Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 2 de 2
Filter
Add more filters










Publication year range
1.
Annu Int Conf IEEE Eng Med Biol Soc ; 2016: 2974-2977, 2016 Aug.
Article in English | MEDLINE | ID: mdl-28268937

ABSTRACT

As a leading cause of severe disability and death, stroke places an enormous burden on Chinese society. A nationwide stroke screening platform called CSDC (China Stoke Data Center) has been built to support the national stroke prevention program and stroke clinical research since 2011. This platform is composed of a data integration system and a big data analysis system. The data integration system is used to collect information on risk factors, diagnosis history, treatment, and sociodemographic characteristics and stroke patients' EMR. The big data analysis system support decision making of stroke control and prevention, clinical evaluation and research. In this paper, the design and implementation of CSDC are illustrated, and some application results are presented. This platform is expected to provide rich data and powerful tool support for stroke control and prevention in China.


Subject(s)
Information Systems , Mass Screening , Stroke/epidemiology , Stroke/prevention & control , Adult , Aged , Asian People , China/epidemiology , Data Collection , Electronic Health Records , Female , Geography , Health Care Costs , Hospitalization/economics , Hospitals/statistics & numerical data , Humans , Male , Middle Aged , Prevalence , Public Health , Risk Factors , Stroke/economics
2.
Article in Chinese | WPRIM (Western Pacific) | ID: wpr-480647

ABSTRACT

The information security and privacy protection of electronic health records (HER) are greatly con-cerned by healthcare administrators, healthcare providers and patients in the era of big data and cloud computing. The concepts of information security and privacy protection of HER wre defined according to the systematic investi-gation of related literature, the keys to the information security and privacy protection of HER were summarized, and the advances in research on information security and privacy protection of HER were described.

SELECTION OF CITATIONS
SEARCH DETAIL
...