1 MEDICAL ERROR REPORTING AND ANALYSIS Vijaya Gotla UmaDevi Bandaru Lavanya Gundamaraju.

Slides:



Advertisements
Similar presentations
Database System Concepts and Architecture
Advertisements

Chapter 13 Review Questions
Present by Oz Shapira.  User modeling ”is a sub-area of human–computer interaction, in which the researcher / designer develops cognitive models of human.
PROVENANCE FOR THE CLOUD (USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES(FAST `10)) Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer Harvard.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 2.
Sequence Diagrams. Introduction A Sequence diagram depicts the sequence of actions that occur in a system. The invocation of methods in each object, and.
Introduction To System Analysis and Design
The Sherlock Project Purdue University, Department of Computer Sciences Sponsored by Tellabs, Inc. Doug Clark - Group Leader Tobey Pasheilich Raj Talwar.
Component-Level Design
1 ACCTG 6910 Building Enterprise & Business Intelligence Systems (e.bis) Introduction to Data Mining Olivia R. Liu Sheng, Ph.D. Emma Eccles Jones Presidential.
Welcome to this presentation Introduction of CORBA Entertainment Information System (CEIS)
Agent-Based Acceptability-Oriented Computing International Symposium on Software Reliability Engineering Fast Abstract by Shana Hyvat.
The Architecture of Transaction Processing Systems
An Introduction to Internetworking. Algorithm for client-server communication with UDP (connectionless) A SERVER A CLIENT Create a server-socket (listener)and.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Jump to first page Medical Data Analysis/Record Broker Project Team Team Members: Leader: Tracy Giglio: Data Analysis  Kai Unewisse:
The chapter will address the following questions:
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
System Design Chapter 8. Objectives  Understand the verification and validation of the analysis models.  Understand the transition from analysis to.
Introduction To System Analysis and design
Introduction 01_intro.ppt
ACS1803 Lecture Outline 2 DATA MANAGEMENT CONCEPTS Text, Ch. 3 How do we store data (numeric and character records) in a computer so that we can optimize.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
 Introduction Introduction  Purpose of Database SystemsPurpose of Database Systems  Levels of Abstraction Levels of Abstraction  Instances and Schemas.
Design patterns. What is a design pattern? Christopher Alexander: «The pattern describes a problem which again and again occurs in the work, as well as.
POAD Distributed System Case Study: A Medical Informatics System Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Introduction: Databases and Database Users
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Introduction to Data Mining Group Members: Karim C. El-Khazen Pascal Suria Lin Gui Philsou Lee Xiaoting Niu.
Introduction To System Analysis and Design
DEV-5: Introduction to WebSpeed ® Stephen Ferguson Sr. Training Program Manager.
Putting it all together Dynamic Data Base Access Norman White Stern School of Business.
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
ISV Innovation Presented by ISV Innovation Presented by Business Intelligence Fundamentals: Data Cleansing Ola Ekdahl IT Mentors 9/12/08.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Methodologies of the SDLC Traditional Approach to SDLC Object-Oriented Approach to SDLC CASE Tools.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Project Overview Graduate Selection Process Project Goal Automate the Selection Process.
Technology In Action Chapter 11 1 Databases and… Databases and their uses Database components Types of databases Database management systems Relational.
Introduction to CORBA University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 14 Slide 1 Object-oriented Design.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
CSC 480 Software Engineering Lecture 18 Nov 6, 2002.
What to remember from Chap 13 (Logical architecture)
CS 240, Prof. Sarwar Slide 1 CS 240: Software Project Fall 2003 Sections 1 & 2 Dr. Badrul M. Sarwar San Jose State University Lecture #23.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
A radiologist analyzes an X-ray image, and writes his observations on papers  Image Tagging improves the quality, consistency.  Usefulness of the data.
CISB113 Fundamentals of Information Systems Data Management.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 13. Review Shared Data Software Architectures – Black board Style architecture.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Design Reuse Earlier we have covered the re-usable Architectural Styles as design patterns for High-Level Design. At mid-level and low-level, design patterns.
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
UML Course Instructor: Rizwana Noor. Overview  Modeling  What is UML?  Why UML?  UML Diagrams  Use Case  Components  Relationships  Notations.
CS223: Software Engineering Lecture 14: Architectural Patterns.
Smart Web Search Agents Data Search Engines >> Information Search Agents - Traditional searching on the Web is done using one of the following three: -
Application architectures Advisor : Dr. Moneer Al_Mekhlafi By : Ahmed AbdAllah Al_Homaidi.
IIS 645 Database Management Systems DDr. Khorsheed Today’s Topics 1. Course Overview 22. Introduction to Database management 33. Components of Database.
Foundations of information systems : BIS 1202 Lecture 4: Database Systems and Business Intelligence.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MEDICAL RECORD BROKER -LAVANYA GUNDAMARAJU Introduction Introduction n Database and database systems have become an essential part of everyday life.
Software Design Refinement Using Design Patterns
System.
Encrypted Database Final Presentation
Presentation transcript:

1 MEDICAL ERROR REPORTING AND ANALYSIS Vijaya Gotla UmaDevi Bandaru Lavanya Gundamaraju

2 Introduction MERA is a Decision Support system MERA is a Decision Support system A decision support system (DSS) is a computer program application that analyzes data and presents it so that users can make decisions more easily. It is an "informational application" (in distinction to an "operational application" that collects the data in the course of normal operation). A decision support system (DSS) is a computer program application that analyzes data and presents it so that users can make decisions more easily. It is an "informational application" (in distinction to an "operational application" that collects the data in the course of normal operation). MERA not only supports decision making but also serves as a Error Analyzer to forewarn any impending threat. MERA not only supports decision making but also serves as a Error Analyzer to forewarn any impending threat.

3 Problem & Suggested sol.n… Numerous untraceable errors occurring in Medical field Numerous untraceable errors occurring in Medical field No existing efficient system which can predict the errors based on history No existing efficient system which can predict the errors based on history Detect Errors by analyzing the intricacies even before they occur Detect Errors by analyzing the intricacies even before they occur Framing the current pattern to see if it is perilous by comparing it to the previous pattern of errant behavior Framing the current pattern to see if it is perilous by comparing it to the previous pattern of errant behavior

4 What is in MERA Distributed, Component based Agent technology Distributed, Component based Agent technology Learning Agent Learning Agent Association Based Algorithm Association Based Algorithm Collaboration in Agents Collaboration in Agents Not Peer Agents Not Peer Agents

5 Features Autonomous agents: allow decoupling of the main functionality of Error Report and retrieval from analysis and learning Autonomous agents: allow decoupling of the main functionality of Error Report and retrieval from analysis and learning Learning: Learns the current pattern Learning: Learns the current pattern User based output User based output Warning generation: Warns the System manager immediately after he logs in if the system discovers that the current error pattern might lead to a dangerous pattern Warning generation: Warns the System manager immediately after he logs in if the system discovers that the current error pattern might lead to a dangerous pattern

6 Technology Middleware: CORBA – VisiBroker Middleware: CORBA – VisiBroker Programming Language: JAVA Programming Language: JAVA User Interface: JAVA Swing User Interface: JAVA Swing Tools: Together Tools: Together JCreator JCreator

7 CORBA Defines how the distributed objects interact Defines how the distributed objects interact Language and platform independent Language and platform independent Object Request Broker: communication of Objects Object Request Broker: communication of Objects Interface Definition Language: Allows language independent interface definitions Interface Definition Language: Allows language independent interface definitions

8

9 MERA SYSTEM MERA AnalysisReport Department Error Type Error Time Database Updating Updating Data Mining Learning Tool Date

10 User Agent The Interface between the system and Client The Interface between the system and Client It is what the client sees as MERA It is what the client sees as MERA Authenticates the User Authenticates the User Recognizes the user Designation and passes the designation to Data retrieval component. Recognizes the user Designation and passes the designation to Data retrieval component.

11 Continued…. Reporting: It Passes the reported error to the Service Agent and also Records the error. Reporting: It Passes the reported error to the Service Agent and also Records the error. Analysis: It retrieves the data from the database. User has an option to chose the criteria of data analysis. Analysis: It retrieves the data from the database. User has an option to chose the criteria of data analysis. eg: Based on Time, Department, etc.

12 Service Agent Acts only during Reporting Acts only during Reporting It receives the report from User Agent and tries to learn the current pattern. It receives the report from User Agent and tries to learn the current pattern. Compares the current pattern to verify if it is moving to some error pattern recorded in history. Compares the current pattern to verify if it is moving to some error pattern recorded in history. If a pattern match occurs, it shall throw a warning message which is stored by the User agent to inform the manager. If a pattern match occurs, it shall throw a warning message which is stored by the User agent to inform the manager.

13 Support This is a component which helps the interaction with the database. This is a component which helps the interaction with the database. Analysis: the criteria from the user and his designation are passed in to Support by User Agent. Analysis: the criteria from the user and his designation are passed in to Support by User Agent. Based on the Designation, the data is retrieved from the database. Based on the Designation, the data is retrieved from the database.

14 Continued… If the permission have to be changed they can be done very easily as it is a separate component by itself.( using the basic advantage of using components-reusability and flexibility) If the permission have to be changed they can be done very easily as it is a separate component by itself.( using the basic advantage of using components-reusability and flexibility) Reporting: when the data is received from the client to report an error, support updates the database. Reporting: when the data is received from the client to report an error, support updates the database.

15 Service agent USERAGENT DB MERA SYSTEM User DB Authenticate Support

16 System Sequence diagram

17 System Sequence diagram

18 Problems Testing Testing Setting up the learning tool Setting up the learning tool Communication Communication

19 Drawbacks Internal state of the agent is abstract to the user Internal state of the agent is abstract to the user Application specific Agent development Application specific Agent development Agent Reusability Agent Reusability Slow Learning curve Slow Learning curve Require sufficient amount of time before they can be of any use Require sufficient amount of time before they can be of any use

20 Thank You.