keyword
MENU ▼
Read by QxMD icon Read
search

Secure text

keyword
https://www.readbyqxmd.com/read/27905227/a-practical-guide-to-forensic-nursing-amar-angela-f-and-sekula-l-kathleen-a-practical-guide-to-forensic-nursing-392pp-%C3%A2-38-85-sigma-theta-tau-international-kindle-edition-9781940446349-1940446341-formula-see-text
#1
(no author information available yet)
This fascinating publication describes in depth the roles and responsibilities of forensic nurses in the US, who are often involved in the scientific investigation of violent and sexual crimes. However, these duties differ from those of nurses in forensic or secure settings in the UK, who work primarily with offenders who have mental health problems and who are in hospital, prison or police cells.
December 1, 2016: Nursing Management (Harrow)
https://www.readbyqxmd.com/read/27904216/scapholunate-ligament-reconstruction-using-the-palmaris-longus-tendon-and-suture-anchor-fixation-in-chronic-scapholunate-instability
#2
Maulik Jagdish Gandhi, Timothy Paul Knight, Peter John Ratcliffe
BACKGROUND: Multiple reconstruction techniques have been described in the management of chronic scapholunate (SL) instability, either based on the capsulodesis or tenodesis principle. It is uncertain which surgical method produces the best patient outcomes. We describe results of a technique using palmaris longus (PL) tendon for surgical reconstruction of the SL ligament and provide functional outcomes scores. MATERIALS AND METHODS: We surgically reconstructed the SL ligament using a PL tendon graft secured with Mitek(®) bone anchors...
November 2016: Indian Journal of Orthopaedics
https://www.readbyqxmd.com/read/27876689/survey-email-scheduling-and-monitoring-in-ercts-sesame-a-digital-tool-to-improve-data-collection-in-randomized-controlled-clinical-trials
#3
Trygve Skonnord, Finn Steen, Holgeir Skjeie, Arne Fetveit, Mette Brekke, Atle Klovning
BACKGROUND: Electronic questionnaires can ease data collection in randomized controlled trials (RCTs) in clinical practice. We found no existing software that could automate the sending of emails to participants enrolled into an RCT at different study participant inclusion time points. OBJECTIVE: Our aim was to develop suitable software to facilitate data collection in an ongoing multicenter RCT of low back pain (the Acuback study). For the Acuback study, we determined that we would need to send a total of 5130 emails to 270 patients recruited at different centers and at 19 different time points...
November 22, 2016: Journal of Medical Internet Research
https://www.readbyqxmd.com/read/27857824/medical-image-encryption-an-application-for-improved-padding-based-ggh-encryption-algorithm
#4
Massoud Sokouti, Ali Zakerolhosseini, Babak Sokouti
Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services ( i.e. , confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images among physicians. The Goldreich Goldwasser Halevi (GGH) algorithm can be a good choice for encrypting medical images as both the algorithm and sensitive data are represented by numeric matrices...
2016: Open Medical Informatics Journal
https://www.readbyqxmd.com/read/27855685/understanding-the-barriers-to-successful-adoption-and-use-of-a-mobile-health-information-system-in-a-community-health-center-in-s%C3%A3-o-paulo-brazil-a-cohort-study
#5
Jayant V Rajan, Juliana Moura, Gato Gourley, Karina Kiso, Alexandre Sizilio, Ana Maria Cortez, Lee W Riley, Maria Amelia Veras, Urmimala Sarkar
BACKGROUND: Mobile technology to support community health has surged in popularity, yet few studies have systematically examined usability of mobile platforms for this setting. METHODS: We conducted a mixed-methods study of 14 community healthcare workers at a public healthcare clinic in São Paulo, Brazil. We held focus groups with community healthcare workers to elicit their ideas about a mobile health application and used this input to build a prototype app. A pre-use test survey was administered to all participants, who subsequently use-tested the app on three different devices (iPhone, iPad mini, iPad Air)...
November 17, 2016: BMC Medical Informatics and Decision Making
https://www.readbyqxmd.com/read/27849476/perspective-of-the-graduating-medical-student-the-ideal-curriculum-for-the-fourth-year-of-undergraduate-medical-education
#6
Mary A Andrews, Nathalie D Paolino, Kent J DeZee, Brian Hemann
OBJECTIVE: To explore medical students' perspective regarding the fourth year of medical school and common educational activities thereof. METHODS: The authors surveyed students graduating in 2012 with a military service obligation about the importance of common fourth-year activities, the proportion of the fourth year devoted to these activities, and important considerations for the fourth-year curriculum. The authors calculated mean importance scores for educational activities and mean proportions of the fourth year that should be devoted to certain activities...
November 2016: Military Medicine
https://www.readbyqxmd.com/read/27847350/design-considerations-in-development-of-a-mobile-health-intervention-program-the-text-me-and-textmeds-experience
#7
Jay Thakkar, Tony Barry, Aravinda Thiagalingam, Julie Redfern, Alistair L McEwan, Anthony Rodgers, Clara K Chow
BACKGROUND: Mobile health (mHealth) has huge potential to deliver preventative health services. However, there is paucity of literature on theoretical constructs, technical, practical, and regulatory considerations that enable delivery of such services. OBJECTIVES: The objective of this study was to outline the key considerations in the development of a text message-based mHealth program; thus providing broad recommendations and guidance to future researchers designing similar programs...
November 15, 2016: JMIR MHealth and UHealth
https://www.readbyqxmd.com/read/27830617/a-practical-guide-to-forensic-nursing-amar-angela-f-and-sekula-l-kathleen-a-practical-guide-to-forensic-nursing-392pp-%C3%A2-38-85-sigma-theta-tau-international-kindle-edition-9781940446349-1940446341-formula-see-text
#8
(no author information available yet)
This fascinating publication describes in depth the roles and responsibilities of forensic nurses in the US, who are often involved in the scientific investigation of violent and sexual crimes. However, these duties differ from those of nurses in forensic or secure settings in the UK, who work primarily with offenders who have mental health problems and who are in hospital, prison or police cells.
November 10, 2016: Emergency Nurse: the Journal of the RCN Accident and Emergency Nursing Association
https://www.readbyqxmd.com/read/27830254/clinical-research-informatics-contributions-from-2015
#9
C Daniel, R Choquet
OBJECTIVES: To summarize key contributions to current research in the field of Clinical Research Informatics (CRI) and to select best papers published in 2015. METHOD: A bibliographic search using a combination of MeSH and free terms search over PubMed on Clinical Research Informatics (CRI) was performed followed by a double-blind review in order to select a list of candidate best papers to be then peer-reviewed by external reviewers. A consensus meeting between the two section editors and the editorial team was finally organized to conclude on the selection of best papers...
November 10, 2016: Yearbook of Medical Informatics
https://www.readbyqxmd.com/read/27806508/security-challenges-in-healthcare-cloud-computing-a-systematic-review
#10
Esmaeil Mehraeen, Marjan Ghazisaeedi, Jebraeil Farzi, Saghar Mirshekari
BACKGROUND: Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients' electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance...
July 12, 2016: Global Journal of Health Science
https://www.readbyqxmd.com/read/27762251/disorders-induced-by-direct-occupational-exposure-to-noise-systematic-review
#11
Andrea Domingo-Pueyo, Javier Sanz-Valero, Carmina Wanden-Berghe
BACKGROUND: To review the available scientific literature about the effects on health by occupational exposure to noise. MATERIALS AND METHODS: A systematic review of the retrieved scientific literature from the databases MEDLINE (via PubMed), ISI-Web of Knowledge (Institute for Scientific Information), Cochrane Library Plus, SCOPUS, and SciELO (collection of scientific journals) was conducted. The following terms were used as descriptors and were searched in free text: "Noise, Occupational," "Occupational Exposure," and "Occupational Disease...
September 2016: Noise & Health
https://www.readbyqxmd.com/read/27722978/an-improvement-to-a-multi-client-searchable-encryption-scheme-for-boolean-queries
#12
Han Jiang, Xue Li, Qiuliang Xu
The migration of e-health systems to the cloud computing brings huge benefits, as same as some security risks. Searchable Encryption(SE) is a cryptography encryption scheme that can protect the confidentiality of data and utilize the encrypted data at the same time. The SE scheme proposed by Cash et al. in Crypto2013 and its follow-up work in CCS2013 are most practical SE Scheme that support Boolean queries at present. In their scheme, the data user has to generate the search tokens by the counter number one by one and interact with server repeatedly, until he meets the correct one, or goes through plenty of tokens to illustrate that there is no search result...
December 2016: Journal of Medical Systems
https://www.readbyqxmd.com/read/27713112/developing-a-health-information-technology-systems-matrix-a-qualitative-participatory-approach
#13
Jolie N Haun, Margeaux Chavez, Kim M Nazi, Nicole Antinori
BACKGROUND: The US Department of Veterans Affairs (VA) has developed various health information technology (HIT) resources to provide accessible veteran-centered health care. Currently, the VA is undergoing a major reorganization of VA HIT to develop a fully integrated system to meet consumer needs. Although extensive system documentation exists for various VA HIT systems, a more centralized and integrated perspective with clear documentation is needed in order to support effective analysis, strategy, planning, and use...
October 6, 2016: Journal of Medical Internet Research
https://www.readbyqxmd.com/read/27708436/ionization-fraction-and-the-enhanced-sulfur-chemistry-in-barnard-1
#14
A Fuente, J Cernicharo, E Roueff, M Gerin, J Pety, N Marcelino, R Bachiller, B Lefloch, O Roncero, A Aguado
CONTEXT: Barnard B1b has revealed as one of the most interesting globules from the chemical and dynamical point of view. It presents a rich molecular chemistry characterized by large abundances of deuterated and complex molecules. Furthermore, it hosts an extremely young Class 0 object and one candidate to First Hydrostatic Core (FHSC) proving the youth of this star forming region. AIMS: Our aim is to determine the cosmic ray ionization rate, [Formula: see text], and the depletion factors in this extremely young star forming region...
September 2016: Astronomy and Astrophysics
https://www.readbyqxmd.com/read/27682447/a-qualitative-synthesis-of-the-positive-and-negative-impacts-related-to-delivery-of-peer-based-health-interventions-in-prison-settings
#15
Jane South, James Woodall, Karina Kinsella, Anne-Marie Bagnall
BACKGROUND: Peer interventions involving prisoners in delivering peer education and peer support in a prison setting can address health need and add capacity for health services operating in this setting. This paper reports on a qualitative synthesis conducted as part of a systematic review of prison-based peer interventions. One of the review questions aimed to investigate the positive and negative impacts of delivering peer interventions within prison settings. This covered organisational and process issues relating to peer interventions, including prisoner and staff views...
September 29, 2016: BMC Health Services Research
https://www.readbyqxmd.com/read/27652067/quantum-exhaustive-key-search-with-simplified-des-as-a-case-study
#16
Mishal Almazrooie, Azman Samsudin, Rosni Abdullah, Kussay N Mutter
To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version...
2016: SpringerPlus
https://www.readbyqxmd.com/read/27652062/secure-multiparty-computation-of-a-comparison-problem
#17
Xin Liu, Shundong Li, Jian Liu, Xiubo Chen, Gang Xu
Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model...
2016: SpringerPlus
https://www.readbyqxmd.com/read/27573318/older-people-assistive-technologies-and-the-barriers-to-adoption-a-systematic-review
#18
REVIEW
Salifu Yusif, Jeffrey Soar, Abdul Hafeez-Baig
BACKGROUND: Older people generally prefer to continue living in their own homes rather than move into residential age care institutions. Assistive technologies and sensors in the home environment and/or bodily worn systems that monitor people's movement might contribute to an increased sense of safety and security at home. However, their use can raise ethical anxieties as little is known about how older persons perceive assistive and monitoring technologies. OBJECTIVES: To review the main barriers to the adoption of assistive technologies (ATs) by older adults in order to uncover issues of concern from empirical studies and to arrange these issues from the most critical to the least critical...
October 2016: International Journal of Medical Informatics
https://www.readbyqxmd.com/read/27570663/nlp-pier-a-scalable-natural-language-processing-indexing-and-searching-architecture-for-clinical-notes
#19
Reed McEwan, Genevieve B Melton, Benjamin C Knoll, Yan Wang, Gretchen Hultman, Justin L Dale, Tim Meyer, Serguei V Pakhomov
Many design considerations must be addressed in order to provide researchers with full text and semantic search of unstructured healthcare data such as clinical notes and reports. Institutions looking at providing this functionality must also address the big data aspects of their unstructured corpora. Because these systems are complex and demand a non-trivial investment, there is an incentive to make the system capable of servicing future needs as well, further complicating the design. We present architectural best practices as lessons learned in the design and implementation NLP-PIER (Patient Information Extraction for Research), a scalable, extensible, and secure system for processing, indexing, and searching clinical notes at the University of Minnesota...
2016: AMIA Summits on Translational Science Proceedings
https://www.readbyqxmd.com/read/27570641/predicting-hospital-visits-from-geo-tagged-internet-search-logs
#20
Vibhu Agarwal, Lichy Han, Isaac Madan, Shaurya Saluja, Aaditya Shidham, Nigam H Shah
The steady rise in healthcare costs has deprived over 45 million Americans of healthcare services (1, 2) and has encouraged healthcare providers to look for opportunities to improve their operational efficiency. Prior studies have shown that evidence of healthcare seeking intent in Internet searches correlates well with healthcare resource utilization. Given the ubiquitous nature of mobile Internet search, we hypothesized that analyzing geo-tagged mobile search logs could enable us to machine-learn predictors of future patient visits...
2016: AMIA Summits on Translational Science Proceedings
keyword
keyword
96083
1
2
Fetch more papers »
Fetching more papers... Fetching...
Read by QxMD. Sign in or create an account to discover new knowledge that matter to you.
Remove bar
Read by QxMD icon Read
×

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"