Tuan Anh Pham

Learn More
STUDY OBJECTIVE We evaluate the frequency and accuracy of health care workers verifying patient identity before performing common tasks. METHODS The study included prospective, simulated patient scenarios with an eye-tracking device that showed where the health care workers looked. Simulations involved nurses administering an intravenous medication,(More)
BACKGROUND Increasing the number of dental hygienists and expanding their scope of practice are two policy directions that are currently being explored to increase the supply of dental services in the context of projected oral health workforce shortages in Australia. Understanding factors relating to the employment of hygienists and the attitudes of the(More)
BACKGROUND Increasing demand for dental services and a projected shortage in the oral health workforce in Victoria has focused attention on dental hygienists as one mechanism for increasing the supply of dental services. Understanding the dental hygienist workforce is essential in order to plan effectively for the future delivery of dental services in(More)
INTRODUCTION Improving patient identification (ID), by using two identifiers, is a Joint Commission safety goal. Appropriate identifiers include name, date of birth (DOB), or medical record number (MRN). OBJECTIVES The objectives were to determine the frequency of verifying patient ID during computerized provider order entry (CPOE). METHODS This was a(More)
Texture features extraction algorithms are key functions in various image processing applications such as medical images, remote sensing, and content-based image retrieval. The most common way to extract texture features is the use of Gray Level Co-occurrence Matrices (GLCMs). The GLCM contains the second-order statistical information of spatial(More)
— The emergence of RFID applications has huge influence to become pervasive in modern life. However the vulnerability of the transmission through the air and the unique identification number of RFID tag are the drawbacks that impact the popularity of RFID technology. In this paper, a mutual authentication protocol is proposed based on the challenge –(More)
In this paper, we propose principled weight learning algorithms for Markov logic networks that can easily scale to much larger datasets and application domains than existing algorithms. The main idea in our approach is to use approximate counting techniques to substantially reduce the complexity of the most computation intensive sub-step in weight learning:(More)
Business process modeling has become a popular method for improving organizational efficiency and quality. Automatic validation of process models is one of the most valuable features of modeling tools, in face of the increasing complexity of enterprise business processes and the richness of modeling languages. This paper proposes a formal language,(More)
Ubiquitous computing has been getting deployed into many applications in daily life. However, one of the difficulties to make it reliable is the lack of security. The constraints of area and power are the challenges for the cryptographic algorithms to be implemented. In this paper, the implementation of Advanced Encryption Standard (AES) encryption(More)
The early detection of flaws and errors has become a significant feature of a business process modeling tool. This paper proposes an ontology-based approach for business process compliance checking. The business processes and the business rules are represented in a machine understandable form, a reasoner is used to reason on this knowledge base for(More)