DOC PREVIEW
UConn CSE 3000 - Informatics and Information Engineering

This preview shows page 1-2-3-4-5-6-7-8-9-60-61-62-63-64-65-66-67-121-122-123-124-125-126-127-128-129 out of 129 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 129 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Informatics and Information EngineeringOverviewInformaticsWhat is Informatics?What is Biomedical Informatics (BMI)?What are Key BMI Focal Areas?What is Medical Informatics?What is Bionformatics?Where is Data/How is it Used?What are Major Informatics Challenges?Information EngineeringFrom American HeritageFrom Webster’s 9th CollegiateData vs. Information vs. KnowledgeData, Information, and Knowledge in BMISlide 16Slide 17Science and Engineering in BMIWhat is Information Engineering?Information Engineering is Motivated by:Info. Engrg. - Challenge for 21st CenturyHow is Information Engineered?Towards Information ConsistencyWhat's Available to Support IE?What are Key Questions?Information Usage and RepositoriesThe Role of a DatabaseDBMS ArchitectureANSI/SPARC - Three Schema ArchitectureHow are these Used for BMI?Data IndependencePhysical Data IndependenceSlide 33Logical Data IndependenceSlide 35Classic Information System DesignData vs. InformationProgramming Language Systems vs. DBSWhat is Today’s Impedance Mismatch?The Health Care Application - ClassesSlide 41Slide 42The Health Care Application - RelationshipsHow Does Mismatch Occur?Implications and ImpactWhat is one Possible Solution?Slide 47CDA Example - ContinuedSlide 49Slide 50Slide 51Slide 52Slide 53Slide 54Slide 55Information Sharing/Access: Potential PitfallsInformation Syntactic ConsiderationsInformation Semantics ConcernsSyntactic & Semantic ConsiderationsInformation Pragmatics ConsiderationsSlide 61Collaboration and SecurityCollaboration: Providers and ResearchersCollaboration: Providers and PatientsCollaboration: Among PatientsSecurity: General ConceptsKey Security IssuesWhat are Key Access Control Concepts?Available Security ApproachesMandatory Security MechanismRole Based Access Control (RBAC)Why is RBAC Needed?Discretionary Access ControlWhat is Role Delegation?Why is Role Delegation Important?Coalitions for Clinical/Translational ScienceEmergent Public Policy IssuesSlide 78Internet and the WebWWW: Three Market SegmentsInformation Delivery Problems on the NetExample Web ApplicationsSlide 83What is the Problem?What are Information Delivery Styles?Publish/SubscribeDesign Options for NodesResearch ChallengesInfosphereCurrent State-of-ArtInfosphere Scenario – for BMIHeterogeneity and AutonomySecurity and Data QualityLegacy Data ChallengePotential Value Added/Jumping on BandwagonData Warehousing and Data MiningData Warehousing and OLAPBuilding a Data WarehouseBMI – Partition/Excerpt Data WarehouseData Warehouse CharacteristicsThree Tier ArchitectureData Warehouse DesignWhat is a Multi-Dimensional Data Cube?Multi-Dimensional SchemasExample of Star SchemaExample of Star Schema for BMIA Second Example of Star Schema …and Corresponding Snowflake SchemaData Warehouse IssuesKnowledge DiscoverySteps in a KDD ProcessOLAP StrategiesOn-Line Analytical ProcessingSlide 114Examples of Data MiningSlide 116Slide 117Mining Other Types of DataAdvantages/Objectives of Data MiningData Mining Methods (1)Association RulesData Mining Methods (2)ClassificationAn ExampleData Mining Methods (3)Summarization TechniqueWhy is Data Mining Popular?Requirements & Challenges in Data MiningConcluding RemarksIIE-1CSE300Informatics and Information EngineeringInformatics and Information EngineeringProf. Steven A. Demurjian, Sr.Computer Science & Engineering DepartmentThe University of Connecticut371 Fairfield Road, Box U-255Storrs, CT [email protected]://www.engr.uconn.edu/~steve(860) 486 - 4818Copyright © 2008 by S. Demurjian, Storrs, CT. Portions of these slides are being used with the permission of Dr. Ling Lui, Associate Professor, College of Computing, Georgia Tech.IIE-2CSE300Overview Overview Informatics Informatics What is Informatics?What is Biomedical Informatics?What are Key Biomedical Informatics Challenges?Information EngineeringInformation EngineeringData vs. Information vs. KnowledgeWhat is Science? What is Engineering?What is Information Consistency?Information Usage and RepositoriesInformation Usage and RepositoriesHow do we Store and Utilize Information?Role of Web in InformaticsSharing, Collaboration, and SecurityDatabases vs. Data MiningIIE-3CSE300InformaticsInformaticsInformatics is:Informatics is:Management and Processing of DataFrom Multiple Sources/ContextsInvolves Classification (Ontologies), Collection, Storage, Analysis, DisseminationInformatics is Multi-DisciplinaryInformatics is Multi-DisciplinaryComputing (Model, Store, Process Information)Social Science (User Interactions, HCI)Statistics (Analysis)Informatics Can Apply to Multiple Domains:Informatics Can Apply to Multiple Domains:Business, Biology, Fine Arts, HumanitiesPharmacology, Nursing, Medicine, etc.IIE-4CSE300What is Informatics?What is Informatics?Heterogeneous Field – Heterogeneous Field – Interaction between Interaction between People, Information and People, Information and TechnologyTechnologyComputer Science and EngineeringSocial Science (Human Computer Interface)Information Science (Data Storage, Retrieval and Mining)PeopleInformationTechnologyInformaticsAdapted from Shortcliff textbookIIE-5CSE300What is Biomedical Informatics (BMI)?What is Biomedical Informatics (BMI)?BMI is Information and its Usage Associated with the BMI is Information and its Usage Associated with the Research and Practice of Medicine Including:Research and Practice of Medicine Including:Clinical Informatics for Patient CareMedical Record + Personal Health RecordBioinformatics for Research/Biology to BedsideFrom Genomics To ProteomicsPublic Health Informatics (State and Federal)Tracking Trends in Public SectorClinical Research Informatics Deidentified Repositories and Databases Facilitate Epidemiological Research and Ongong Clinical Studies (Drug Trails, Data Analysis, etc.)IIE-6CSE300What are Key BMI Focal Areas?What are Key BMI Focal Areas?T1 Research T1 Research Transition Bench Results into  Clinical Research Clinical ResearchClinical ResearchApplying Clinical Research Results via Trials with Patients on Medication, Devices, Treatment PlansT2 Research T2 Research Translating “Successful” Clinical Trials into Practice and the CommunityClinical Practice Clinical Practice Tracking all of the Information Associated with a Patient and his/her CareIntegrated and Inter-Disciplinary Information Integrated and


View Full Document

UConn CSE 3000 - Informatics and Information Engineering

Download Informatics and Information Engineering
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Informatics and Information Engineering and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Informatics and Information Engineering 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?