Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Session 2: Access To Health And Health Services Panel - The Covid-19 Experience, Annette Clark, Wendy Chalres, Dan Laster, Anna Santos Rutschman, Madhavi Sunder, Margret Chon Jun 2021

Session 2: Access To Health And Health Services Panel - The Covid-19 Experience, Annette Clark, Wendy Chalres, Dan Laster, Anna Santos Rutschman, Madhavi Sunder, Margret Chon

SITIE Symposiums

COVID-19 has had a massive impact on the U.S. and the world regarding health care and health care access. Improving access has been the topic of scholarship for many years. It took the COVID- 19 pandemic to bring these issues to the forefront of public discussion. Inequities in public health access, not only domestically but globally, have become apparent in the light of COVID-19. This expert panel addresses the inequities of vaccines worldwide and the concept of vaccine sharing programs. It also explores the role that intellectual property plays in these equity issues and some of the risks inherent in …


The Effect Of Arm Swing On Countermovement Vertical Jump Performance, Arash Mohammadzadeh Gonabadi Mar 2019

The Effect Of Arm Swing On Countermovement Vertical Jump Performance, Arash Mohammadzadeh Gonabadi

UNO Student Research and Creative Activity Fair

Vertical jumping is one of the popular ways to evaluate ankle-knee efficiency in athletic population. Arm swing can play a crucial role in enhancing vertical jump performance. This study aimed to address the differences in kinetic and kinematic parameters during countermovement jump motion with arm swing (AS) and no arm swing (NAS). We used OpenSim to examine the efficacy of AS in reducing the impulse applied to the body and changes in range of lower limb joint angles at landing instant. We calculated the maximum vertical peak of the ground reaction force and impulse generated at landing in two different …


Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose Mar 2019

Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose

UNO Student Research and Creative Activity Fair

A team of clinicians at Children’s Hospital and Medical Center (CHMC) developed a standardized protocol in 2018 for the care of patients needing sedation. This protocol is ordered through the EPIC electronic health record system for patients in the pediatric intensive care unit (PICU). When used, electronic protocols reduce the variation in clinical decision making which can ultimately improve patient outcomes. The goal of this project is to evaluate this technology, how the protocol is being used, and how it may be improved. Actual users of the EPIC sedation protocol were the subjects of this study, including PICU physicians, physician …


Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi Mar 2019

Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi

UNO Student Research and Creative Activity Fair

Indirect calorimetry provides the average cost of a stride cycle and prevents from identifying which part of the gait cycle causes increased metabolic cost in patients, however, recent simulation methods allow estimating the time profile of metabolic cost within the stride cycle. In this study, we compare the estimations of the time profile of the metabolic cost of two simulation methods for level and uphill walking. We used kinematic, kinetic and electromyography data from level and uphill walking (one participant) to estimate the time profiles of metabolic cost using the muscle-level metabolic model of Umberger using electromyography and kinematic data …


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


A Machine Learning Approach To Post-Market Surveillance Of Medical Devices, Jonathan Bates, Shu-Xia Li, Craig Parzynski, Ronald Coifman, Harlan Krumholz, Joseph Ross Sep 2015

A Machine Learning Approach To Post-Market Surveillance Of Medical Devices, Jonathan Bates, Shu-Xia Li, Craig Parzynski, Ronald Coifman, Harlan Krumholz, Joseph Ross

Yale Day of Data

Post-market surveillance is a collection of processes and activities used by product manufacturers and regulators, such as the U.S. Food and Drug Administration (FDA) to monitor the safety and effectiveness of medical devices once they are available for use “on the market”. These activities are designed to generate information to identify poorly performing devices and other safety problems, accurately characterize real-world device performance and clinical outcomes, and facilitate the development of new devices, or new uses for existing devices. Typically, a device is monitored by comparing adverse events in the exposed population to a matched unexposed population. This research considers …


Model Of Cost-Effectiveness Of Mri For Women Of Average Lifetime Risk Of Breast Cancer, Mckenna L. Kimball Apr 2015

Model Of Cost-Effectiveness Of Mri For Women Of Average Lifetime Risk Of Breast Cancer, Mckenna L. Kimball

Scholarly and Creative Works Conference (2015 - 2021)

Background: Mammography is the current standard for breast cancer detection however magnetic resonance imaging (MRI) is a more sensitive method of breast imaging. Despite MRI’s increased sensitivity, MRI has more false positives and higher costs. The purpose of this study was to determine if MRI or MRI in conjunction with mammography was a cost-effective solution for breast cancer detection in women with average lifetime risk of breast cancer.

Methods: A mathematical model was used to compare annual mammography, annual MRI, and mammography and MRI on alternate years. The model included the natural history of breast cancer, screening by mammography …


Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl Jun 2014

Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl

Charleston Library Conference

The authors consider trends in mobile device usage for the Internet as a whole, for EBSCO Discovery Service across all client libraries, and at two specific libraries: Preston Medical Library, serving the University of Tennessee (UT) Graduate School of Medicine and UT Medical Center, and the Joyner Library at East Carolina University, serving students and faculty on the main campus. Librarians at Preston Medical Library conducted a survey to determine which mobile devices, platforms, and apps were used by their patrons in 2012. East Carolina University piloted an iPad and e-reader lending program in 2010–2011. The results of each are …


Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia Jul 2011

Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia

International Conference on Information and Communication Technologies

Preserving the privacy of individuals while publishing their relevant data has been an important problem. Most of previous works in privacy preserving data publication focus on one time, static release of datasets. In multiple publications however, where data is published multiple times, these techniques are unable to ensure privacy of the concerned individuals as just joining either of the releases could result in identity disclosure. In this work, we tried to investigate the major findings in the scenario of continuous data publication, in which the data is not only published multiple times but also modified with INSERTS, UPDATES and DELETE …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza Aug 2005

Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza

International Conference on Information and Communication Technologies

Current knowledge management systems are largely designed to deal with a single knowledge modality. Given the diversity of knowledge modalities that encompass any given topic/problem it is reasonable to demand access and use of all available knowledge, irrespective of their representation modality, to derive a knowledge-mediated solution. This calls for selecting all knowledge elements (represented in different modalities) that are relevant to the solution of the problem at hand. Thus here we pursue the specification and implementation of such a knowledge-mediated solution using a triangulation approach leading to Knowledge Morphing. In this paper we present a tacit-explicit knowledge morphing (TEKM) …