety in Korea was also reviewed. Knowledge of how HIT can improve patient safety, its' limitation, and how to make it safer is crucial to whom have to use it to improve patient safety. Impact of HIT on patient safety must be evaluated actively in Korea. HIT which was proven to improve patient safety must be widely adopted. Government must prepare a strategic plan to improve HIT quality, support hospitals financially and institutionally to introduce qualified HIT, and develop HIT infrastructures and standard designed for patient safety.

  • PDF

Image Processing of Defocus Series TEM Images for Extracting Reliable Phase Information (정확한 위상정보를 얻기 위한 탈초점 영상들의 이미지 처리기법)

  • Song, Kyung;Shin, Ga-Young;Kim, Jong-Kyu;Oh, Sang-Ho
    • Applied Microscopy
    • /
    • v.41 no.3
    • /
    • pp.215-222
    • /
    • 2011
  • We discuss the experimental procedure for extracting reliable phase information from a defocus series of transmission electron microscopy (TEM) dark-field images using the transport of intensity equation (TIE). Taking InGaN/GaN multi-quantum well light-emitting diode as a model system, various factors affecting the final result of reconstructed phase such as TEM sample preparation, TEM imaging condition, image alignment, the correction of defocus values and the use of high frequency pass filter are evaluated. The obtained phase of wave function was converted to the geometric phase of the corresponding lattice planes, which was then used for the two-dimensional mapping of lattice strain following the dark-field inline holography (DIH) routine. The strain map obtained by DIH after optimized image processing is compared with that obtained by the geometric phase analysis of high resolution TEM (HRTEM) image, manifesting that DIH yields more accurate and reliable strain information than HRTEM-based GPA.

Task Assignment Strategies for a Complex Real-time Network System

  • Kim Hong-Ryeol;Oh Jae-Joon;Kim Dae-Won
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.5
    • /
    • pp.601-614
    • /
    • 2006
  • In this paper, a study on task assignment strategies for a complex real-time network system is presented. Firstly, two task assignment strategies are proposed to improve previous strategies. The proposed strategies assign tasks with meeting end-to-end real-time constraints, and also with optimizing system utilization through period modulation of the tasks. Consequently, the strategies aim at the optimizationto optimize of system performance with while still meeting real-time constraints. The proposed task assignment strategies are devised using the genetic algorithmswith heuristic real-time constraints in the generation of new populations. The strategies are differentiated by the optimization method of the two objectives-meeting end-to-end real-time constraints and optimizing system utilization: the first one has sequential genetic algorithm routines for the objectives, and the second one has one multiple objective genetic algorithm routine to find a Pareto solution. Secondly, the performances of the proposed strategies and a well-known existing task assignment strategy using the BnB(Branch and Bound) optimization are compared with one other through some simulation tests. Through the comparison of the simulation results, the most adequate task assignment strategies are proposed for some as system requirements-: the optimization of system utilization, the maximization of running tasktasks, and the minimization of the number of network node nodesnumber for a network system.

A visual identification key to Orchidaceae of Korea

  • Seo, Seon-Won;Oh, Sang-Hun
    • Korean Journal of Plant Taxonomy
    • /
    • v.47 no.2
    • /
    • pp.124-131
    • /
    • 2017
  • Species identification is a fundamental and routine process in plant systematics, and linguistic-based dichotomous keys are widely used in the identification process. Recently, novel tools for species identification have been developed to improve the accuracy, ease to use, and accessibility related to these tasks for a broad range of users given the advances in information and communications technology. A visual identification key is such an approach, in which couplets consist of images of plants or a part of a plant instead of botanical terminology. We developed a visual identification key for 101 taxa of Orchidaceae in Korea and evaluated its performance. It uses short statements for image couplets to avoid misinterpretations by users. The key at the initial steps (couplets) uses relatively easy characters that can be determined with the naked eye. The final steps of the visual key provide images of species and information about distributions and flowering times to determine the species that best fit the available information. The number of steps required to identify a species varies, ranging from three to ten with an average of 4.5. A performance test with senior college students showed that species were accurately identified using the visual key at a rate significantly higher than when using a linguistic-based dichotomous key and a color manual. The findings presented here suggest that the proposed visual identification key is a useful tool for the teaching of biodiversity at schools, for the monitoring of ecosystems by citizens, and in other areas that require rapid, easy, and accurate identifications of species.

Automatic Transcription of Three Ambiguous Symbols Used with Arabic Numerals: Period, Colon and Slash. (아라비안 숫자를 동반한 중의적 기호의 자동전사: 온점, 쌍점, 빗금을 중심으로)

  • 윤애선;정영임;권혁철
    • Language and Information
    • /
    • v.8 no.1
    • /
    • pp.117-136
    • /
    • 2004
  • In this paper, we have proposed Auto- TSS, an automatic transcription module of three ambiguous symbols-period (.), colon (:) and slash (/)--using their linguistic contexts. Few previous studies have discussed the problems of ambiguities in reading those symbols into Korean alphabetic letters in order to improve the current Korean TTS (Text-To-Speech) systems. We have classified 9 different reading formulae of the three symbols, analyzed their left and right contexts, and investigated selection rules and distributions between the symbols and their contexts. Based on these linguistic features, 30 stereotyped patterns, 53 rules and 5 heuristics determining the types of reading formulae are investigated for Auto-TSS. This module works modularly in 4 steps. The pilot test was conducted with three test suites, which contain respectively 6,979, 3,491 and 2,450 morpheme clusters containing at least one of three ambiguous symbols and Arabic numeral(s). Encouraging results of 94.3%, 93.0%, 94.2% accuracy were obtained for the test suites. Our next phases are to develop a guessing routine for unknown contexts of the union symbols by using statistical information; to refine the proper nouns and terminology detecting module; and to apply Auto-TSS on a larger scale.

  • PDF

Object Dimension Estimation for Remote Visual Inspection in Borescope Systems

  • Kim, Hyun-Sik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4160-4173
    • /
    • 2019
  • Borescopes facilitate the inspection of areas inside machines and systems that are not directly accessible for visual inspection. They offer real-time, up-close access to confined and hard-to-access spaces without having to dismantle or destructure the object under inspection. Borescopes are ideal instruments for routine maintenance, quality inspection and monitoring of systems and structures. The main application being fault or defect detection, it is useful to have measuring capability to quantify object dimensions in a target area. High-end borescopes use multi-optic solutions to provide measurement information of viewed objects. Multi-optic solutions can provide accurate measurements at the expense of structural complexity and cost increase. Measuring functionality is often unavailable in low-end, single camera borescopes. In this paper, a single camera measurement solution that enables the size estimation of viewed objects is proposed. The proposed solution computes and overlays a scaled grid of known spacing value over the screen view, enabling the human inspector to estimate the size of the objects in view. The proposed method provides a simple means of measurement that is applicable to low-end borescopes with no built-in measurement capability.