Abstract:
This disclosure includes techniques for analyzing patient data. In one example, a method includes accessing, by a computer system, one or more databases comprising health information, with protected health information, for a plurality of patients, accessing, by the computer system, an analytical model, and receiving, by the computer system via a user interface, instructions to apply the analytical model to health information for each of the plurality of patients. The protected health information is isolated from the user interface to restrict access to the protected health information. The method further includes applying, by the computer system, the analytical model to health information for each of the plurality of patients, and storing a result of the analytical model to the one or more databases.
Abstract:
This disclosure includes techniques for analyzing patient data. In one example, a method includes accessing, by a computer system, one or more databases comprising health information, with protected health information, for a plurality of patients, accessing, by the computer system, an analytical model, and receiving, by the computer system via a user interface, instructions to apply the analytical model to health information for each of the plurality of patients. The protected health information is isolated from the user interface to restrict access to the protected health information. The method further includes applying, by the computer system, the analytical model to health information for each of the plurality of patients, and storing a result of the analytical model to the one or more databases.
Abstract:
At least some aspects of the present disclosure feature systems and methods for obfuscating data. The method includes the steps of receiving an input data stream including a sequence of n-grams, mapping at least some of the sequence of n-grams to corresponding dictionary terms using a dictionary, and disposing the corresponding tokens to an output data stream.
Abstract:
In one example, this disclosure describes a method of processing medical data via one or more computers. The method may comprise identifying a medical code within a medical record, and identifying whether the medical code is specified or unspecified. If the medical code is specified, editing may be avoided without generating any query for further input by a physician. If the medical code is unspecified, the method further includes determining whether a suppression code appears in the medical record. If a suppression code appears, editing may be avoided without generating any query for further input by the physician. However, if a suppression code does not appear, the method further includes searching for key terms in the medical record. If key terms are present in the medical record, a query may be generated for the physician for additional clarification.
Abstract:
At least some aspects of the present disclosure feature systems and methods for obfuscating data. The method includes the steps of: receiving or retrieve an input data stream comprising a sequence of n-grams; mapping at least some of the sequence of n-grams to corresponding tokens using an obfuscation table; disposing the corresponding tokens to an output data stream.
Abstract:
At least some aspects of the present disclosure direct to a system having one or more processors and memories for word filtering. The one or more memories are configured to store a plurality of documents; and store a domain dictionary. The one or more processors are configured to generate a set of tokens for each of the plurality of documents and separate the set of tokens into a subset of dictionary tokens and a subset of non-dictionary tokens using the domain dictionary; The one or more processors are further configured to filter the subset of non-dictionary tokens to produce a subset of filtered non-dictionary tokens, where each of the filtered non-dictionary tokens has an occurrence frequency greater than a predefined threshold.
Abstract:
This disclosure includes techniques for analyzing patient data. In one example, a method includes accessing, by a computer system, one or more databases comprising health information, with protected health information, for a plurality of patients, accessing, by the computer system, an analytical model, and receiving, by the computer system via a user interface, instructions to apply the analytical model to health information for each of the plurality of patients. The protected health information is isolated from the user interface to restrict access to the protected health information. The method further includes applying, by the computer system, the analytical model to health information for each of the plurality of patients, and storing a result of the analytical model to the one or more databases.
Abstract:
At least some aspects of the present disclosure feature systems and methods for obfuscating data. The method includes the steps of: receiving an input data stream comprising a sequence of n-grams; mapping at least some of the sequence of n-grams to corresponding dictionary terms using an dictionary; disposing the corresponding tokens to an output data stream.
Abstract:
This disclosure includes techniques for analyzing patient data. In one example, a method includes accessing, by a computer system, one or more databases comprising health information for a plurality of patients, wherein the health information includes protected health information, randomly selecting, by the computer system, a subset of the health information from the one or more databases, wherein the subset of the health information corresponds to a subset of the plurality of patients, removing, by the computer system, the protected health information from the subset of health information to produce a de-identified analytics subset of patient data suitable for analytical model construction and evaluation, and storing, by the computer system, the de-identified analytics subset of the patient data in the one or more databases.
Abstract:
This disclosure includes techniques for analyzing patient data. In one example, a method includes accessing, by a computer system, one or more databases comprising health information, with protected health information, for a plurality of patients, accessing, by the computer system, an analytical model, and receiving, by the computer system via a user interface, instructions to apply the analytical model to health information for each of the plurality of patients. The protected health information is isolated from the user interface to restrict access to the protected health information. The method further includes applying, by the computer system, the analytical model to health information for each of the plurality of patients, and storing a result of the analytical model to the one or more databases.