Page 10 of 76. Showing 757 results (0.015 seconds)
Text search in i2b2
. For the row of the fact table whose observation_blob field contains the text, perhaps a vist note or a radiology report, the letter "B" is placed in the ValueType … 1.6.02 The i2b2 metadata allows a text search of the observation_fact table. Two columns may be searched, the TVal_Char column, and the observation_blobOntology_Mapping_Data_Installation_Guide_v1-1.doc
be set to the same format as it would appear in your fact table. source_name source_name is the descriptive text value for the term we wish to map. It is what … Document Version:1.1.0i2b2 Software Version:1.7.01 Table of Contents TOC \o "1-4" \h \z \u HYPERLINK \l "_Toc393796795" Document1.7.09a Release Notes
Release Highlights</h2> <ul> <li>Querying multiple observation fact tables</li> <li>Support for the OMOP Common Data Model (CDM)</li … only allows for one fact table, the observation_fact table. We have heard from the community there is a need to be able to search multiple fact tables1.7.09 Release Notes
> <h2 id="rel1709Highlight">1.7.09 Release Highlights</h2> <ul> <li>Querying multiple observation fact tables</li> <li>Support … </h2> <p>The standard i2b2 star schema only allows for one fact table, the observation_fact table. We have heard from the community there is a need to be ablePDO Query Use Case Scenarios
. If the select option is "using_input_list" then the returned data will be based on the <input_list> and the fact table will not be used to return the data. If it is "using_filter_list" then return the data that satisfies the <filter_list> constraints when applied on the fact table. selectionfilter = "min_valueAUG2016_Herrick-Phillips.pdf
Set Matrix How the Remote Hive Returns Queries SUBQUERY CRC Already Extracted Features (i2b2 Fact Table) Extract Features As Needed Pa Pb Pc How the Central6.6.4 Project User Roles
of an encrypted field is the blob fields in the fact and dimension tables. DATA_PROT PROT = Protected The user can see all data, including … the user has in a project. The following tables summarize the roles in a hierarchical order of least to most access. Data Protection Roles RoleUser Roles
see all fields except for those that are encrypted. An example of an encrypted field is the blob fields in the fact and dimension tables … fields in the fact and dimension tables. DATA_PROT PROT = Protected The user can see all data, including the identified data that residesUser Role
of an encrypted field is the blob fields in the fact and dimension tables. DATA_PROT PROT = Protected The user can see all data, including … . The following tables summarize the roles in a hierarchical order of least to most access. Data Protection Track Role AccessRoles
all fields except for those that are encrypted. An example of an encrypted field is the blob fields in the fact and dimension tables. DATA_DEID … fields in the fact and dimension tables. DATA_PROT PROT = Protected The user can see all data, including the identified data that resides