Introduction: Ophthalmology is a medical specialty which may benefit from using telemedicine and teleophthalmology services. Such services are significantly important in the poor, remote, and impassable geographical areas, where there is no access to the ophthalmology services and ophthalmologists. This study aimed to design and implement a teleophthalmology system using the method of store-and-forward.
Methods: The study was conducted in 2015 and consisted of two main phases. The first phase was based requirement analysis, and in the second phase, after designing the prototype, an initial usability testing was undertaken in a teaching hospital. The participants of the study were 10 optometrists and 10 ophthalmologists (cornea specialists). For each phase of the research, a questionnaire was used to collect data, and the collected data were analyzed using descriptive statistics.
Results: In this study, users' requirements were initially investigated. Then, the teleophthalmology system was designed based on the literature review and the results derived from the requirements' analysis. Finally, usability testing showed that the users were relatively satisfied with the system.
Conclusion: According to the results, it can be concluded that the teleophthalmology technology can be used in the country by optometrists and ophthalmologists to improve eye health care services and to prevent the prevalence of curable eye diseases.
{"title":"Teleophthalmology in Practice: Lessons Learned from a Pilot Project.","authors":"Haleh Ayatollahi, Aynaz Nourani, Taleb Khodaveisi, Hossein Aghaei, Mehrdad Mohammadpour","doi":"10.2174/1874431101711010020","DOIUrl":"https://doi.org/10.2174/1874431101711010020","url":null,"abstract":"<p><strong>Introduction: </strong>Ophthalmology is a medical specialty which may benefit from using telemedicine and teleophthalmology services. Such services are significantly important in the poor, remote, and impassable geographical areas, where there is no access to the ophthalmology services and ophthalmologists. This study aimed to design and implement a teleophthalmology system using the method of store-and-forward.</p><p><strong>Methods: </strong>The study was conducted in 2015 and consisted of two main phases. The first phase was based requirement analysis, and in the second phase, after designing the prototype, an initial usability testing was undertaken in a teaching hospital. The participants of the study were 10 optometrists and 10 ophthalmologists (cornea specialists). For each phase of the research, a questionnaire was used to collect data, and the collected data were analyzed using descriptive statistics.</p><p><strong>Results: </strong>In this study, users' requirements were initially investigated. Then, the teleophthalmology system was designed based on the literature review and the results derived from the requirements' analysis. Finally, usability testing showed that the users were relatively satisfied with the system.</p><p><strong>Conclusion: </strong>According to the results, it can be concluded that the teleophthalmology technology can be used in the country by optometrists and ophthalmologists to improve eye health care services and to prevent the prevalence of curable eye diseases.</p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"11 ","pages":"20-28"},"PeriodicalIF":0.0,"publicationDate":"2017-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5633703/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35552966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-10eCollection Date: 2017-01-01DOI: 10.2174/1874431101711010029
Thomas Sanjay Weber-Spickschen, Christian Colcuc, Alexander Hanke, Jan-Dierk Clausen, Paul Abraham James, Hauke Horstmann
Purpose: The initial goals of rehabilitation after knee injuries and operations are to achieve full knee extension and to activate quadriceps muscle. In addition to regular physiotherapy, an android-based knee training device is designed to help patients achieve these goals and improve compliance in the early rehabilitation period. This knee training device combines fun in a computer game with muscular training or rehabilitation. Our aim was to test the feasibility and acceptability of this new device.
Methods: 50 volunteered subjects enrolled to test out the computer game aided device. The first game was the high-striker game, which recorded maximum knee extension power. The second game involved controlling quadriceps muscular power to simulate flying an aeroplane in order to record accuracy of muscle activation. The subjects evaluated this game by completing a simple questionnaire.
Results: No technical problem was encountered during the usage of this device. No subjects complained of any discomfort after using this device. Measurements including maximum knee extension power, knee muscle activation and control were recorded successfully. Subjects rated their experience with the device as either excellent or very good and agreed that the device can motivate and monitor the progress of knee rehabilitation training.
Conclusion: To the best of our knowledge, this is the first android-based tool available to fast track knee rehabilitation training. All subjects gave very positive feedback to this computer game aided knee device.
{"title":"Fun During Knee Rehabilitation: Feasibility and Acceptability Testing of a New Android-Based Training Device.","authors":"Thomas Sanjay Weber-Spickschen, Christian Colcuc, Alexander Hanke, Jan-Dierk Clausen, Paul Abraham James, Hauke Horstmann","doi":"10.2174/1874431101711010029","DOIUrl":"https://doi.org/10.2174/1874431101711010029","url":null,"abstract":"<p><strong>Purpose: </strong>The initial goals of rehabilitation after knee injuries and operations are to achieve full knee extension and to activate quadriceps muscle. In addition to regular physiotherapy, an android-based knee training device is designed to help patients achieve these goals and improve compliance in the early rehabilitation period. This knee training device combines fun in a computer game with muscular training or rehabilitation. Our aim was to test the feasibility and acceptability of this new device.</p><p><strong>Methods: </strong>50 volunteered subjects enrolled to test out the computer game aided device. The first game was the high-striker game, which recorded maximum knee extension power. The second game involved controlling quadriceps muscular power to simulate flying an aeroplane in order to record accuracy of muscle activation. The subjects evaluated this game by completing a simple questionnaire.</p><p><strong>Results: </strong>No technical problem was encountered during the usage of this device. No subjects complained of any discomfort after using this device. Measurements including maximum knee extension power, knee muscle activation and control were recorded successfully. Subjects rated their experience with the device as either excellent or very good and agreed that the device can motivate and monitor the progress of knee rehabilitation training.</p><p><strong>Conclusion: </strong>To the best of our knowledge, this is the first android-based tool available to fast track knee rehabilitation training. All subjects gave very positive feedback to this computer game aided knee device.</p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"11 ","pages":"29-36"},"PeriodicalIF":0.0,"publicationDate":"2017-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2174/1874431101711010029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35553931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28eCollection Date: 2017-01-01DOI: 10.2174/1874431101711010012
Gaurav R Parikh, Elvis Peter, Nikolaos Kakouros
Objective: Invasive coronary angiography remains the cornerstone for evaluation of coronary stenoses despite there being a poor correlation between luminal loss assessment by coronary luminography and myocardial ischemia. This is especially true for coronary lesions deemed moderate by visual assessment. Coronary pressure-derived fractional flow reserve (FFR) has emerged as the gold standard for the evaluation of hemodynamic significance of coronary artery stenosis, which is cost effective and leads to improved patient outcomes. There are, however, several limitations to the use of FFR including the evaluation of serial stenoses.
Method: In this article, we discuss the electronic-hydraulic analogy and the utility of simple electrical modelling to mimic the coronary circulation and coronary stenoses. We exemplify the effect of tandem coronary lesions on the FFR by modelling of a patient with sequential disease segments and complex anatomy.
Results: We believe that such computational modelling can serve as a powerful educational tool to help clinicians better understand the complexity of coronary hemodynamics and improve patient care.
{"title":"Complex Coronary Hemodynamics - Simple Analog Modelling as an Educational Tool.","authors":"Gaurav R Parikh, Elvis Peter, Nikolaos Kakouros","doi":"10.2174/1874431101711010012","DOIUrl":"https://doi.org/10.2174/1874431101711010012","url":null,"abstract":"<p><strong>Objective: </strong>Invasive coronary angiography remains the cornerstone for evaluation of coronary stenoses despite there being a poor correlation between luminal loss assessment by coronary luminography and myocardial ischemia. This is especially true for coronary lesions deemed moderate by visual assessment. Coronary pressure-derived fractional flow reserve (FFR) has emerged as the gold standard for the evaluation of hemodynamic significance of coronary artery stenosis, which is cost effective and leads to improved patient outcomes. There are, however, several limitations to the use of FFR including the evaluation of serial stenoses.</p><p><strong>Method: </strong>In this article, we discuss the electronic-hydraulic analogy and the utility of simple electrical modelling to mimic the coronary circulation and coronary stenoses. We exemplify the effect of tandem coronary lesions on the FFR by modelling of a patient with sequential disease segments and complex anatomy.</p><p><strong>Results: </strong>We believe that such computational modelling can serve as a powerful educational tool to help clinicians better understand the complexity of coronary hemodynamics and improve patient care.</p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"11 ","pages":"12-19"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5585460/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35531462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-14eCollection Date: 2017-01-01DOI: 10.2174/1874431101711010001
Azizeh K Sowan, Ana G Vera, Elma I Fonseca, Charles C Reed, Albert F Tarriela, Andrea E Berndt
Background: Studies on nurse competence on alarm management are a few and tend to be focused on limited skills. In response to Phase II of implementing the National Patient Safety Goal on clinical alarm systems safety, this study assessed nurses' perceived competence on physiologic monitors use in intensive care units (ICUs) and developed and validated a tool for this purpose.
Methods: This descriptive study took place in a Magnet hospital in a Southwestern state of the U.S. A Nurse Competence on Philips Physiologic Monitors Use Survey was created and went through validation by 13 expert ICU nurses. The survey included 5 subscales with 59 rated items and two open-ended questions. Items on the first 4 subscales reflect most common tasks nurses perform using physiologic monitors. Items on the fifth subscale (advanced functions) reflect rarely used skills and were included to understand the scope of utilizing advanced physiologic monitors' features. Thirty nurses from 4 adult ICUs were invited to respond to the survey.
Results: Thirty nurses (100%) responded to the survey. The majority of nurses were from Neuro (47%) and Surgical Trauma (37%) ICUs. The data supported the high reliability and construct validity of the survey. At least one (3%) to 8 nurses (27%) reported lack of confidence on each item on the survey. On the first four subscales, 3% - 40% of the nurses reported they had never heard of or used 27 features/functions on the monitors. No relationships were found between subscales' scores and demographic characteristics (p > .05). Nurses asked for training on navigating the central-station monitor and troubleshooting alarms, and the use of unit-specific super users to tailor training to users' needs.
Conclusion: This is the first study to create and test a list of competencies for physiologic monitors use. Rigorous, periodic and individualized training is essential for safe and appropriate use of physiologic monitors and to decrease alarm fatigue. Training should be comprehensive to include all necessary skills and should not assume proficiency on basic skills. Special attention should be focused on managing technical alarms. Increasing the number of super users is a recommended strategy for individualized and unit-specific training. There is a need for a usability testing of complex IT-equipped medical devices, such as physiologic monitors, for effective, efficient and safe navigation of the monitors.
{"title":"Nurse Competence on Physiologic Monitors Use: Toward Eliminating Alarm Fatigue in Intensive Care Units.","authors":"Azizeh K Sowan, Ana G Vera, Elma I Fonseca, Charles C Reed, Albert F Tarriela, Andrea E Berndt","doi":"10.2174/1874431101711010001","DOIUrl":"10.2174/1874431101711010001","url":null,"abstract":"<p><strong>Background: </strong>Studies on nurse competence on alarm management are a few and tend to be focused on limited skills. In response to Phase II of implementing the National Patient Safety Goal on clinical alarm systems safety, this study assessed nurses' perceived competence on physiologic monitors use in intensive care units (ICUs) and developed and validated a tool for this purpose.</p><p><strong>Methods: </strong>This descriptive study took place in a Magnet hospital in a Southwestern state of the U.S. A Nurse Competence on Philips Physiologic Monitors Use Survey was created and went through validation by 13 expert ICU nurses. The survey included 5 subscales with 59 rated items and two open-ended questions. Items on the first 4 subscales reflect most common tasks nurses perform using physiologic monitors. Items on the fifth subscale (advanced functions) reflect rarely used skills and were included to understand the scope of utilizing advanced physiologic monitors' features. Thirty nurses from 4 adult ICUs were invited to respond to the survey.</p><p><strong>Results: </strong>Thirty nurses (100%) responded to the survey. The majority of nurses were from Neuro (47%) and Surgical Trauma (37%) ICUs. The data supported the high reliability and construct validity of the survey. At least one (3%) to 8 nurses (27%) reported lack of confidence on each item on the survey. On the first four subscales, 3% - 40% of the nurses reported they had never heard of or used 27 features/functions on the monitors. No relationships were found between subscales' scores and demographic characteristics (<i>p</i> > .05). Nurses asked for training on navigating the central-station monitor and troubleshooting alarms, and the use of unit-specific super users to tailor training to users' needs.</p><p><strong>Conclusion: </strong>This is the first study to create and test a list of competencies for physiologic monitors use. Rigorous, periodic and individualized training is essential for safe and appropriate use of physiologic monitors and to decrease alarm fatigue. Training should be comprehensive to include all necessary skills and should not assume proficiency on basic skills. Special attention should be focused on managing technical alarms. Increasing the number of super users is a recommended strategy for individualized and unit-specific training. There is a need for a usability testing of complex IT-equipped medical devices, such as physiologic monitors, for effective, efficient and safe navigation of the monitors.</p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"11 ","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2017-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5420192/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35049945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-28DOI: 10.2174/1874431101610010004
H. Moghaddasi, S. Sajjadi, Mehran Kamkarhaghighi
Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
{"title":"Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model","authors":"H. Moghaddasi, S. Sajjadi, Mehran Kamkarhaghighi","doi":"10.2174/1874431101610010004","DOIUrl":"https://doi.org/10.2174/1874431101610010004","url":null,"abstract":"Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"175 1","pages":"4 - 10"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74868922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-28DOI: 10.2174/1874431101610010011
M. Sokouti, A. Zakerolhosseini, B. Sokouti
Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services (i.e., confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images among physicians. The Goldreich Goldwasser Halevi (GGH) algorithm can be a good choice for encrypting medical images as both the algorithm and sensitive data are represented by numeric matrices. Additionally, the GGH algorithm does not increase the size of the image and hence, its complexity will remain as simple as O(n2). However, one of the disadvantages of using the GGH algorithm is the Chosen Cipher Text attack. In our strategy, this shortcoming of GGH algorithm has been taken in to consideration and has been improved by applying the padding (i.e., snail tour XORing), before the GGH encryption process. For evaluating their performances, three measurement criteria are considered including (i) Number of Pixels Change Rate (NPCR), (ii) Unified Average Changing Intensity (UACI), and (iii) Avalanche effect. The results on three different sizes of images showed that padding GGH approach has improved UACI, NPCR, and Avalanche by almost 100%, 35%, and 45%, respectively, in comparison to the standard GGH algorithm. Also, the outcomes will make the padding GGH resist against the cipher text, the chosen cipher text, and the statistical attacks. Furthermore, increasing the avalanche effect of more than 50% is a promising achievement in comparison to the increased complexities of the proposed method in terms of encryption and decryption processes.
{"title":"Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm","authors":"M. Sokouti, A. Zakerolhosseini, B. Sokouti","doi":"10.2174/1874431101610010011","DOIUrl":"https://doi.org/10.2174/1874431101610010011","url":null,"abstract":"Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services (i.e., confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images among physicians. The Goldreich Goldwasser Halevi (GGH) algorithm can be a good choice for encrypting medical images as both the algorithm and sensitive data are represented by numeric matrices. Additionally, the GGH algorithm does not increase the size of the image and hence, its complexity will remain as simple as O(n2). However, one of the disadvantages of using the GGH algorithm is the Chosen Cipher Text attack. In our strategy, this shortcoming of GGH algorithm has been taken in to consideration and has been improved by applying the padding (i.e., snail tour XORing), before the GGH encryption process. For evaluating their performances, three measurement criteria are considered including (i) Number of Pixels Change Rate (NPCR), (ii) Unified Average Changing Intensity (UACI), and (iii) Avalanche effect. The results on three different sizes of images showed that padding GGH approach has improved UACI, NPCR, and Avalanche by almost 100%, 35%, and 45%, respectively, in comparison to the standard GGH algorithm. Also, the outcomes will make the padding GGH resist against the cipher text, the chosen cipher text, and the statistical attacks. Furthermore, increasing the avalanche effect of more than 50% is a promising achievement in comparison to the increased complexities of the proposed method in terms of encryption and decryption processes.","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"11 11 1","pages":"11 - 22"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79771755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-23DOI: 10.2174/1874431101610010001
Anant M. Shenoy, Kate Baquis, G. Baquis
Providers are expressing a desire for more efficient ways to retrieve relevant clinical data from the Electronic Health Record. In an effort to improve our Electromyography and Nerve Conduction Study reports, we surveyed referring providers on the effects of having the IMPRESSION at the start of the report. Our survey respondents felt that using this format for an Electromyography and Nerve Conduction Study report significantly improved the quality of the report while saving them time and/or mouse clicks when interpreting the report. Electro diagnosticians might consider using this format for their Electromyography and Nerve Conduction Study reports to improve referring provider satisfaction.
{"title":"Turning Electromyography Reports Upside Down: A Pilot Study Surveying Referring Providers","authors":"Anant M. Shenoy, Kate Baquis, G. Baquis","doi":"10.2174/1874431101610010001","DOIUrl":"https://doi.org/10.2174/1874431101610010001","url":null,"abstract":"Providers are expressing a desire for more efficient ways to retrieve relevant clinical data from the Electronic Health Record. In an effort to improve our Electromyography and Nerve Conduction Study reports, we surveyed referring providers on the effects of having the IMPRESSION at the start of the report. Our survey respondents felt that using this format for an Electromyography and Nerve Conduction Study report significantly improved the quality of the report while saving them time and/or mouse clicks when interpreting the report. Electro diagnosticians might consider using this format for their Electromyography and Nerve Conduction Study reports to improve referring provider satisfaction.","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"137 ","pages":"1 - 3"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72547857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chromosomal translocations that results in formation and activation of fusion oncogenes are observed in numerous solid malignancies since years back. Expression of fusion kinases in these cancers drives the initiation & progression that ultimately leads to tumour development and thus comes out to be clinically imperative in terms of diagnosis and treatment of cancer. Nonetheless, molecular mechanisms beneath these translocations remained unexplored consequently limiting our knowledge of carcinogenesis and hence is the current field where further research is required. The issue of prime focus is the precision with which the chromosomes breaks and reunites within genome. Characterization of Genomic sequences located at Breakpoint region may direct us towards the thorough understanding of mechanism leading to chromosomal rearrangement. A unique computational multi-parametric analysis was performed for characterization of genomic sequence within and around breakpoint region. This study turns out to be novel as it reveals the occurrence of Segmental Duplications flanking the breakpoints of all translocation. Breakpoint Islands were also investigated for the presence of other intricate genomic architecture and various physico-chemical parameters. Our study particularly highlights the probable role of SDs and specific genomic features in precise chromosomal breakage. Additionally, it pinpoints the potential features that may be significant for double-strand breaks leading to chromosomal rearrangements.
{"title":"Characterization of chromosomal translocation breakpoint sequences in solid tumours: \"an in silico analysis\".","authors":"Aditi Daga, Afzal Ansari, Rakesh Rawal, Valentina Umrania","doi":"10.2174/1874431101509010001","DOIUrl":"https://doi.org/10.2174/1874431101509010001","url":null,"abstract":"<p><p>Chromosomal translocations that results in formation and activation of fusion oncogenes are observed in numerous solid malignancies since years back. Expression of fusion kinases in these cancers drives the initiation & progression that ultimately leads to tumour development and thus comes out to be clinically imperative in terms of diagnosis and treatment of cancer. Nonetheless, molecular mechanisms beneath these translocations remained unexplored consequently limiting our knowledge of carcinogenesis and hence is the current field where further research is required. The issue of prime focus is the precision with which the chromosomes breaks and reunites within genome. Characterization of Genomic sequences located at Breakpoint region may direct us towards the thorough understanding of mechanism leading to chromosomal rearrangement. A unique computational multi-parametric analysis was performed for characterization of genomic sequence within and around breakpoint region. This study turns out to be novel as it reveals the occurrence of Segmental Duplications flanking the breakpoints of all translocation. Breakpoint Islands were also investigated for the presence of other intricate genomic architecture and various physico-chemical parameters. Our study particularly highlights the probable role of SDs and specific genomic features in precise chromosomal breakage. Additionally, it pinpoints the potential features that may be significant for double-strand breaks leading to chromosomal rearrangements. </p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"9 ","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4421838/pdf/TOMINFOJ-9-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"33176897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-16eCollection Date: 2014-01-01DOI: 10.2174/1874431101408010020
Carlos Viana-Ferreira, Luís S Ribeiro, Carlos Costa
Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS.
{"title":"A framework for integration of heterogeneous medical imaging networks.","authors":"Carlos Viana-Ferreira, Luís S Ribeiro, Carlos Costa","doi":"10.2174/1874431101408010020","DOIUrl":"https://doi.org/10.2174/1874431101408010020","url":null,"abstract":"<p><p>Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS. </p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"8 ","pages":"20-32"},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ftp.ncbi.nlm.nih.gov/pub/pmc/oa_pdf/17/96/TOMINFOJ-8-20.PMC4181172.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32715492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-13eCollection Date: 2014-01-01DOI: 10.2174/1874431101408010001
Vicente Moret-Bonillo, Diego Alvarez-Estévez, Angel Fernández-Leal, Elena Hernández-Pereira
This work deals with the development of an intelligent approach for clinical decision making in the diagnosis of the Sleep Apnea/Hypopnea Syndrome, SAHS, from the analysis of respiratory signals and oxygen saturation in arterial blood, SaO2. In order to accomplish the task the proposed approach makes use of different artificial intelligence techniques and reasoning processes being able to deal with imprecise data. These reasoning processes are based on fuzzy logic and on temporal analysis of the information. The developed approach also takes into account the possibility of artifacts in the monitored signals. Detection and characterization of signal artifacts allows detection of false positives. Identification of relevant diagnostic patterns and temporal correlation of events is performed through the implementation of temporal constraints.
{"title":"Intelligent approach for analysis of respiratory signals and oxygen saturation in the sleep apnea/hypopnea syndrome.","authors":"Vicente Moret-Bonillo, Diego Alvarez-Estévez, Angel Fernández-Leal, Elena Hernández-Pereira","doi":"10.2174/1874431101408010001","DOIUrl":"https://doi.org/10.2174/1874431101408010001","url":null,"abstract":"<p><p>This work deals with the development of an intelligent approach for clinical decision making in the diagnosis of the Sleep Apnea/Hypopnea Syndrome, SAHS, from the analysis of respiratory signals and oxygen saturation in arterial blood, SaO2. In order to accomplish the task the proposed approach makes use of different artificial intelligence techniques and reasoning processes being able to deal with imprecise data. These reasoning processes are based on fuzzy logic and on temporal analysis of the information. The developed approach also takes into account the possibility of artifacts in the monitored signals. Detection and characterization of signal artifacts allows detection of false positives. Identification of relevant diagnostic patterns and temporal correlation of events is performed through the implementation of temporal constraints. </p>","PeriodicalId":88331,"journal":{"name":"The open medical informatics journal","volume":"8 ","pages":"1-19"},"PeriodicalIF":0.0,"publicationDate":"2014-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ftp.ncbi.nlm.nih.gov/pub/pmc/oa_pdf/7b/8f/TOMINFOJ-8-1.PMC4101190.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32513493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}