| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910438127103321 |
|
|
Autore |
Smith Philip A |
|
|
Titolo |
Making computerized provider order entry work / / Philip A. Smith ; Tim Benson, series editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Springer, 2013 |
|
|
|
|
|
|
|
ISBN |
|
1-283-62215-7 |
9786613934604 |
1-4471-4243-8 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (206 p.) |
|
|
|
|
|
|
Collana |
|
Health information technology standards |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Medicine - Data processing |
Medical informatics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Foreword -- Introduction -- Why the Concern for CPOE Now? -- Vision: How You Start -- Leadership and Governance -- Project Management -- Change Management -- Building Momentum -- Avoiding Common Pitfalls along the Way -- Implementation -- Stabilization and Optimization -- Putting It All Together -- Appendix A Sample Forms and Other Tools -- Glossary -- Bibliography/Suggested Readings -- Index. . |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Making Computerized Provider Order Entry Work is neither a scientific reference guide into medical informatics nor a book on theory or a summary of research studies in the field, but rather it is a practical guide to visioning and executing successful automation of physician workflow in the hospital environment. This adaptation of workflow is the work of a team, with leadership, clear vision, dedication, commitment, external drivers, experience, and the tireless work of those before us in this industry, who have paved the way with both successes and failure. Throughout the book, the author shares hard lessons-learned and guides the reader through the early warning signs that will help avoid the pitfalls. As systems progress, and the regulatory environments change, there will be new challenges and opportunities that will confront those setting up automated physician workflows. |
|
|
|
|
|
|
|
|
|
|
|
|
|
However, this book highlights and discusses all of the principles involved such as vision, leadership, project management and change management, which will always need to be incorporated to ensure project success. As such this book will be an important reference for anyone involved in the setting up or use of such systems from the physicians and medical professionals themselves through the medical informaticist to health system executives and other decision makers. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910633913203321 |
|
|
Titolo |
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications / / edited by George A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang Lin |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (406 pages) |
|
|
|
|
|
|
Collana |
|
Smart Innovation, Systems and Technologies, , 2190-3026 ; ; 314 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Artificial intelligence |
Engineering - Data processing |
Big data |
Engineering mathematics |
Computational Intelligence |
Artificial Intelligence |
Data Engineering |
Big Data |
Mathematical and Computational Engineering Applications |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Reversible Data Hiding in Encrypted Image Based on MSB Inversion -- Comments on the Visual Binary QR Code -- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services -- |
|
|
|
|
|
|
|
|
|
|
|
Efficient Steganographic Method Based on Modulo Cube -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- An RFID Ownership Transfer based on Multiple Owners with Different Weights -- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection -- Real Time Drowsiness Detection Based on Facial Dynamic Features -- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning -- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas. |
|
|
|
|
|
|
|
| |