Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- File Type
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
Session 2: Access To Health And Health Services Panel - The Covid-19 Experience, Annette Clark, Wendy Chalres, Dan Laster, Anna Santos Rutschman, Madhavi Sunder, Margret Chon
Session 2: Access To Health And Health Services Panel - The Covid-19 Experience, Annette Clark, Wendy Chalres, Dan Laster, Anna Santos Rutschman, Madhavi Sunder, Margret Chon
SITIE Symposiums
COVID-19 has had a massive impact on the U.S. and the world regarding health care and health care access. Improving access has been the topic of scholarship for many years. It took the COVID- 19 pandemic to bring these issues to the forefront of public discussion. Inequities in public health access, not only domestically but globally, have become apparent in the light of COVID-19. This expert panel addresses the inequities of vaccines worldwide and the concept of vaccine sharing programs. It also explores the role that intellectual property plays in these equity issues and some of the risks inherent in …
The Effect Of Arm Swing On Countermovement Vertical Jump Performance, Arash Mohammadzadeh Gonabadi
The Effect Of Arm Swing On Countermovement Vertical Jump Performance, Arash Mohammadzadeh Gonabadi
UNO Student Research and Creative Activity Fair
Vertical jumping is one of the popular ways to evaluate ankle-knee efficiency in athletic population. Arm swing can play a crucial role in enhancing vertical jump performance. This study aimed to address the differences in kinetic and kinematic parameters during countermovement jump motion with arm swing (AS) and no arm swing (NAS). We used OpenSim to examine the efficacy of AS in reducing the impulse applied to the body and changes in range of lower limb joint angles at landing instant. We calculated the maximum vertical peak of the ground reaction force and impulse generated at landing in two different …
Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose
Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose
UNO Student Research and Creative Activity Fair
A team of clinicians at Children’s Hospital and Medical Center (CHMC) developed a standardized protocol in 2018 for the care of patients needing sedation. This protocol is ordered through the EPIC electronic health record system for patients in the pediatric intensive care unit (PICU). When used, electronic protocols reduce the variation in clinical decision making which can ultimately improve patient outcomes. The goal of this project is to evaluate this technology, how the protocol is being used, and how it may be improved. Actual users of the EPIC sedation protocol were the subjects of this study, including PICU physicians, physician …
Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi
Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi
UNO Student Research and Creative Activity Fair
Indirect calorimetry provides the average cost of a stride cycle and prevents from identifying which part of the gait cycle causes increased metabolic cost in patients, however, recent simulation methods allow estimating the time profile of metabolic cost within the stride cycle. In this study, we compare the estimations of the time profile of the metabolic cost of two simulation methods for level and uphill walking. We used kinematic, kinetic and electromyography data from level and uphill walking (one participant) to estimate the time profiles of metabolic cost using the muscle-level metabolic model of Umberger using electromyography and kinematic data …
Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne
Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …
A Machine Learning Approach To Post-Market Surveillance Of Medical Devices, Jonathan Bates, Shu-Xia Li, Craig Parzynski, Ronald Coifman, Harlan Krumholz, Joseph Ross
A Machine Learning Approach To Post-Market Surveillance Of Medical Devices, Jonathan Bates, Shu-Xia Li, Craig Parzynski, Ronald Coifman, Harlan Krumholz, Joseph Ross
Yale Day of Data
Post-market surveillance is a collection of processes and activities used by product manufacturers and regulators, such as the U.S. Food and Drug Administration (FDA) to monitor the safety and effectiveness of medical devices once they are available for use “on the market”. These activities are designed to generate information to identify poorly performing devices and other safety problems, accurately characterize real-world device performance and clinical outcomes, and facilitate the development of new devices, or new uses for existing devices. Typically, a device is monitored by comparing adverse events in the exposed population to a matched unexposed population. This research considers …
Model Of Cost-Effectiveness Of Mri For Women Of Average Lifetime Risk Of Breast Cancer, Mckenna L. Kimball
Model Of Cost-Effectiveness Of Mri For Women Of Average Lifetime Risk Of Breast Cancer, Mckenna L. Kimball
Scholarly and Creative Works Conference (2015 - 2021)
Background: Mammography is the current standard for breast cancer detection however magnetic resonance imaging (MRI) is a more sensitive method of breast imaging. Despite MRI’s increased sensitivity, MRI has more false positives and higher costs. The purpose of this study was to determine if MRI or MRI in conjunction with mammography was a cost-effective solution for breast cancer detection in women with average lifetime risk of breast cancer.
Methods: A mathematical model was used to compare annual mammography, annual MRI, and mammography and MRI on alternate years. The model included the natural history of breast cancer, screening by mammography …
Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl
Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl
Charleston Library Conference
The authors consider trends in mobile device usage for the Internet as a whole, for EBSCO Discovery Service across all client libraries, and at two specific libraries: Preston Medical Library, serving the University of Tennessee (UT) Graduate School of Medicine and UT Medical Center, and the Joyner Library at East Carolina University, serving students and faculty on the main campus. Librarians at Preston Medical Library conducted a survey to determine which mobile devices, platforms, and apps were used by their patrons in 2012. East Carolina University piloted an iPad and e-reader lending program in 2010–2011. The results of each are …
Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia
Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia
International Conference on Information and Communication Technologies
Preserving the privacy of individuals while publishing their relevant data has been an important problem. Most of previous works in privacy preserving data publication focus on one time, static release of datasets. In multiple publications however, where data is published multiple times, these techniques are unable to ensure privacy of the concerned individuals as just joining either of the releases could result in identity disclosure. In this work, we tried to investigate the major findings in the scenario of continuous data publication, in which the data is not only published multiple times but also modified with INSERTS, UPDATES and DELETE …
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
International Conference on Information and Communication Technologies
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …
Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza
Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza
International Conference on Information and Communication Technologies
Current knowledge management systems are largely designed to deal with a single knowledge modality. Given the diversity of knowledge modalities that encompass any given topic/problem it is reasonable to demand access and use of all available knowledge, irrespective of their representation modality, to derive a knowledge-mediated solution. This calls for selecting all knowledge elements (represented in different modalities) that are relevant to the solution of the problem at hand. Thus here we pursue the specification and implementation of such a knowledge-mediated solution using a triangulation approach leading to Knowledge Morphing. In this paper we present a tacit-explicit knowledge morphing (TEKM) …