A Methodology to Generate Virtual Patient Repositories
نویسنده
چکیده
Electronic medical records (EMR) contain sensitive personal information. For example, they may include details about infectious diseases, such as human immunodeficiency virus (HIV), or they may contain information about a mental illness. They may also contain other sensitive information such as medical details related to fertility treatments. Because EMRs are subject to confidentiality requirements, accessing and analyzing EMR databases is a privilege given to only a small number of individuals. Individuals who work at institutions that do not have access to EMR systems have no opportunity to gain hands-on experience with this valuable resource. Simulated medical databases are currently available; however, they are difficult to configure and are limited in their resemblance to real clinical databases. Generating highly accessible repositories of virtual patient EMRs while relying only minimally on real patient data is expected to serve as a valuable resource to a broader audience of medical personnel, including those who reside in underdeveloped countries.
منابع مشابه
Computer-Assisted Instruction (CAI), Virtual Patients (VP), and Human Patient Simulation (HPS) in Medical Education Based on Gagne’s Educational Design Pattern
Background and objectives: Educational technology is widely used in all parts of medical education. The use and application of common educational technologies and adoption of educational design patterns in medical sciences education can greatly help in medical simulations, training, and improving of clinical skills of nurses and medical students. The aim of this research was to study computer-a...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA Proposed Data Mining Methodology and its Application to Industrial Procedures
Data mining is the process of discovering correlations, patterns, trends or relationships by searching through a large amount of data stored in repositories, corporate databases, and data warehouses. Industrial procedures with the help of engineers, managers, and other specialists, comprise a broad field and have many tools and techniques in their problem-solving arsenal. The purpose of this st...
متن کاملOntology Mapping for Learning Objects Repositories Interoperability
In order to deal with the need of sharing learning objects within and across learning object repositories most of the recent work argue for the use of ontologies as a means for providing a shared understanding of common domains. But with the proliferation of many different ontologies even for the same domain, it become necessary to provide mapping process to perform interoperability. Two key is...
متن کاملVirtual Appliance Creation and Optimization in Cloud
The large scale IaaS systems could store virtual appliances in several repositories. The deployment time could heavily vary depending on the connection properties of the repository storing the appliance. A virtual appliance is a virtual machine image designed to run on a virtualization platform i.e. Virtual Box, Xen, VMware Workstation. Virtual appliance delivery requires the modification of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1608.00570 شماره
صفحات -
تاریخ انتشار 2016