You are previewing Methods, Models, and Computation for Medical Informatics.
O'Reilly logo
Methods, Models, and Computation for Medical Informatics

Book Description

Regular developments in technology continue to influence the medical and healthcare fields as they interact with information and computer sciences by methods of acquisition and the storage and retrieval of information. Methods, Models, and Computation for Medical Informatics is a comprehensive collection of research on computational capabilities, prototypes, and algorithms, as well as application in the areas of nursing, clinical care, public health, biomedical research, and much more. This book provides a better understanding of the models and methods used in the field of medicine for researchers, practitioners, and medical professionals alike.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Associate Editors
    2. List of Reviewers
  5. Preface
    1. PRIVACY IN ELECTRONIC MEDICAL RECORDS
    2. DE-IDENTIFYING MEDICAL TEXT
    3. PRIVACY IN EMRS
    4. ANALYZING ELECTRONIC MEDICAL RECORDS
  6. Chapter 1: Relevance of Mesh Dimension Optimization, Geometry Simplification and Discretization Accuracy in the Study of Mechanical Behaviour of Bare Metal Stents
    1. ABSTRACT
    2. INTRODUCTION
    3. PROBLEM DESCRIPTION
    4. MATERIALS AND METHODS
    5. RESULTS AND DISCUSSION
    6. LIMITATIONS, USEFULNESS AND FURTHER DEVELOPMENT OF THE STUDY
    7. CONCLUSION
  7. Chapter 2: A Framework for Multidimensional Real-Time Data Analysis
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. FRAMEWORK DESIGN
    5. CASE STUDY
    6. RESULTS
    7. CONCLUSION
  8. Chapter 3: Subspace Discovery for Disease Management
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. APPROACH
    5. EXPERIMENTAL RESULTS
    6. CONCLUSION AND FUTURE WORK
  9. Chapter 4: Similarity Searching of Medical Image Data in Distributed Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. BACKGROUND
    5. METHODOLOGY
    6. EXPERIMENTAL RESULTS
    7. DISCUSSION AND FUTURE WORK
    8. CONCLUSION
  10. Chapter 5: Identifying Temporal Changes and Topics that Promote Growth Within Online Communities
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. METHODOLOGY
    5. 4. RESULTS
    6. 5. DISCUSSION
    7. 6. CONCLUSION
  11. Chapter 6: The Role of Information and Computer Technology for Children with Autism Spectrum Disorder and the Facial Expression Wonderland (FEW)
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUNDS AND RELATED WORK
    4. INFLUENCE OF ICT ON CHILDREN WITH ASD
    5. ICT DESIGNED SPECIFICALLY FOR CHILDREN WITH ASD
    6. A PROTOTYPE ICT DESIGN FOR CHILDREN WITH ASD – FACIAL EXPRESSION WONDERLAND (FEW)
    7. DISCUSSION AND FUTURE WORK
  12. Chapter 7: Information Therapy (Ix) Service and Patients' Preference
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. OBJECTIVES
    4. 3. METHODS
    5. 4. FINDINGS
    6. 5. DISCUSSION
    7. 6. CONCLUSION
  13. Chapter 8: Bring Out Your Data
    1. ABSTRACT
    2. INTRODUCTION
    3. METHODOLOGY
    4. RESULTS
    5. DISCUSSION
    6. CONCLUSION
  14. Chapter 9: Portable Devices to Detect Directed Energy
    1. ABSTRACT
    2. INTRODUCTION
    3. METHODS
    4. RESULTS
    5. CONCLUSION
  15. Chapter 10: Developing the Performance of Tiling Arrays
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PRIOR WORKS
    4. 3. SUGGESTED APPROACH FOR FINDING SHORTEST PATH TO OLIGONUCLEOTIDES
    5. 4. ANALYSIS OF ALGORITHMS: APPLICATIONS AND RESULTS
    6. 5. CONCLUSION
  16. Chapter 11: Scalability of Piecewise Synonym Identification in Integration of SNOMED into the UMLS
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DISCUSSION
    5. CONCLUSION
  17. Chapter 12: Understanding Weight Change Behaviors through Online Social Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. FATSECRET SERVICE
    5. DATASET COLLECTION
    6. DATA CHARACTERISTICS
    7. CORRELATED ANALYSIS
    8. DISCUSSION
    9. CONCLUSION
  18. Chapter 13: Social Credential-Based Role Recommendation and Patient Privacy Control in Medical Emergency
    1. ABSTRACT
    2. INTRODUCTION
    3. PATIENT-CONTROLLED PRIVACY FRAMEWORK
    4. SITUATION ROLE-BASED PRIVACY CONTROL MODEL
    5. SITUATION VERIFICATION
    6. DYNAMIC CREDENTIALS DISCOVERY FOR SITUATION ROLE RECOMMENDATION
    7. PROTOTYPE: SITUATION ROLE DISCOVERY AND PRIVACY PROTECTION IN MEDICAL EMERGENCY
    8. EXPERIMENTS
    9. RELATED WORK
    10. CONCLUSION AND FUTURE WORK
  19. Chapter 14: Privacy Preserving Principal Component Analysis Clustering for Distributed Heterogeneous Gene Expression Datasets
    1. ABSTRACT
    2. INTRODUCTION
    3. METHODOLOGIES: R-PCA AND C-PCA
    4. EXPERIMENTS AND RESULTS
    5. CONCLUSION AND DISCUSSION
  20. Chapter 15: An Early Robot Architecture for Cancer Healing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. PROPOSED CANCER NANOROBOT (CANBOT)
    5. 4. VERIFICATION OF PROPOSED ALGORITHMS
    6. 5. CANBOT TUMOR INTERSECTION SIMULATION AND RESULTS
    7. 6. CONCLUSION AND FUTURE WORK
    8. APPENDIX
  21. Compilation of References
  22. About the Contributors