0 The Facts Don’t Speak For Themselves: AHRQ 2007 HS Kaplan R Levitan B Rabin Fastman CUMC/NYPH Getting the Story from Aggregate Data AHRQ 2007.

Slides:



Advertisements
Similar presentations
Causal Data Mining Richard Scheines Dept. of Philosophy, Machine Learning, & Human-Computer Interaction Carnegie Mellon.
Advertisements

New Technologies Supporting Technical Intelligence Anthony Trippe, 221 st ACS National Meeting.
Use of crime and criminal justice statistics at the national and international level Steven Malby Research Officer Statistics and Surveys Section.
Chapter 9 Business Intelligence Systems
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Advanced Topics COMP163: Database Management Systems University of the Pacific December 9, 2008.
Data Mining.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
1 Data & Database Development. 2 Data File Bit Byte Field Record File Database Entity Attribute Key field Key file management concepts include:
1 CS 430 / INFO 430 Information Retrieval Lecture 24 Usability 2.
L The Difference Between Logical and Physical Views of Information l Databases and Database Management Systems l How You Can Develop Database Applications.
Information retrieval Finding relevant data using irrelevant keys Example: database of photographic images sorted by number, date. DBMS: Well structured.
Instance Based Learning Bob Durrant School of Computer Science University of Birmingham (Slides: Dr Ata Kabán) 1.
Recommender systems Ram Akella November 26 th 2008.
Chapter 2-Safety Analysis A Statistical Approach.
Building Knowledge-Driven DSS and Mining Data
BUSINESS DRIVEN TECHNOLOGY
University of Kansas The Intelligent Systems & Information Management Laboratory Costas Tsatsoulis, Director.
Neural Technology and Fuzzy Systems in Network Security Project Progress Group 2: Omar Ehtisham Anwar Aneela Laeeq
I NFORMATION AND T ELECOMMUNICATION T ECHNOLOGY C ENTER Data Mining of Blood Handling Incident Databases Costas Tsatsoulis Information and Telecommunication.
Data Mining – Intro.
12 -1 Lecture 12 User Modeling Topics –Basics –Example User Model –Construction of User Models –Updating of User Models –Applications.
A Web-based Intelligent Hybrid System for Fault Diagnosis Gunjan Jha Research Student Nanyang Technological University Singapore.
DASHBOARDS Dashboard provides the managers with exactly the information they need in the correct format at the correct time. BI systems are the foundation.
Center for Quality Improvement and Patient Safety Agency for Healthcare Research and Quality Presented to the ONC HIT Policy Committee – Safety Task Force.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
What is Business Intelligence? Business intelligence (BI) –Range of applications, practices, and technologies for the extraction, translation, integration,
Data Mining Techniques
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Data Mining Chun-Hung Chou
Understanding Data Analytics and Data Mining Introduction.
Cyber-Infrastructure for Agro-Threats Steve Goddard Computer Science & Engineering University of Nebraska-Lincoln.
Database Management Systems. This lesson includes the following sections  Databases and Management Systems Working with a Database Enterprise Software.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
Copyright R. Weber Machine Learning, Data Mining ISYS370 Dr. R. Weber.
The Nature of Information Higher Administration ITFM Outcome 1.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
Using a Comprehensive Occupational Exposure Database to Integrate Members of the Occupational Health Team and Improve Your Occupational Health Program.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Storing Organizational Information - Databases
Data Warehousing.
Introduction to Computers Lesson 10B. home Database A collection of related data or facts.
Sampling Design and Analysis MTH 494 Ossam Chohan Assistant Professor CIIT Abbottabad.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
1 Topics about Data Warehouses What is a data warehouse? How does a data warehouse differ from a transaction processing database? What are the characteristics.
Data Triangulation Applications in Population and Health Programs- -The Global Experience.
Introduction to Enterprise Guide Jennifer Schmidt Rhonda Ellis Cassandra Hall.
IMS 4212: Database Security 1 Dr. Lawrence West, Management Dept., University of Central Florida Data & Database Administration Security.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Chapter 3 Databases and Data Warehouses: Building Business Intelligence Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Knowledge Learning by Using Case Based Reasoning (CBR)
SciVal Spotlight Training for KU Huiling Ng, SciVal Product Sales Manager (South East Asia) Cassandra Teo, Account Manager (South East Asia) June 2013.
DATA MINING WITH CLUSTERING AND CLASSIFICATION Spring 2007, SJSU Benjamin Lam.
Data Warehousing.
Copyright © 2001, SAS Institute Inc. All rights reserved. Data Mining Methods: Applications, Problems and Opportunities in the Public Sector John Stultz,
Data Resource Management Agenda What types of data are stored by organizations? How are different types of data stored? What are the potential problems.
Relaxing Queries Presented by Ashwin Joshi Kapil Patil Sapan Shah.
Lesson Overview Lesson Overview What Is Science?.
Eick: kNN kNN: A Non-parametric Classification and Prediction Technique Goals of this set of transparencies: 1.Introduce kNN---a popular non-parameric.
Biocomputational Languages December 1, 2011 Greg Antell & Khoa Nguyen.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
1 Data Warehousing Data Warehousing. 2 Objectives Definition of terms Definition of terms Reasons for information gap between information needs and availability.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
A Self-organizing Semantic Map for Information Retrieval Xia Lin, Dagobert Soergel, Gary Marchionini presented by Yi-Ting.
Chapter 14 – Association Rules and Collaborative Filtering © Galit Shmueli and Peter Bruce 2016 Data Mining for Business Analytics (3rd ed.) Shmueli, Bruce.
Associative Query Answering via Query Feature Similarity
Data Science in Industry
DATA MODELS.
Presentation transcript:

0 The Facts Don’t Speak For Themselves: AHRQ 2007 HS Kaplan R Levitan B Rabin Fastman CUMC/NYPH Getting the Story from Aggregate Data AHRQ 2007

1 Event Reports as Rumble Strips Both can help increase safety by revealing danger Neither is reliably quantitative Both may create some unwanted noise in the environment

2 Counting: A Means to an End

3 Steinbeck on Counting

4 Focus of Today’s Presentation Discuss real-time database queries using built-in tools: RAI: Risk Assessment Index “Single Click” Standard reports QBF: Query by Field Data Mining: Clustering, CBR, and HAWK – Constraint - Access: Permissions and roles

5 Access: Permissions and Roles User-based –Role within organization –Role within MERS system Overarching access rule set –Location –Service line/Department –Employee events/Patient complaints –Type: falls, meds, transfusion, equip, etc. –Read-only HIPAA

6 Filter no-harm reports to improve signal-to- noise ratio (SNR) Risk Assessment Index

7 Two Filters to Enhance SNR Impact Frequency Low High Medium

8 “Single Click” Standard Reports Ad-hoc reporting in real-time MERS has a comprehensive list of reports

9 “Single Click” Standard Reports

10 Medication Events by Specific Type

11 Query By Field (QBF): Exact field matches QBF’s filtered results can be fed into any report, graph, or spreadsheet

12 Generation of Graphics on data subset using QBF filter

13 Medication Drill-Down: Categories of Ordering Errors

14 Benchmark Against Total and Other Reporting Sites/Hospitals

15 Real-Time, Formatted Spreadsheets

16 User-Customized Spreadsheets

17 Mining Association Rules Decision Trees ID Clustering Statistical Clustering Data Mining CBR Similarity Matching Textual Numeric Semantic Neural Networks © 2007 by The Trustees of Columbia University in the City of New York. CBR

18 Why Cluster? Clusters show us event reports that are similar across predefined dimensions They may represent: –frequency of a type of event –event trends in time –potential prevention, etc © 2007 by The Trustees of Columbia University in the City of New York.

19 Case-Based Reasoning (CBR) What is case-based reasoning? Case-based reasoning is another methodology for, among other things, identifying clusters of similar events in large databases © 2007 by The Trustees of Columbia University in the City of New York.

20 Clustering/CBR Clustering divides large data sets into coherent subsets that can be studied more easily Given an event report, CBR will –go through all event reports in database –compute similarity between them –find all reports within a certain distance or similarity (defined by the user) These reports form a cluster © 2007 by The Trustees of Columbia University in the City of New York.

21 CBR and Similarity Matching Using CBR, the computer system can establish the closest matches to any target event It can cluster based on similarity It can also identify unique events © 2007 by The Trustees of Columbia University in the City of New York. CBR and Similarity Matching

22 HAWK MERS’ similarity function, HAWK, uses a vector of pre-assigned weights that corresponds to the vector of variables in an event report record. HAWK provides information that can be used to evaluate trends

23 CBR: Another Use CBR can be extended to provide solutions to problems based on past experiences in the database –e.g., a help desk

24 The Facts Don’t Speak For Themselves: “Knowledge resides in the user and not in the collection.” C. West Churchman in The Design of Inquiring Systems