• Title/Summary/Keyword: medical information standard

Search Result 614, Processing Time 0.027 seconds

Characteristics of Health Masks Certified by the Ministry of Food and Drug Safety (식품의약품안전처에서 허가된 보건용 마스크의 특성 분석)

  • Ham, Seunghon;Choi, Won-Jun;Lee, Wanhyung;Kang, Seong-Kyu
    • Journal of Environmental Health Sciences
    • /
    • v.45 no.2
    • /
    • pp.134-141
    • /
    • 2019
  • Objectives: The study aimed to investigate the characteristics of health masks and to suggest the proper selection and use of protecting the respiratory system from particulate matters. Methods: The National Standard of masks promulgated by the Ministry of Food and Drug Safety (MFDS) and the Ministry of Employment and Labor (MOEL) were reviewed. The raw data of certified health masks were obtained from the MFDS database. Descriptive statistical analysis was performed. Results: Overall, 543 masks were certified by MFDS as of March 2019. Numbers of certified masks as KF80 (Korea Filter), KF94 and KF99 were 257 (47.3%), 281 (51.8%), and 5 (0.9%), respectively. Names of health masks, which were yellow sand, communicable diseases, health or its combination, were diverse that made customers be confused in selection. Health masks were also classified by particulate size, however, detailed information was not available. Conclusions: We investigated the status of health mask certification in Korea. Appropriate information on KF grade of health masks is required for customers to use them properly. MFDS should update the certification system of health masks periodically.

Positive Research of Client-Server Interlock System for m-PACS Rehalibitated Service in Wire less Mobile Environment (무선이동환경에서 m-PACS 재활지원 서비스를 위한 클라이언트-서버 연동시스템의 실증적연구)

  • Kim, Whi-Young;Choe, Jin-Yeong;Park, Seong-Jun;Kim, Jin-Yeong;Park, Seong-Jun;Kim, Hui-Je
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.2169-2170
    • /
    • 2006
  • J2ME service technology has advantage that can embody independent and, more soft system in DICOM 3.0 and medicine reflex administration server, client's OS that is medical treatment reflex standard in radio Internet. Also, intranet that do web basedspread, and develop by system that can alternate existent client-server structure rapidly. Specially, posibility of improvement is much because is connecting being limited in internet environment that medical equipment and information system of various kinds of machine are wire in medical institution and so on. Because do medical treatment reflex transmission module development applying DICOM technology and filtering techniques of "m-PACS Rehalibitated " in this research, existence, by interlock in radio usable Mobile reflex conversion system design and embody. That is, patient's information which is stored to various systems to be transmited and can give big help in medical examination and treatment to reflex client without being wooed doctor's interpretation result and so on in place through environment to be radish tentacle bar see

  • PDF

Various Image Compression using Medical Image and Analysis for Compression Ratio (의료영상을 이용한 다양한 압축방법의 구현 및 압축율 비교.분석)

  • 추은형;김현규;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.185-188
    • /
    • 2002
  • With improved network system and development of computer technology, a lot of hospitals are equipping PACS that deals with process and transmission of the medical images. Owing to equipment of PACS the problems on transmission and storage of the medical images were treated. The way to solve the problems is to use various image processing techniques and compression methods This paper describes RLC in lossless image compression method, JPEG using DCT in loss image compression applied to medical images as way implementing DICOM standard. Now the medical images were compressed with Wavelet transform method have been taken advantage of image process. And compression rate of each compression methods was analyzed.

  • PDF

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

Quantitation of Hepatitis C Viral RNA Using Direct CRT-PCR

  • Park, Young-Suk;Lee, Kyung-Ok;Oh, Moon-Ju;Chai, Young-Gyu
    • BMB Reports
    • /
    • v.30 no.3
    • /
    • pp.234-236
    • /
    • 1997
  • Chronic hepatitis C virus (HCV) infection is associated with the rapid development of cirrhosis and hepatocellular carcinoma. It has been reported that the amount of HCV RNA may be correlated with the progression of hepatitis and may be a prognostic marker for treatment of HCV patients. The direct detection of HCV RNA by reverse transcription-polymerase chain reaction (RT-PCR) is widely used to determine the presence of circulating virions. The most relevant limit of this approach is the lack of quantitative information about the viral titer. In the present study, we developed the method for HCV quantitation using competitive reverse transcription (CRT)-PCR using the deleted HCV standard. The serially diluted standard was added in titrated amounts to the target HCV RNA. The mixture was then reverse transcribed and amplified in the same reaction tube. The methods were evaluated using over 110 HCV-PCR positive samples in Koreans. About 59% of the samples were judged to contain $10^{5}-10^{6}$ copies of HCV RNA in 1 ml of serum.

  • PDF

The Evaluation about the Information Fidelity in the External Image Information Input - Using DICOM Validation Tool - (외부영상정보 입력 시 DICOM정보 충실성에 대한 평가 - DICOM Validation Tool 이용 -)

  • Lee, Song-Woo;Lee, Ho-Yeon;Do, Ji-Hoon;Jang, Hye-Won
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.1
    • /
    • pp.33-38
    • /
    • 2011
  • Now a days, there's many change over for PACS among the most of hospital and it standard for DICOM 3.0. These kind of using of DICOM 3.0 improves increasing of medical imaging exchange and service for patient. However, there's some problems of compatibility caused during carry out CD and DVD from hospital. For this reason, this thesis analyzed patients image targeting those storages requested to hospitals in Seoul by using Validation Toolkit which is recommended from KFDA. The analyze type is like this. Make 100 data, total 500, each of MRI CT Plain x-ray Ultrasound PET-CT images and analyzed type of error occurred and loyalty of information. If express percentage of error occurred statistically, we can get a result as follows MRI 5%, Plain x-ray 11%, CT 18%, US 25%, PET-CT 30%. The reson why percentage of error occurred in PET-CT is because of imperfective support and we could notice that we weren't devoted to information. Even though, PET-CT showed highest percentage of error occurred, currently DICOM data improved a lot compare to past. Moreover, it should be devoted to rule of IHE TOOL or DICOM. In conclusion, we can help radiographer to analyze information of image by providing clues for solving primary problem and further more, each of PACS company or equipment company can enhance fidelity for following standard of image information through realizing the actual problem during transfer of image information.

  • PDF

The Implementation of Real-Time Vital Sign Information Transmission Monitoring System using TMO (TMO를 이용한 실시간 생체정보 전송 모니터링 시스템 구현)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.33-40
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems. It is able to apply to remote medical examination and treatment. Through the proper data exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.

  • PDF

FHIR EMR Research for SMART HOSPITAL (SMART Hospital을 위한 FHIR 적용 EMR 연구)

  • Lee, Jean-hyoung;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.336-337
    • /
    • 2016
  • FHIR is a protocol that enables easy data exchange from the time the event occurred in health care settings as a standard for next-generation message exchange of HL7. Create a meaningful message from the ECG and medical equipment, and express the messages generated by standardized FHIR message it will be used in various medical institutions to ensure delivery to EMR, such as hospital information systems can query the results via a smartphone.

  • PDF

The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database

  • Choi, Jeongseok;Kim, Jaekwon;Lee, Dong Kyun;Jang, Kwang Soo;Kim, Dai-Jin;Choi, In Young
    • Genomics & Informatics
    • /
    • v.14 no.1
    • /
    • pp.20-28
    • /
    • 2016
  • Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

Comparative Analysis of Vectorization Techniques in Electronic Medical Records Classification (의무 기록 문서 분류를 위한 자연어 처리에서 최적의 벡터화 방법에 대한 비교 분석)

  • Yoo, Sung Lim
    • Journal of Biomedical Engineering Research
    • /
    • v.43 no.2
    • /
    • pp.109-115
    • /
    • 2022
  • Purpose: Medical records classification using vectorization techniques plays an important role in natural language processing. The purpose of this study was to investigate proper vectorization techniques for electronic medical records classification. Material and methods: 403 electronic medical documents were extracted retrospectively and classified using the cosine similarity calculated by Scikit-learn (Python module for machine learning) in Jupyter Notebook. Vectors for medical documents were produced by three different vectorization techniques (TF-IDF, latent sematic analysis and Word2Vec) and the classification precisions for three vectorization techniques were evaluated. The Kruskal-Wallis test was used to determine if there was a significant difference among three vectorization techniques. Results: 403 medical documents were relevant to 41 different diseases and the average number of documents per diagnosis was 9.83 (standard deviation=3.46). The classification precisions for three vectorization techniques were 0.78 (TF-IDF), 0.87 (LSA) and 0.79 (Word2Vec). There was a statistically significant difference among three vectorization techniques. Conclusions: The results suggest that removing irrelevant information (LSA) is more efficient vectorization technique than modifying weights of vectorization models (TF-IDF, Word2Vec) for medical documents classification.