• Title/Summary/Keyword: Healthcare information systems

Search Result 477, Processing Time 0.028 seconds

CDISC Transformer: a metadata-based transformation tool for clinical trial and research data into CDISC standards

  • Park, Yu-Rang;Kim, Hye-Hyeon;Seo, Hwa-Jeong;Kim, Ju-Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1830-1840
    • /
    • 2011
  • CDISC (Clinical Data Interchanging Standards Consortium) standards are to support the acquisition, exchange, submission and archival of clinical trial and research data. SDTM (Study Data Tabulation Model) for Case Report Forms (CRFs) was recommended for U.S. Food and Drug Administration (FDA) regulatory submissions since 2004. Although the SDTM Implementation Guide gives a standardized and predefined collection of submission metadata 'domains' containing extensive variable collections, transforming CRFs to SDTM files for FDA submission is still a very hard and time-consuming task. For addressing this issue, we developed metadata based SDTM mapping rules. Using these mapping rules, we also developed a semi-automatic tool, named CDISC Transformer, for transforming clinical trial data to CDISC standard compliant data. The performance of CDISC Transformer with or without MDR support was evaluated using CDISC blank CRF as the 'gold standard'. Both MDR and user inquiry-supported transformation substantially improved the accuracy of our transformation rules. CDISC Transformer will greatly reduce the workloads and enhance standardized data entry and integration for clinical trial and research in various healthcare domains.

Comparison of Integrated Health and Welfare Service Provision Projects Centered on Medical Institutions (의료기관 중심 보건의료·복지 통합 서비스 제공 사업 비교)

  • Su-Jin Lee;Jong-Yeon Kim
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.2
    • /
    • pp.132-145
    • /
    • 2024
  • Objectives: This study compares cases of Dalgubeol Health Care Project, 301 Network Project, and 3 for 1 Project based on program logic models to derive measures for promoting integrated healthcare and welfare services centered around medical institutions. Methods: From January to December 2021, information on the implementation systems and performance of each institution was collected. Data sources included prior academic research, project reports, operational guidelines, official press releases, media articles, and written surveys from project managers. A program logic model analysis framework was applied, structuring the information based on four elements: situation, input, activity, and output. Results: All three projects aimed to address the fragmentation of health and welfare services and medical blind spots. Despite similar multidisciplinary team compositions, differences existed in specific fields, recruitment scale, and employment types. Variations in funding sources led to differences in community collaboration, support methods, and future directions. There were discrepancies in the number of beneficiaries and medical treatments, with different results observed when comparing the actual number of people to input manpower and project cost per beneficiary. Conclusions: To design an integrated health and welfare service provision system centered on medical institutions, securing a stable funding mechanism and establishing an appropriate target population and service delivery system are crucial. Additionally, installing a dedicated department within the medical institution to link activities across various sectors, rather than outsourcing, is necessary. Ensuring appropriate recruitment and stable employment systems is needed. A comprehensive provision system offering services from mild to severe cases through public-private cooperation is suggested.

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.

Wireless Three-Pad ECG System: Challenges, Design, and Evaluations

  • Cao, Huasong;Li, Haoming;Stocco, Leo;Leung, Victor C.M.
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.113-124
    • /
    • 2011
  • Electrocardiography (ECG) is a widely accepted approach for monitoring of cardiac activity and clinical diagnosis of heart diseases. Since cardiologists have been well-trained to accept 12-lead ECG information, a huge number of ECG systems are using such number of electrodes and placement configuration to facilitate fast interpretation. Our goal is to design a wireless ECG system which renders conventional 12-lead ECG information.We propose the three-pad ECG system (W3ECG). W3ECG furthers the pad design idea of the single-pad approach. Signals obtained from these three pads, plus their placement information, make it possible to synthesize conventional 12-lead ECG signals.We provide one example of pad placement and evaluate its performance by examining ECG data of four patients available from online database. Feasibility test of our selected pad placement positions show comparable results with respect to the EASI lead system. Experimental results also exhibit high correlations between synthesized and directly observed 12-lead signals (9 out of 12 cross-correlation coefficients higher than 0.75).

Explainable Machine Learning Based a Packed Red Blood Cell Transfusion Prediction and Evaluation for Major Internal Medical Condition

  • Lee, Seongbin;Lee, Seunghee;Chang, Duhyeuk;Song, Mi-Hwa;Kim, Jong-Yeup;Lee, Suehyun
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.302-310
    • /
    • 2022
  • Efficient use of limited blood products is becoming very important in terms of socioeconomic status and patient recovery. To predict the appropriateness of patient-specific transfusions for the intensive care unit (ICU) patients who require real-time monitoring, we evaluated a model to predict the possibility of transfusion dynamically by using the Medical Information Mart for Intensive Care III (MIMIC-III), an ICU admission record at Harvard Medical School. In this study, we developed an explainable machine learning to predict the possibility of red blood cell transfusion for major medical diseases in the ICU. Target disease groups that received packed red blood cell transfusions at high frequency were selected and 16,222 patients were finally extracted. The prediction model achieved an area under the ROC curve of 0.9070 and an F1-score of 0.8166 (LightGBM). To explain the performance of the machine learning model, feature importance analysis and a partial dependence plot were used. The results of our study can be used as basic data for recommendations related to the adequacy of blood transfusions and are expected to ultimately contribute to the recovery of patients and prevention of excessive consumption of blood products.

A Study on the Software Fault Modes and Effect Analysis for Software Safety Evaluation (소프트웨어 안전성 평가를 위한 소프트웨어 고장 유형과 영향 분석에 관한 연구)

  • Kim, Myong-Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.115-130
    • /
    • 2012
  • These days, most of safety-critical systems, which are systems those failures or malfunction may result in death or serious injury to people, or loss or severe damage to social systems, or environmental harm, are being built of embedded software or loaded controlling software systems on computers, electrical and electronic components or devices. There are a lot kind of fault analysis methods to evaluate safety of the safety-critical systems equipped computers, electrical and electronic components or devices with software. However, the only assessment method to evaluate software safety of a safety-critical system is not enough to analysis properly on account of the various types and characteristic of software systems by progress of information technology. Therefore, this paper proposes the integrated evaluation method and carries out a case study for the software safety of safety-critical system which embedded or loaded software sizes are small and control response times are not sensitive by use of two security analysis methods which are Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis (FMEA) for ubiquitous healthcare system.

A Coexistence Model in a Dynamic Platform with ICT-based Multi-Value Chains: focusing on Healthcare Service (ICT 기반 다중 가치사슬의 동적 플랫폼에서의 공존 모형: 의료서비스를 중심으로)

  • Lee, Hyun Jung;Chang, Yong Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.69-93
    • /
    • 2017
  • The development of ICT has leaded the diversification and changes of supplies and demands in markets. It also caused the creations of a variety of values which are differentiated from those in the existing market. Therefore, a new-type market is created, which can include multi-value chains which are from ICT-based created markets as well as the existing markets. We defined the platform as the new-type market. In the platform, the multi-value chains can be coexisted with multi-values. In true market, when a new-type value chain entered into an existing market, it is general that it can be conflicted with the existing value chain in the market. The conflicted problem among multi-value chains in a market is caused by the sharing of limited market resources like suppliers, consumers, services or products among the value chains. In other words, if there are multi-value chains in the platform, then it is possible to have conflictions, overlapping, creations or losses of values among the value chains. To solve the problem, we introduce coexistence factors to reduce the conflictions to reach market equilibrium in the platform. In the other hand, it is possible to lead the creations of differentiated values from the existing market and to augment the total market values in the platform. In the early era of ICT development, ICT was introduced for improvement of efficiency and effectiveness of the value chains in the existing market. However, according to the changed role of ICT from the supporter to the promotor of the market, ICT became to lead the variations of the value chains and creations of various values in the markets. For instance, Uber Taxi created a new value chain with ICT-based new-type service or products with new resources like new suppliers and consumers. When Uber and Traditional Taxi services are playing at the same time in Taxi service platform, it is possible to create values or make conflictions among values between the new and old value chains. In this research, like Uber and traditional taxi services, if there are conflictions among the multi-value chains, then it is necessary to minimize the conflictions in the platform for the coexistence of multi-value chains which can create the value-added values in the platform. So, it is important to predict and discuss the possible conflicted problems between new and old value chains. The confliction should be solved to reach market equilibrium with multi-value chains in the platform. That is, we discuss the possibility of the coexistence of multi-value chains in the platform which are comprised of a variety of suppliers and customers. To do this, especially we are focusing on the healthcare markets. Nowadays healthcare markets are popularized in global market as well as domestic. Therefore, there are a lot of and a variety of healthcare services like Traditional-, Tele-, or Intelligent- healthcare services and so on. It shows that there are multi-suppliers, -consumers and -services as components of each different value chain in the same platform. The platform can be shared by different values that are created or overlapped by confliction and loss of values in the value chains. In this research, as was said, we focused on the healthcare services to show if a platform can be shared by different value chains like traditional-, tele-healthcare and intelligent-healthcare services and products. Additionally, we try to show if it is possible to increase the value of each value chain as well as the total value of the platform. As the result, it is possible to increase of each value of each value chain as well as the total value in the platform. Finally, we propose a coexistence model to overcome such problems and showed the possibility of coexistence between the value chains through experimentation.

Deep Learning Algorithm and Prediction Model Associated with Data Transmission of User-Participating Wearable Devices (사용자 참여형 웨어러블 디바이스 데이터 전송 연계 및 딥러닝 대사증후군 예측 모델)

  • Lee, Hyunsik;Lee, Woongjae;Jeong, Taikyeong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.6
    • /
    • pp.33-45
    • /
    • 2020
  • This paper aims to look at the perspective that the latest cutting-edge technologies are predicting individual diseases in the actual medical environment in a situation where various types of wearable devices are rapidly increasing and used in the healthcare domain. Through the process of collecting, processing, and transmitting data by merging clinical data, genetic data, and life log data through a user-participating wearable device, it presents the process of connecting the learning model and the feedback model in the environment of the Deep Neural Network. In the case of the actual field that has undergone clinical trial procedures of medical IT occurring in such a high-tech medical field, the effect of a specific gene caused by metabolic syndrome on the disease is measured, and clinical information and life log data are merged to process different heterogeneous data. That is, it proves the objective suitability and certainty of the deep neural network of heterogeneous data, and through this, the performance evaluation according to the noise in the actual deep learning environment is performed. In the case of the automatic encoder, we proved that the accuracy and predicted value varying per 1,000 EPOCH are linearly changed several times with the increasing value of the variable.

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

IEEE 802.15.6 Under Saturation: Some Problems to Be Expected

  • Rashwand, Saeed;Misic, Jelena;Khazaei, Hamzeh
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.142-148
    • /
    • 2011
  • Because currently available wireless technologies are not appropriate for wireless body area networks (WBANs), the IEEE 802.15.6 standard was introduced by the IEEE 802.15.6 Task Group to satisfy all the requirements for a monitoring system that operates on, in, or around the human body. In this work, we develop an analytical model for evaluating the performance of an IEEE 802.15.6-based WBAN under saturation condition and a noisy channel. We employ a three-dimensional Markov chain to model the backoff procedure as specified in the standard. Probability generating functions (PGFs) are used to compute the performance descriptors of the network. The results obtained from the analytical model are validated by simulation results. Our results indicate that under saturation condition, the medium is accessed by the highest user priority nodes at the vast majority of time while the other nodes are starving.