• Title/Summary/Keyword: record information service

Search Result 283, Processing Time 0.027 seconds

CDSS enabled PHR system for chronic disease patients (만성 질병환자를 위한 CDSS를 적용한 PHR 시스템)

  • Hussain, Maqbool;Khan, Wajahat Ali;Afzal, Muhammad;Ali, Taqdir;Lee, Sungyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1321-1322
    • /
    • 2012
  • With the advance of Information Technology (IT) and dynamic requirements, diverse application services have been provided for end users. With huge volume of these services and information, users are required to acquire customized services that provide personalized information and decision at particular extent of time. The case is more appealing in healthcare, where patients wish to have access to their medical record where they have control and provided with recommendation on the medical information. PHR (Personal Health Record) is most prevailing initiative that gives secure access on patient record at anytime and anywhere. PHR should also incorporate decision support to help patients in self-management of their diseases. Available PHR system incorporates basic recommendations based on patient routine data. We have proposed decision support service called "Smart CDSS" that provides recommendations on PHR data for diabetic patients. Smart CDSS follows HL7 vMR (Virtual Medical Record) to help in integration with diverse application including PHR. PHR shares patient data with Smart CDSS through standard interfaces that pass through Adaptability Engine (AE). AE transforms the PHR CCR/CCD (Continuity of Care Record/Document) into standard HL7 vMR format. Smart CDSS produces recommendation on PHR datasets based on diabetic knowledge base represented in shareable HL7 Arden Syntax format. The Smart CDSS service is deployed on public cloud over MS Azure environment and PHR is maintaining on private cloud. The system has been evaluated for recommendation for 100 diabetic patients from Saint's Mary Hospital. The recommendations were compared with physicians' guidelines which complement the self-management of the patient.

Realization of Location based Service with ePosition by Defining the New DNS Resource Record (새로운 DNS 리소스 레코드 정의를 통한 ePosition 위치 기반 서비스)

  • Jang, Dong-Heyok;Lee, Sang-Zee;Kim, Kyung-Hun;Kwon, Oh-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.264-272
    • /
    • 2008
  • In ubiquitous geographic information environment, the users are provided with geographic information anywhere and any time on their needs by any types of devices and communication media. The unique location ID, ePosition, is a new technology to support UBGI environment, using a logical location ID instead of physical location of a point of interest. Domain names of plural ePosition servers, where location information with its ePosition is stored, needs to be registered in DNS for some service through Internet. For better ePosition service of the type of public service like email service, a set of DNS resource records can be newly defined. This paper suggests a new DNS resource record EPO for implementation of the ePosition service through Internet.

A study of access control using fingerprint recognition for Electronic Medical Record System (지문인식 기반을 이용한 전자의무기록 시스템 접근제어에 관한 연구)

  • Baek, Jong Hyun;Lee, Yong Joon;Youm, Heung Youl;Oh, Hae Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.127-133
    • /
    • 2009
  • The pre-existing medical treatment was done in person between doctors and patients. EMR (Electronic Medical Record) System computerizing medical history of patients has been proceed and has raised concerns in terms of violation of human right for private information. Which integrates "Identification information" containing patients' personal details as well as "Medical records" such as the medical history of patients and computerizes all the records processed in hospital. Therefore, all medical information should be protected from misuse and abuse since it is very important for every patient. Particularly the right to privacy of medical record for each patient should be surely secured. Medical record means what doctors put down during the medical examination of patients. In this paper, we applies fingerprint identification to EMR system login to raise the quality of personal identification when user access to EMR System. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing carries out it in client. And the confidence of hospital service is improved because login is forbidden without fingerprint identification success.

A Study on Analysis of User Needs and Improvement Plans for Disaster Record Information Services Based on SNS (SNS 기반 재난기록정보서비스를 위한 이용자 요구분석 및 개선방안)

  • Doo, Hyo-Chul;Kim, Geon;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.1
    • /
    • pp.269-294
    • /
    • 2019
  • To effectively cope with new and different types of disasters, it is very important to communicate and update disaster information to the public quickly and efficiently. SNS enables rapid spread of information and continuous exposure. SNS enables two-way communication by directly communicating with users. SNS complements the shortcomings of mass media, and increases the effectiveness of disaster management work. This study analyzed user awareness and requirements to derive effective methods of SNS operation of disaster management institutions. For this purpose, a user survey was conducted to identify the types of information that are highly user-interested and to select information items suitable for SNS services. Through this, we suggest ways to improve the SNS disaster record information service of the disaster management institution.

An Access Log Management System by User Directed Managing in Ubiquitous Environment (유비쿼터유비쿼터스 환경에서 프라이버시 보호를 위한 사용자 직접 관리 방식의 접근 기록 관리 시스템)

  • Lee, J.;Kim, S.
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.269-273
    • /
    • 2008
  • In ubiquitous environments, clients move between domains freely and its activities in the other domains are growth. Like this environment, the service provider makes access or activity records what they are provided to clients. This record can make a privacy problem to recognize a person or trace some works. So this record must be kept and managed by user instead of the service provider. In this paper, we propose a system that can gather those records from the service provider to home domain server which client's managing by themselves. In addition, if remote domain manager requests that record by the legal process, system can transfer only a range of information which allowed by client to keep personal privacy.

  • PDF

A Study on Architecture of Event Driven Service System (EDS(Event Driven Service) 시스템 구조에 관한 연구)

  • Song, Kwang-Bin;Cho, Sok-Pal
    • The Journal of Information Technology
    • /
    • v.10 no.4
    • /
    • pp.11-26
    • /
    • 2007
  • EDS is a typical convergence service performing convergence between functions owned by multiple SPs. EDS provides users with the relevant information and the communication by the various personal conditional environment. An alternative terminology for events for net- work related applications is 'triggers'-these are assumed to be included in the present description. Events could be defined as any activities which occur within a service avail ability, signals. Events can be managed, for example, as part of a context-aware application. EDS carry out a procedure for processing user's requested information about mobil network-based entities, such as the combination with various applications, such as a LBS (Location Based Service) and area information. In AS (Application Service) network environments, the user has his customized EDS in the network, the EDS automatically connects the appropriate Terminals consistent with a user profile. EDS can also send the collected information to other requesting users by way of event information and using the procedures of combination with other services. The user can record/retrieve the user-related information to from the information base through EDS.

  • PDF

Design and Implementation of Providing Conditional Access Broadcasting Service System (수신 제한된 방송 서비스 제공 시스템 설계 및 구현)

  • Kim, Dong-Ok;Shin, Ik-Ryong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.64-71
    • /
    • 2009
  • In this paper, This thesis is cell phone for make CAS service be for hand joining broadcasting Create a way CAS Chip. PerSam issue card inside use Seed Key and algorithm make CID Key and record CAS Chip. PerSam member Card inside use Seed Key and algorithm make Subscriber Key after include Subscriber. Key CAS Chip for record CID Key register EMM. make CAS CHIP in accordance with issue CAS Chip. broadcast service entry be for hand treatment so make low bandwidth for joining massage and make increase a member.

  • PDF

A Service Discovery Scheme Based on NAPTR Resource Record (NAPTR 자원레코드 기반의 서비스 탐색기법)

  • 권성호;김희철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2003
  • NAPRT(Naming Authority Pointer) is a type of resource record specified in IETF RFC 2915. NAPTR enables to register various services in the Domain Name Systems and thus provides a way to discover services available on specific hosts. This paper describes the design and implementation of a Proxy DNS system aimed at supporting NAPTRs. The goal of this work is to study on the feasibility of the service discovery registered in DNS via NAPTR records and provides the result for simplicity and extensibility of implementation through the implementation of a actual Test-bed system This research result can be applied to service discovery in the resource information management for high performance GRE environments as well as to the implementation of DNS infrastructure for the ENUM.

  • PDF

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology

  • Kim, Heongkyun;Lee, Sangmin;Kwon, Hyunwoo;Kim, Eunmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4400-4419
    • /
    • 2021
  • In the 4th Industrial Revolution, the healthcare industry is undergoing a paradigm shift from post-care and management systems based on diagnosis and treatment to disease prevention and management based on personal precision medicine. To optimize medical services for individual patients, an open ecosystem for the healthcare industry that allows the exchange and utilization of personal health records (PHRs) is required. However, under the current system of hospital-centered data management, it is difficult to implement the linking and sharing of PHRs in practice. To address this problem, in this study, we present the design and implementation of a patient-centered PHR platform using blockchain technology. This platform achieved transparency and reliability in information management by eliminating the risk of leakage and tampering/altering personal information, which could occur when using a PHR. In addition, the patient-consent system was applied to a PHR; thus, the patient acted as the user with ownership. The proposed blockchain-based PHR platform enables the integration of personal medical information with scattered distribution across multiple hospitals, and allows patients to freely use their health records in their daily lives and emergencies. The proposed platform is expected to serve as a stepping stone for patient-centered healthcare data management and utilization.

A Method of Data Hiding in a File System by Modifying Directory Information

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.85-93
    • /
    • 2018
  • In this research, it is proposed that a method to hide data by modifying directory index entry information. It consists of two methods: a directory list hiding and a file contents hiding. The directory list hiding method is to avoid the list of files from appearing in the file explorer window or the command prompt window. By modifying the file names of several index entries to make them duplicated, if the duplicated files are deleted, then the only the original file is deleted, but the modified files are retained in the MFT entry intact. So, the fact that these files are hidden is not exposed. The file contents hiding is to allocate data to be hidden on an empty index record page that is not used. If many files are made in the directory, several 4KB index records are allocated. NTFS leaves the empty index records unchanged after deleting the files. By modifying the run-list of the index record with the cluster number of the file-to-hide, the contents of the file-to-hide are hidden in the index record. By applying the proposed method to the case of hiding two files, the file lists are not exposed in the file explorer and the command prompt window, and the contents of the file-to-hide are hidden in the empty index record. It is proved that the proposed method has effectiveness and validity.