A Study on Tactics Used to Incorporate Medical Informatics and Automated Diagnostic Methods
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Drastic changes have taken place in medicine over the last century. Physicians were faced with the difficulty of making diagnoses with little information that are not sufficient, often resorting to exploratory surgery to confirmation of a disease condition. Disease diagnosis is an art than a science due to the complexity of disease, lack of detailed information that are indicative of the disease, and lack of sufficient data to apply these information to both diagnosis and treatment. Broad-based expansion of electronic health records (EHRs) will create large amount of data for efficient model development. However many obstacles remain in this field. Patient record content is not available sufficiently because of security problems and the lack of of EHR formats standardization. If de-identified medical records are available in large scale, it can provide a path for the development of disease models by removing privacy constraints. Once comprehensive disease models have been developed, that can help physicians in identifying possible diseases and also include parameters that were utilized along with their relative importance, automated analytic methods can be used to indicate the presence of specific diseases. Although the physician will always stay as the final expert, these methods can provide an expanded collection of information and provide analysis that is too complex for standard methods. This paper is a study by considering five papers that discussed about the methods used to analyze medical records and finally the development of a decision support system that helps physician in disease diagnosis.
Authors and Affiliations
Shruthy Vijayan, Arya T K
Anti Phishing approach using Visual Cryptography and Iris Recognition
Phishing is a form of online identity theft. Phishing webpages are forged webpages created by malicious people that aim to steal sensitive information such as online banking passwords and credit card informations. Th...
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...
Implementation Of Fast rate Power Allocation Utilizing Duality gap in OFDM Systems
In this letter, we propose a power allocation strategy for orthogonal frequency division multiplexing (OFDM) systems. To achieve the maximum capacity, the proposed power allocation strategy iteratively tunes the amoun...
Network Processing of PT-TOPK Queries Using Necessary Set Based Algorithm in WSN’s
A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports innetwork top-k query process over uncertain data in a distributed wireless sen...
http://www.ijrcct.org/index.php/ojs/article/download/1190/pdf
In recent years, cloud computing has been adopted by large sphere of public and private organizations due to its streamline processes, reduced capital, improved flexibility and accessibility, and resource sharing abi...