Professional Documents
Culture Documents
net/publication/314521940
CITATIONS READS
0 794
10 authors, including:
Yana Vaks
Loma Linda University
7 PUBLICATIONS 8 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by James P. Mcglothlin on 29 March 2017.
CITATIONS READS
0 1,387
4 authors, including:
Hugo Gamboa
New University of Lisbon
107 PUBLICATIONS 415 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
User Friendly Knowledge Acquisition System For Medical Devices Actuation View project
All content following this page was uploaded by Egon L. van den Broek on 28 February 2017.
PROCEEDINGS
Volume 5: HEALTHINF
Porto, Portugal
21-23 February, 2017
EDITORS
Egon L. van den Broek, Ana Fred, Hugo Gamboa and Mário Vaz
http://www.biostec.org
DigitAl LIBRARY
BIOSTEC 2017
Proceedings of the
10th International Joint Conference on
Biomedical Engineering Systems and Technologies
Volume 5: HEALTHINF
Porto - Portugal
Sponsored by
INSTICC - Institute for Systems and Technologies of Information, Control and Communication
In Cooperation with
ACM SIGKDD - ACM Special Interest Group on Knowledge Discovery and Data Mining
EUROMICRO
ISfTeH - International Society for Telemedicine & eHealth
AAAI - Association for the Advancement of Artificial Intelligence
ISCB - International Society for Computational Biology
BMES - Biomedical Engineering Society
Copyright
c 2017 by SCITEPRESS – Science and Technology Publications, Lda.
All rights reserved
Edited by Egon L. van den Broek, Ana Fred, Hugo Gamboa and Mário Vaz
Printed in Portugal
ISBN: 978-989-758-213-4
Depósito Legal: 421067/17
http://www.healthinf.biostec.org
healthinf.secretariat@insticc.org
B RIEF C ONTENTS
I NVITED S PEAKERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IV
O RGANIZING C OMMITTEES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . V
P ROGRAM C OMMITTEE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VI
F OREWORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XI
C ONTENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIII
III
I NVITED S PEAKERS
Bart M. ter Haar Romeny
Eindhoven University of Technology (TU/e)
Netherlands
Joyce Westerink
Philips Research and Eindhoven University of Technology (TU/e)
Netherlands
Kristina Höök
Royal Institute of Technology
Sweden
Bethany Bracken
Charles River Analytics Inc.
United States
IV
O RGANIZING C OMMITTEES
C ONFERENCE C O - CHAIRS
P ROGRAM C HAIR
A DVISORY B OARD
Joyce Westerink, Philips Research and Eindhoven University of Technology (TU/e), Netherlands
S ECRETARIAT
W EBMASTER
V
P ROGRAM C OMMITTEE
Anurag Agrawal, CSIR Institute of Genomics Emmanuel Conchon, University of Limoges,
and Integrative Biology, Center for Translational XLIM, France
Research in Asthma & Lung, India Carlos Costa, Universidade de Aveiro, Portugal
Hesham Ali, University of Nebraska at Omaha,
Andre Dekker, MAASTRO Clinick, Netherlands
United States
Chrysanne DiMarco, University of Waterloo,
Adil Alpkocak, Dokuz Eylul University, Turkey
Canada
Flora Amato, Università degli Studi di Napoli Liliana Dobrica, University Politehnica of
Federico II, Italy Bucharest, Romania
Francois Andry, Philips, United States Stephan Dreiseitl, Upper Austria University of
Wassim Ayadi, LERIA, University of Angers, Applied Sciences at Hagenberg, Austria
France and LaTICE, University of Tunis, Tunisia, José Fonseca, UNINOVA, Portugal
Tunisia
Daniel Ford, Dell Research, United States
Bert-Jan van Beijnum, University of Twente,
Netherlands Christoph M. Friedrich, University of Applied
Science and Arts Dortmund, Germany
Patrick Boissy, Faculty of Medicine and Health
Sciences, Université de Sherbrooke and Research Ioannis Fudos, University of Ioannina, Greece
Centre on Aging, Canada Henry Gabb, University of Illinois at
Sorana D. Bolboaca, Iuliu Hatieganu University of Urbana-Champaign, United States
Medicine and Pharmacy, Cluj-Napoca, Romania Hugo Gamboa, LIBPHYS-UNL / FCT - New
Alessio Bottrighi, Universita’ del Piemonte University of Lisbon, Portugal
Orientale, Italy Mauro Giacomini, University of Genoa, Italy
Andrew D. Boyd, University of Illinois at Chicago, Laura Giarré, Università degli Studi di Palermo,
United States Italy
Egon L. van den Broek, Utrecht University, Alejandro Rodríguez González, Centro de
Netherlands Tecnología Biomédica, Spain
Berry de Bruijn, National Research Council,
Yves Gourinat, ISAE-SUPAERO, France
Canada
Federico Cabitza, Università degli Studi di David Greenhalgh, University of Strathclyde,
Milano-Bicocca, Italy United Kingdom
Jorge Henriques, Universidade de Coimbra,
Eric Campo, LAAS CNRS, France
Portugal
Guillermo Lopez Campos, The University of
Dragan Jankovic, Faculty of Electronic
Melbourne, Australia
Engineering Nis, Serbia
Marc Cavazza, University of Kent,
Noreen Kamal, University of Calgary, Canada
United Kingdom
Enkelejda Kasneci, University of Tübingen,
Philip K. Chan, Florida Institute of Technology, Germany
United States
Finn Kensing, Professor of Computer Science,
Taridzo Chomutare, University Hospital of North
University of Copenhagen, Denmark, Denmark
Norway, Norway
Irena Koprinska, University of Sydney, Australia
Mihail Cocosila, Athabasca University, Canada
Miguel Coimbra, Instituto de Telecomunicações, Sofia Kyratzi, University of the Aegean, Greece
Faculdade de Ciências da Universidade do Porto, Elyes Lamine, University of Toulouse, CUFR J.F.
Portugal Champollion, France
VI
Gondy Leroy, University of Arizona, United States Elisabetta Ronchieri, INFN, Italy
Giuseppe Liotta, University of Perugia, Italy Senjuti Basu Roy, The University of Washington -
Tacoma, United States
Guillaume Lopez, Aoyama Gakuin University,
Japan Carolina Ruiz, WPI, United States
Martin Lopez-Nores, University of Vigo, Spain George Sakellaropoulos, University of Patras,
Greece
Alda Marques, University of Aveiro, Portugal
Ovidio Salvetti, National Research Council of Italy
Paloma Martínez, Universidad Carlos III de - CNR, Italy
Madrid, Spain
Akio Sashima, AIST, Japan
Ken Masters, Sultan Qaboos University, Oman
Jacob Scharcanski, UFRGS - Universidade
Sally Mcclean, University of Ulster, Federal do Rio Grande do Sul, Brazil
United Kingdom
Bettina Schnor, Potsdam University, Germany
Gerrit Meixner, Heilbronn University, Germany
Yuval Shahar, Ben Gurion University, Israel
Mohyuddin Mohyuddin, King Abdullah
International Medical Research Center (KAIMRC), Jan Sliwa, Bern University of Applied Sciences,
Saudi Arabia Switzerland
Christo El Morr, York University, Canada George Spyrou, The Cyprus Institute of Neurology
and Genetics, Cyprus
Hammadi Nait-Charif, Bournemouth University,
United Kingdom Jan Stage, Aalborg University, Denmark
Goran Nenadic, University of Manchester, Vicente Traver, ITACA, Universidad Politécnica
United Kingdom de Valencia, Spain
José Luis Oliveira, Universidade de Aveiro, Gary Ushaw, Newcastle University,
Portugal United Kingdom
Rui Pedro Paiva, University of Coimbra, Portugal Aristides Vagelatos, CTI, Greece
Guy Pare, HEC Montréal, Canada Sumithra Velupillai, KTH, Stockholm and King’s
College, London, Sweden
Vimla L. Patel, Arizona State University,
United States Sitalakshmi Venkatraman, Melbourne
Polytechnic, Australia
Sotiris Pavlopoulos, ICCS, Greece
Francisco Veredas, Universidad de Málaga, Spain
Göran Petersson, eHealth Institute, Dept of
Medicine and Optometry, Linnaeus University, Justin Wan, University of Waterloo, Canada
Sweden
Szymon Wilk, Institute of Computing Science,
Enrico Maria Piras, Fondazione Bruno Kessler - Poznan University of Technology, Poland
Trento, Italy
Janusz Wojtusiak, George Mason University,
Arkalgud Ramaprasad, University of Illinois at United States
Chicago, United States
Clement T. Yu, University of Illinois at Chicago,
Grzegorz Redlarski, Gdansk University of United States
Technology, Poland
Xuezhong Zhou, Beijing Jiaotong University,
Ita Richardson, University of Limerick, Ireland China
Valter Roesler, Federal University of Rio Grande André Zúquete, IEETA, IT, Universidade de
do Sul, Brazil Aveiro, Portugal
VII
AUXILIARY R EVIEWERS
Koundinya Desiraju, Institute of Genomics and Imen MEGDICHE, IRIT, France
Integrative Biology, Mall Road, Delhi, India, India
Sebastian Rauh, Heilbronn University, Germany
Angela Locoro, Università degli Studi di Kateryna Sergieieva, Heilbronn University of
Milano-Bicocca, Italy Applied Science, Germany
Xiao Dong, Southeast University, China Giovanna Sannino, ICAR (CNR), Italy
Stefano Silvestri, ICAR CNR, Italy
Ivanoe De Falco, ICAR - CNR, Italy
Jan Sliwa, Bern University of Applied Sciences,
Ardelio Galletti, Parthenope University of Naples, Switzerland
Italy
Laura Verde, University of Naples Parthenope,
Francesco Gargiulo, ICAR CNR, Italy Italy
Jennifer Caffarel, Philips Research, Netherlands Gert-Jan de Vries, Philips Research - Healthcare,
Netherlands
Sreejita Ghosh, University of Groningen,
Netherlands Thomas Wendler, Philips Research, Germany
Rick van Veen, De Montfort University,
United Kingdom
VIII
S ELECTED PAPERS B OOK
A number of selected papers presented at HEALTHINF 2017 will be published by Springer in a CCIS
Series book. This selection will be done by the Conference Co-chairs and Program Chair, among the
papers actually presented at the conference, based on a rigorous review by the HEALTHINF 2017 Program
Committee members.
IX
F OREWORD
This book contains the proceedings of the 10th International Joint Conference on Biomedical Engineering
Systems and Technologies (BIOSTEC 2017). This conference is sponsored by the Institute for Systems
and Technologies of Information, Control and Communication (INSTICC), in cooperation with the ACM
Special Interest Group on Knowledge Discovery and Data Mining (ACM SIGKDD), the EUROMICRO, the
International Society for Telemedicine & eHealth (ISfTeH), the Association for the Advancement of Artifi-
cial Intelligence (AAAI), the International Society for Computational Biology (iSCB) and the Biomedical
Engineering Society (BMES).
The purpose of BIOSTEC is to bring together researchers and practitioners interested in both theoretical
advances and applications of information systems, artificial intelligence, signal processing, electronics and
other engineering tools in knowledge areas related to biology and medicine.
BIOSTEC is composed of five complementary and co-located conferences, each specialized in at least
one of the aforementioned main knowledge areas: - International Conference on Biomedical Electronics
and Devices – BIODEVICES; - International Conference on Bioimaging – BIOIMAGING; - International
Conference on Bioinformatics Models, Methods and Algorithms – BIOINFORMATICS; - International
Conference on Bio-inspired Systems and Signal Processing – BIOSIGNALS; - International Conference on
Health Informatics – HEALTHINF.
The purpose of the International Conference on Biomedical Electronics and Devices (BIODEVICES) is to
bring together professionals from electronics, mechanical engineering and related disciplines, interested in
studying and using models, equipment and materials inspired from biological systems and/or addressing
biological requirements. Monitoring devices, instrumentation sensors and systems, biorobotics, micro-
nanotechnologies and biomaterials are some of the technologies presented at this conference.
The International Conference on Bioimaging (BIOIMAGING) covers the complex chain of acquiring, pro-
cessing and visualizing structural or functional images of living objects or systems, including extraction
and processing of image-related information. Examples of image modalities used in bioimaging are many,
including: X-ray, CT, MRI and fMRI, PET and HRRT PET, SPECT, MEG and so on. Medical imaging and
microscope/fluorescence image processing are important parts of bioimaging referring to the techniques
and processes used to create images of the human body, anatomical areas, tissues, and so on, down to the
molecular level, for clinical purposes, seeking to reveal, diagnose, or examine diseases, or medical science,
including the study of normal anatomy and physiology. Image processing methods, such as denoising,
segmentation, deconvolution and registration methods, feature recognition and classification represent an
indispensable part of bioimaging, as well as related data analysis and statistical tools.
The International Conference on Bioinformatics Models, Methods and Algorithms (BIOINFORMATICS)
provides an interdisciplinary forum for computational and biomedical researchers as well as practitioners
to discuss emerging topics associated with the application of computational systems and information tech-
nologies to various fields of biosciences, particularly molecular biology. The conference highlights the
advantages of using algorithmic techniques and mathematical models to better understand biological pro-
cesses and systems, with a focus on recent developments in genomics research and its impact on advancing
biomedical research. Areas of interest for this community include sequence analysis, biostatistics, image
analysis, scientific data management and data mining, machine learning, pattern recognition, computational
evolutionary biology, translational genomics, bioinformatics tools and other related fields.
The goal of the International Conference on Bio-inspired Systems and Signal Processing (BIOSIGNALS)
is to bring together researchers and practitioners from multiple areas of knowledge, including biology,
medicine, engineering and other physical sciences, interested in studying and using models and techniques
inspired by or applied to biological systems. A diversity of signal types can be found in this area, including
image, audio and other biological sources of information. The analysis and use of these signals is a multidis-
ciplinary area including signal processing, pattern recognition and computational intelligence techniques,
amongst others.
XI
The International Conference on Health Informatics (HEALTHINF) is the premier forum for the exchange
of interdisciplinary research and ideas, across a broad spectrum of design, development, adoption, and appli-
cation of informatics-based innovations in healthcare services. The field deals with the resources, devices,
and methods required to optimize the acquisition, storage, retrieval, and use of information in health care.
Amongst many other topics, it includes the research, development, and application of decision support sys-
tems, clinical data mining and machine learning, physiological and behavioral modeling, software systems
in medicine and public health, and mobile, wearable and assistive technologies in healthcare.
The conferences are complemented by three special sessions, respectively on: - Neuro-electrostimulation in
Neurorehabilitation Tasks (NENT); - Smart Medical Devices - From Lab to Clinical Practice (SmartMed-
Dev); - Analysis of Clinical Processes (ACP).
The BIOSTEC program also includes a Doctoral Consortium on Biomedical Engineering Systems and Tech-
nologies that brought together Ph.D. students within the biomedical field to discuss their research in an
international forum.
In 2017, BIOSTEC features four invited talks delivered by internationally distinguished speakers: Bethany
Bracken (Charles River Analytics Inc., United States), Kristina Höök (Royal Institute of Technology, Swe-
den), Bart M. ter Haar Romeny (Eindhoven University of Technology, The Netherlands) and Joyce H.D.M.
Westerink (Philips Research and Eindhoven University of Technology, The Netherlands).
The BIOSTEC joint conference received 297 paper submissions from 56 countries in all continents, of
which 21% were accepted as full papers. The submission’s high quality imposed difficult choices dur-
ing the review process. To evaluate each submission, a double blind paper review was performed by the
Program Committee, whose members are highly qualified independent researchers in the five BIOSTEC
Conferences’ topic areas.
As in previous editions of BIOSTEC, based on the reviewers’ evaluations and on the quality of the presen-
tations, a short list of authors will be selected and invited to submit extended revised versions of their papers
for a book that will be published by Springer with the best papers of BIOSTEC 2017.
We would like to express our thanks to all participants. First of all, to the authors, whose quality work is
the essence of this joint conference. Next, we thank all the members of the program committee and the
auxiliary reviewers for their diligence and expert reviewing. Also, we would like to deeply thank the invited
speakers for their excellent contribution in sharing their knowledge and vision. Finally, special thanks to all
the members of the INSTICC team whose collaboration was fundamental for the success of this Conference.
Finally, special thanks to all the members of the INSTICC team whose collaboration was fundamental for
the success of this Conference.
We wish you all an inspiring Conference and an unforgettable stay in Porto, Portugal. We hope to meet you
again next year for BIOSTEC 2018, details of which will soon be available at http://www.biostec.org.
XII
C ONTENTS
INVITED SPEAKERS
K EYNOTE S PEAKERS
Brain-inspired Medical Image Analysis for Computer-aided Diagnosis
5
Bart M. ter Haar Romeny
PAPERS
F ULL PAPERS
Are Trustworthy Health Videos Reachable on YouTube? - A Study of YouTube Ranking of Diabetes
Health Videos 17
Randi Karlsen, José Enrique Borrás Morell and Vicente Traver Salcedo
Deviations in Birth Rates with Respect to the Day of the Week and the Month for a 100 Year Period
Regarding Social and Medical Aspects in Explaining Models 41
Fabian Schuster, Thomas Ostermann, Reinhard Schuster and Timo Emcke
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases
66
Alexandra Queirós, Luís Pereira, Ana Dias and Nelson Pacheco Rocha
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST
Lexicon 77
Chris J. Lu, Destinee Tormey, Lynn McCreedy and Allen C. Browne
Spectral Data Fusion for Robust ECG-derived Respiration with Experiments in Different Physical
Activity Levels 88
Iman Alikhani, Kai Noponen, Arto Hautala, Rahel Ammann and Tapio Seppänen
XIII
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for
Elderly People
96
Firas Kaddachi, Hamdi Aloulou, Bessam Abdulrazak, Joaquim Bellmunt, Romain Endelin,
Mounir Mokhtari and Philippe Fraisse
Fear of Missing out, Social Media Engagement, Smartphone Addiction and Distraction: Moderating
Role of Self-Help Mobile Apps-based Interventions in the Youth 139
Bobby Swar and Tahir Hameed
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees
178
Ahmedul Kabir, Carolina Ruiz, Sergio A. Alvarez and Majaz Moonis
S HORT PAPERS
Sign-Lingo - Feasibility of a Serious Game for Involving Parents in the Language Development of
Their Deaf or Hearing Impaired Child 191
Ivor van der Schalk and Marco Spruit
ICT and Ageing in Lebanese Public Hospitals - A Resource based View Perspective on Capabilities
205
Nabil Georges Badr, Charbel Chedrawi and Jamil Arida
Sink or Swim: Connected Health Software - Grasping the Innovation Opportunities by Mitigating
Risk 213
Ita Richardson, Ahmed AbuBaker, Patrick O’Connor, Jerry O’Mahony and Pádraig O’Leary
Abstract Information Model for Geriatric Patient Treatment - Actors and Relations in Daily Geriatric
Care 222
Lars Rölker-Denker and Andreas Hein
XIV
Collaborative Reproducible Reporting - Git Submodules as a Data Security Solution 230
Peter E. Dewitt and Tellen D. Bennett
Managing Provenance for Medical Datasets - An Example Case for Documenting the Workflow for
Image Processing 236
Ajinkya Prabhune, Rainer Stotzka, Michael Gertz, Lei Zheng and Jürgen Hesser
A Model Proposal for Augmented Reality Game Creation to Incentivize Physical Activity
252
José Antonio Cicció and Luis Quesada
Medical Imaging: Exams Planning and Resource Assignment - Hybridization of a Metaheuristic and
a List Algorithm 260
Nathalie Klement, Nathalie Grangeon and Michel Gourgand
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving
Record Linkage using Real-world Mammography Data 276
Rainer Schnell, Anke Richter and Christian Borgs
Static and Dynamic Approaches for Pain Intensity Estimation using Facial Expressions
291
Niloufar Zebarjadi and Iman Alikhani
MATCHuP: An mHealth Tool for Children and Young People Health Promotion
313
Beatriz López, Sreynoch Soung, Natalai Mordvanyuk, Albert Pla, Pablo Gay and Abel López-Bermejo
Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition
Anzah H. Niazi, Delaram Yazdansepas, Jennifer L. Gay, Frederick W. Maier, Lakshmish Ramaswamy, 319
Khaled Rasheed and Matthew Buman
A Business Model for Digital Healthcare Environments: An Organic Approach and a Use Case for
Handling Cognitive Impairment 340
Andrea Pistorio, Paolo Locatelli, Federica Cirilli, Luca Gastaldi and Simona Solvi
XV
Voiceguard: Using mHealth Technology for Vocal Health Promotion
Christina Cesar Praça Brasil, José Eurico de Vasconcelos Filho, Daniele de Araújo Oliveira Carlos, 348
Thiago de Oliveira Magalhães and Raimunda Magalhães da Silva
Making Environments Work for People - A Novel Approach towards Personal Lifestyle Management
Informatics 418
Eleni Kaldoudi
Health Information Systems: Background and Trends of Development Worldwide and in Russia
424
Elena Vaganova, Tatiana Ishchuk, Anatoly Zemtsov and Dmitry Zhdanov
A Telecare System on Smart Watches that Communicate with Wireless Bio Sensors
429
Akio Sashima, Mitsuru Kawamoto and Koichi Kurumatani
Designing a Social Machine for the Heart Manual Service
Vanessa Hanschke, Areti Manataki, Cristina Adriana Alexandru, Petros Papapanagiotou, 435
Carolyn Deighan, Louise Taylor and Dave Robertson
Experimental Design and Collection of Brain and Respiratory Data for Detection of Driver’s Attention
441
Roman Mouček, Lukáš Hnojský, Lukáš Vařeka, Tomáš Prokop and Petr Brůha
XVI
A Step Towards the Standardisation of HIV Care Practices
Cristina-Adriana Alexandru, Daniel Clutterbuck, Petros Papapanagiotou, Jacques Fleuriot and 457
Areti Manataki
Sharing of Big Data in Healthcare: Public Opinion, Trust, and Privacy Considerations for Health
Informatics Researchers 463
Laura Moss, Martin Shaw, Ian Piper, Christopher Hawthorne and John Kinsella
Exercise and Wellness Health Strategy Framework - Software Prototype for Rapid Collection and
Storage of Heterogeneous Health Related Data 477
Petr Brůha, Roman Mouček, Pavel Šnejdar, David Bohmann, Václav Kraft and Peter Rehor
A Statistical Analysis for the Evaluation of the Use of Wearable and Wireless Sensors for Fall Risk
Reduction 508
Giovanna Sannino, Ivanoe De Falco and Giuseppe De Pietro
Numerical and Implementation Issues in Food Quality Modeling for Human Diseases Prevention
526
A. Galletti, R. Montella, L. Marcellino, A. Riccio, D. Di Luccio, A. Brizius and I. Foster
S HORT PAPERS
Discussions of a Preliminary Hand Hygiene Compliance Monitoring Application-as-a-service
537
Peng Zhang, Marcelino Rodriguez-Cancio, Douglas Schmidt, Jules White and Tom Dennis
A Real-time m-Health Monitoring System: An Integrated Solution Combining the Use of Several
Wearable Sensors and Mobile Devices 545
Salvatore Naddeo, Laura Verde, Manolo Forastiere, Giuseppe De Pietro and Giovanna Sannino
PerDMCS: Weighted Fusion of PPG Signal Features for Robust and Efficient Diabetes Mellitus
Classification
553
V. Ramu Reddy, Anirban Dutta Choudhury, Srinivasan Jayaraman, Naveen Kumar Thokala,
Parijat Deshpande and Venkatesh Kaliaperumal
XVII
SPECIAL SESSION ON ANALYSIS OF CLINICAL PROCESSES
F ULL PAPERS
Enabling Interactive Process Analysis with Process Mining and Visual Analytics
P. M. Dixit, H. S. Garcia Caballero, A. Corvò, B. F. A. Hompes, J. C. A. M. Buijs and 573
W. M. P. van der Aalst
Towards Process Mining of EMR Data - Case Study for Sepsis Management
Gert-Jan de Vries, Ricardo Alfredo Quintano Neira, Gijs Geleijnse, Prabhakar Dixit and 585
Bruno Franco Mazza
Process Improvement in an Oncology Day Hospital: Design of a Traceability and Indicator System
601
Eduardo Cañada, Enrique Casado and Ana M. Bernardos
S HORT PAPER
ICT: Health’s Best Friend and Worst Enemy?
611
Egon L. van den Broek
XVIII
I NVITED S PEAKERS
K EYNOTE S PEAKERS
Brain-inspired Medical Image Analysis for Computer-aided
Diagnosis
Abstract: Discoveries on brain mechanisms have really taken off. Modern optical and new MRI technologies give
insight in this spectacular organ, especially in the field of vision. Of mutual benefit are new developments in
deep learning and neural network modeling, the mathematical understanding, and the availability of
massively parallel computing power. The lecture will address a number of lessons to learn from the brain
for medical computer-aided diagnosis, explain the mathematical intuition of a number of algorithms, and
show some remarkable successes booked so far.
5
Romeny, B.
Brain-inspired Medical Image Analysis for Computer-aided Diagnosis.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, page 5
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Enhancing Well-being through Psychophysiology
Joyce Westerink
Philips Research and Eindhoven University of Technology (TU/e), The Netherlands
Abstract: Wellbeing is of importance to all of us, yet it is under constant pressure in our 24/7 economy. Our mental
state is reflected to some extent in bodily parameters like heart rate and skin conductance, and we can
measure them in real life using wearable sensing technology. Therefore, the hope is that such
psychophysiological measurements might help us find an optimal balance in our busy lives. The lecture will
discuss a number of promising application areas. Among them is bringing stress awareness through
monitoring physiology, e.g. showing a user his stress pattern as it develops over the day. Another use of the
psychophysiological signals is for biofeedback, so that a user is optimally guided in specific relaxation
exercises. By placing the user in the center of a closed optimization loop we might achieve such
improvements in a completely effortless way. Finally, psychophysiological signals can also facilitate
communication between persons, for instance allowing people to see whether they are in sync.
BRIEF BIOGRAPHY
Joyce Westerink (1960) was originally trained as a
physicist and afterwards expanded her horizon
towards human-technology. She is affiliated with
Philips Research (NL), where her research focuses
on psychological topics in a technological context,
such as visual perception & image quality, human
factors & user interfaces, and more recently
psychophysiology in the context of emotions,
wellbeing and affective computing. She currently
holds a chair on Wellbeing and Psychophysiology in
Human-Technology Interaction at Eindhoven
University of Technology. Written output of her
work can be found in some 40 articles in books and
international journals, and some15 US patents and
patent applications.
7
Westerink, J.
Enhancing Well-being through Psychophysiology.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, page 7
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Designing for Somaesthetic Experiences
Focusing on Actuation Rather than Sensing?
Kristina Höök
Royal Institute of Technology, Sweden
Abstract: In designing for bodily experiences, there has been a lack of theories that can provide the underpinnings we
need to understand and deepen our design thinking. Despite all the work we have seen on designing for
embodiment, the actual corporeal, pulsating, live, felt body has been notably absent from both theory and
practical work. At the same time, digital products have become an integral part of the fabric of everyday
life, the pleasures (and pains) they give, their contribution to our social identity, or their general aesthetics
are now core features of their design. We see more and more attempts to design explicitly for bodily
experiences with digital technology, but it is a notably challenging design task. With the advent of new
technologies, such as biosensors worn on your body, interactive clothes, or wearable computers such as
mobiles equipped with accelerometers, a whole space of possibilities for gesture-based, physical and body-
based interaction is opened. How can we do a better job in interaction design involving our bodies? I will
discuss how Shusterman’s theories of somaesthetics might provide some inspiration, and the need to focus
on actuation rather than sensing.
BRIEF BIOGRAPHY
Kristina Höök is a professor in Interaction Design at
the Royal Institute of Technology and also works
part-time at SICS (Swedish Institute of Computer
Science). She is the director of the Mobile Life
centre. Höök has published numerous journal
papers, books and book chapters, and conference
papers in highly renowned venues. A frequent
keynote speaker, she is known for her work on
social navigation, seamfulness, mobile services,
affective interaction and lately, designing for bodily
engagement in interaction through somaesthetics.
Her competence lies mainly in interaction design
and user studies helping to form design. She has
obtained numerous national and international grants,
awards, and fellowships including the Cor Baayen
Fellowship by ERCIM (European Research
Consortium for Informatics and Mathematics), the
INGVAR award and she is an ACM Distinguished
Scientist. She has been listed as one of the 50 most
influential IT-women in Sweden every year since
2008. She is an elected member of Royal Swedish
Academy of Engineering Sciences (IVA).
9
Höök, K.
Designing for Somaesthetic Experiences - Focusing on Actuation Rather than Sensing?.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, page 9
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
An Unobtrusive System to Measure, Assess, and Predict Cognitive
Workload in Real-World Environments
Bethany Bracken
Charles River Analytics Inc., U.S.A.
Abstract: Across many careers, individuals face alternating periods of high and low attention and cognitive workload,
which can result in impaired cognitive functioning and can be detrimental to job performance. For example,
some professions (e.g., fire fighters, emergency medical personnel, doctors and nurses working in an
emergency room, pilots) require long periods of low workload (boredom), followed by sudden, high-tempo
operations during which they may be required to respond to an emergency and perform at peak cognitive
levels. Conversely, other professions (e.g., air traffic controllers, market investors in financial industries,
analysts) require long periods of high workload and multitasking during which the addition of just one more
task results in cognitive overload resulting in mistakes.An unobtrusive system to measure, assess, and
predict cognitive workload could warn individuals, their teammates, or their supervisors when steps should
be taken to augment cognitive readiness. In this talk I will describe an approach to this problem that we
have found to be successful across work domains includes: (1) a suite of unobtrusive, field-ready
neurophysiological, physiological, and behavioral sensors that are chosen to best suit the target
environment; (2) custom algorithms and statistical techniques to process and time-align raw data originating
from the sensor suite; (3) probabilistic and statistical models designed to interpret the data into the human
state of interest (e.g., cognitive workload, attention, fatigue); (4) and machine-learning techniques to predict
upcoming performance based on the current pattern of events, and (5) display of each piece of information
depending on the needs of the target user who may or may not want to drill down into the functioning of the
system to determine how conclusions about human state and performance are determined. I will then focus
in on our experimental results from our custom functional near-infrared spectroscopy sensor, designed to
operate in real-world environments to be worn comfortably (e.g., positioned into a baseball cap or a
surgeon’s cap) to measure changes in brain blood oxygenation without adding burden to the individual
being assessed.
11
Bracken, B.
An Unobtrusive System to Measure, Assess, and Predict Cognitive Workload in Real-World Environments.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, page 11
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
PAPERS
F ULL PAPERS
Are Trustworthy Health Videos Reachable on YouTube?
A Study of YouTube Ranking of Diabetes Health Videos
Randi Karlsen1 , José Enrique Borrás Morell1 and Vicente Traver Salcedo2
1 Department of Computer Science, UiT The Arctic University of Norway, Tromsø, Norway
2 ITACA - Health and Wellbeing Technologies, Universidad Politècnica de València, Valencia, Spain
randi.karlsen@uit.no, jobormo@gmail.com, vtraver@itaca.upv.es
Keywords: Consumer Health Information, Information Retrieval, Social Networks, YouTube, Health Video Retrieval,
Ranking Evaluation, Diabetes, Personal Health.
Abstract: While health consumers are increasingly searching health information on the Internet, information overload is
a serious obstacle for finding relevant and good-quality information among inaccurate, obsolete or incorrect
health information. While a lot of information exists, information from credible sources, such as hospitals and
health organisations, may be difficult to find. The aim of this study is to analyse ranking of diabetes health
videos on YouTube over a time period, to learn whether videos from credible sources are ranked sufficiently
high to be reachable to users. 19 diabetes-related queries were issued to YouTube each day over a 1.5-month
period, and in total 2584 videos from credible sources was detected and their ranking position tracked. We
found that only a small number of the tracked videos were in practice available to the user, as most videos
were given a persistent low ranking. Also, since ranking is fairly stable, users cannot expect to find many new
videos (from credible sources) when issuing a query multiple times. We conclude that new tools are needed
that enable health video retrieval based on requirements concerning not only relevance and popularity, but also
credibility of the sources and trustworthiness of the videos.
17
Karlsen, R., Morell, J. and Salcedo, V.
Are Trustworthy Health Videos Reachable on YouTube? - A Study of YouTube Ranking of Diabetes Health Videos.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 17-25
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
one of the most powerful factors affecting information Butler et al., 2013; Schreiber et al., 2013; Murugiah
credibility (Freeman and Spyridakis, 2009). Users et al., 2011; Fat et al., 2011; Azer et al., 2013). In
are for example more likely to trust health informa- these studies, reviewers evaluate the quality or con-
tion published or authored by physicians or major he- tent of selected videos, and assess their usefulness as
alth institutions than information provided by other information source within their respective area.
sources (Dutta-Bergman, 2003; Moturu et al., 2008; This paper reports on a study where we tracked
Bermúdez-Tamayo et al., 2013). Such studies show diabetes health videos on YouTube over a period of
that users show greater interest in health information 1.5 month, to gain knowledge on how videos from
published by professional sources, such as hospitals professional channels are ranked on YouTube. The
and health organisations, since these are considered study was intended to answer the following questions:
more credible than the average health information on “Where are videos from hospitals and health organi-
the Internet. sations ranked on YouTube?” “Are these videos ran-
In our study we focus on health information pro- ked in positions that make them reachable to users?”
vided through videos on YouTube and investigate to To the best of our knowledge, there has previously not
what extent health videos from professional sources, been conducted a study where the availability of You-
such as hospitals and health organisations, are availa- Tube health videos has been tracked over time, as was
ble to the user. YouTube is today the most important done in our work.
video-sharing website on the Internet (Cheng et al., The structure of the paper is the following. The
2008). It has over a billion users (almost one-third of next section presents the methodology used in our
all people on the Internet) and every day people watch study. Section 3 presents the results of the work,
hundreds of millions of hours on YouTube and gene- while findings are discussed in Section 4. Section 5
rate billions of views (YouTube, 2016). YouTube so- concludes.
cial media tools allow users to easily upload, view and
share videos, and enable interaction by letting users
rate videos and post comments. 2 METHOD
YouTube is increasingly being used to share he-
alth information offered by a variety of sources (chan- This study is based on health videos obtained from
nels), including hospitals, organisations, government, YouTube through textual search queries on diabetes-
companies and private users (Bennett, 2011). Ho- related issues. We set up a test environment, where 19
wever, it may be difficult to find videos from credi- diabetes-related queries were issued to YouTube each
ble channels, since YouTube video ranking is known day over a period of 1.5 months, from March until
to favour content from popular channels. This may April 2013. During this period, we daily collected
cause for instance hospital videos, where social inte- the top 500 YouTube results for each query. Videos
raction through likes/dislikes and comments are not from white-listed (presumably credible) sources were
so common, to appear low in the ranked list. Also, identified and tracked during each day of the study,
YouTube ranking does not focus on trustworthiness, and their ranking position registered.
and both misleading and incorrect videos may well We implemented a system that for each day au-
be popular and may therefore be given a high ranking tomatically issued the 19 queries and extracted infor-
(Briones et al., 2012; Shabbir et al., 2013). mation about the top 500 YouTube results. In addition
A considerable amount of literature has been pu- to ranking position, we collected information such as
blished on YouTube data analysis, such as studying video name and identifier, channel identifier, number
relations between video ratings and their comments of likes, dislikes and comments to the video. All 19
(Yee et al., 2009) or focusing on the social networ- queries included the term “diabetes” and were focu-
king aspect of YouTube and social features (Cheng sed towards different aspects concerning the disease.
et al., 2008; Chelaru et al., 2012). Studies of You- We used queries such as “diabetes a1”, “diabetes glu-
Tube performance have mainly focused on YouTube cose”, “diabetes hyperglycemia” and “diabetes lada”,
in general, rather than on specific domains, such as and issued them as regular search queries on the You-
health. However, there have recently been some stu- Tube home page using an anonymous profile (to avoid
dies evaluating YouTube health video content with re- any bias) and with language option set to English.
spect to their quality of information for patient educa- Video ranking was obtained by parsing the html of
tion and professional training (Gabarron et al., 2013; the result page, while video and channel information
Topps et al., 2013). Such studies, focusing on diffe- were collected through YouTube API version 2.0. All
rent areas of medicine, include the work of (Briones search queries can be seen in Table 1.
et al., 2012; Singh et al., 2012; Steinberg et al., 2010; Through our study of YouTube health videos, we
18
Are Trustworthy Health Videos Reachable on YouTube? - A Study of YouTube Ranking of Diabetes Health Videos
Table 1: List of You Tube search queries. available. A question is: “How far down in the ran-
diabetes type 1 diabetes hyperglycemia diabetes insulin ked list of videos is a user willing to browse in order
diabetes type 2 diabetes hypoglycemia diabetes injection to find a relevant video?” The answer may to some
diabetes a1c diabetes complications diabetes glucose extent be a matter of how patient the user is, but tes-
diabetes food diabetes retinopathy diabetes mellitus ting several hundred videos are beyond what can be
diabetes diet diabetes ketoacidosis diabetes education expected from an average user.
diabetes obese diabetes insulin pump
diabetes lada diabetes monitoring To characterise videos w.r.t availability, we have
grouped the tracked videos using ranking position
intervals that were chosen based on our perception
identified a number of (assumed) credible health vi- of how available videos in the different groups are.
deo sources, such as hospitals and health organisa- We consider videos ranked in position 1-40 as highly
tions. We organised these channels into a hospital available, position 41-100 as available, position 101-
white-list and a health organisations white-list, con- 200 as not very available and position 201-500 as al-
taining channel identifiers for hospitals and health or- most unavailable. In this work, we assume that videos
ganisations respectively. In the light of user-interests ranked lower than position 500, are in practice una-
in peer-to-peer healthcare (Ziebland and Herxheimer, vailable, and we have therefore tracked only videos
2008; Fox, 2011a), we also generated a third white- appearing in the top-500 ranking.
list of channels, which includes users that are active To learn where videos from hospitals, health or-
and predominantly publishing diabetes videos. Our ganisations and active users were ranked, we exami-
white-lists contained a total of 699 channels, where ned, for each day, the rank positions for all videos
651 were hospitals, 30 were organisations and 18 from our white lists, and determined the number of
were active users. We used the Health Care Social videos that were ranked in position intervals (1-40),
Media List started by Ed Bennett (Bennett, 2011) as (41-100), (101-200), and (201-500). Based on this
an initial white-list, and expanded with more channels study, we found that only a small number of videos
that we identified during our studies (Karlsen et al., from white-listed channels were in practice available
2013; Morell et al., 2012). to the user. When examining the top-40 ranked vi-
deos, we found that on average, only 3.2% were from
hospitals, 10.4% from health organisations and 3.6%
3 RESULTS from active users. This means that we on average
will retrieve approximately 7 videos from white-listed
Using the 19 search terms shown in Table 1, we trac- channels among the top-40 ranked videos. In the next
ked the rank position of a total of 2584 YouTube he- position interval (41-100), the average number of vi-
alth videos from white-listed channels during the test deos from white-listed channels will be approxima-
period. The videos were uploaded from 73 hospital tely 6. The results for all rank intervals are seen in
channels, 30 organisation channels and 18 user chan- Figure 1. The numbers for the top-500 videos (not gi-
nels. Among these, 2372 videos were uploaded to ven in Figure 1) were 2.3% from hospitals, 6.4% from
YouTube before the study began, whereas 212 videos health organisations and 1.8% from active users.
were uploaded while the study was performed.
For each day of the study, our system detected a
number of new videos from white-listed channels (for
which tracking started and continued to the end of the
study). The number of new videos was large in the
first days of the study, and after some days stabilised
at around 10 new videos each day.
19
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 2: Classification of the tracked videos from white-listed channels, grouped according to their most frequent ranking
position during the test period. The number of videos in each rank-position group are given (percentage between parentheses).
day’s search and manually checked the channel of Table 3: Proportion of Group A-E videos (classified accor-
each video. We found 15 new videos from hospitals ding to their most frequent ranking position) that occasio-
not included in the white-list. This addition repre- nally changed ranking position to a different position inter-
sents a modest 0.8% (of the 1900 videos), and does val.
not significantly improve the amount of hospital vi- Group Group Group Group Group
deos given a high ranking. A B C D E
Occ. pos
3.2 Changes in Ranking Position 1-40 - 35.6% 11.8% 2.5% 4.4%
Occ. pos
41-100 38.2% - 48.6% 11.3% 9.6%
To investigate variations in video ranking, we first Occ. pos
classified the tracked videos into five rank-position 101-200 14.0% 54.4% - 39.7% 19.6%
groups (Group A-E) according to their most frequent Occ. pos
rank position during the test period. Occasional chan- 201-500 6.6% 26.8% 59.0% - 81.4%
ges in ranking position were registered by counting Occ. pos
> 500 27.9% 63.1% 76.9% 82.7% -
the number of videos from each group that one or
more days had a ranking position associated with a
different group. We also calculated mean position and position and standard deviation for videos, grouped
standard deviation for videos that were ranked within according to their most frequent rank position (i.e.
a top-500 position the whole period. rank-position group).
Among the 2584 videos from white-listed chan-
nels, we found 136 videos (5.3%) (26 hospital, 80 or- Table 4: Mean position and standard deviation for videos
ganisation and 30 user videos) that most frequently in different rank-position groups. Including the 175 videos
that were ranked within top-500 the whole test period.
appeared in the top-40 results, while 1654 videos
(64%) only occasionally appeared among the top-500 No. of Mean Standard
results. These were classified as Group A and Group videos position deviation
E videos, respectively. Table 2 shows the number of Group A 71 15.5 7.0
videos within each of the five rank-position groups. Group B 43 71.0 20.9
Occasional change in ranking is presented in Ta- Group C 37 145.9 38.2
ble 3, showing the proportion of videos classified as Group D 24 272.3 48.0
Group A-E that occasionally (i.e. one or more days)
appeared in a different rank-position interval. For ex- We found that the highest ranked videos (Group
ample, 38.2% of Group A videos appeared occasio- A) had the lowest standard deviation, i.e. 7.0. These
nally in position 41-100, while 14% occasionally ap- videos seemed to be established in a top-ranked posi-
peared in position 101-200. We found that only a tion, and had in general less variation in rank-position
small proportion of videos from Group C, D and E than videos from other groups. In fact, stability in
were occasionally given a high-ranked position within rank position seemed to be the case for all groups,
1 - 40 (11.8%, 2.5% and 4.4% respectively). even though the standard deviation for Group B, C
These results indicate that most of the videos ap- and D is higher.
pearing in low rank positions, are stuck in low posi- SD-values indicate that changes in rank position
tions, and will consequently remain (almost) out of in general do not make Group D videos more acces-
reach to the user. sible to users, while Group C and B videos may oc-
Mean position and standard deviation (SD) were casionally be given a more accessible ranking. As an
calculated for the 175 videos that were ranked within example, take Group B videos having a mean position
top-500 the whole test period. Table 4 shows mean of 71 and an SD value of 20.9. This means that most
20
Are Trustworthy Health Videos Reachable on YouTube? - A Study of YouTube Ranking of Diabetes Health Videos
videos (about 68%, assuming a normal distribution) Table 5: The number of videos relevant to i) the search
were ranked within position 50-92. Approximately query and ii) diabetes in general, for the two queries “di-
15% of the videos occasionally had a position within abetes hyperglycemia” and “diabetes retinopathy”.
top-40, while approximately 15% were occasionally Rank relevant Diabetes Diabetes
not included in the top-100. For Group C videos, less position to hyperglicemia retinopathy
than 0.5% of the videos would occasionally have a Group A query 100% 100%
position within the top-40, while approximately 10% videos diabetes - -
would occasionally have a position within top-100. Group B query 100% 100%
The rank stability observed through these num- videos diabetes - -
bers, indicates that highly ranked videos remain avai- Group C query 45% 100%
videos diabetes 55% -
lable to users, while low ranked videos will almost
query 41% 72%
always remain out of reach for the user. Group D diabetes 55% 11%
videos not relev 4% 17%
3.3 Relevance of Videos query 50% 55%
Group E diabetes 47% 18%
videos not relev 3% 27%
One could suspect that videos given a low-ranked po-
sition were not relevant to the query. To investigate
this, we selected two queries (“diabetes hyperglyce- perfect match between video title and query (meaning
mia” and “diabetes retinopathy”) and determined re- that all terms in the query were found in the video
levance of each tracked video by manually comparing title). The proportion of videos with a perfect query-
keywords in the query to video title and description, title match was lower in the other groups, but there
and by watching the video to compare video content were still a large number of lower ranked videos that
to query. had a perfect query-title match. This shows that such
Over the test period, the system tracked 130 vi- a match is not sufficient for a high-ranked position.
deos for the “diabetes hyperglycemia” query and 64 The average number of likes/dislikes and com-
videos for the “diabetes retinopathy” query. Table ments for Group A-E videos are displayed in Figure 2.
5 shows the number of videos that were i) relevant The general trend was that the highest ranked videos
to the query, ii) relevant to diabetes in general and had the highest number of social interactions. This
iii) not relevant to diabetes. For example, for Group coincides well with previous studies, which found
E videos of the “diabetes hyperglycemia” query, we that very few videos get the users’ attention. This
found that 50% were relevant to the query, an addi- can be explained through the Yule process (or rich-
tional 47% were relevant to diabetes, while only 3% get-richer principle), as the videos that appear in the
were not relevant to diabetes. For the “diabetes retino- first page are more likely to be viewed and interacted
pathy” query, 55% of Group E videos were relevant to (Chelaru et al., 2012; Cha et al., 2009).
the query, an additional 18% were relevant to diabe-
tes, while 27% were not relevant. For Group A and B
videos (of both queries), every video was relevant to
the query. In conclusion, we found that a large num-
ber of low-ranked videos were relevant to the query,
implying that lack of relevance could not be the rea-
son for their low ranking.
21
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 6: Number of videos without user interaction through Table 7: Relevance of videos published by non-white-listed
likes/dislikes and comments. and white-listed channels.
When examining the number of views for indi- Table 8: Channels of videos published by non-white-listed
and white-listed channels.
vidual videos, we found a close correlation between
views and ranking (see Figure 3). This seems obvious Diabetes type 1 Diabetes injection
since users can easily find and access highly ranked non-WL- WL- non-WL- WL-
videos, which then get a higher number of views com- channels channels channels channels
pared to low ranked videos. However, there were also 35 videos 13 videos 38 videos 11 videos
a few exceptions. For instance, one Group A video Hospital 0 3 (23%) 0 0
had only 18 views, zero likes, dislikes and comments. Health
organization 1 (3%) 5 (38.5%) 1 (2%) 8 (73%)
Active
users 0 5 (38.5%) 0 3 (27%)
Health
center 1 (3%) - 0 -
Company 8 (23%) - 5 (13%) -
Private
users 24 (68%) - 23 (61%) -
Others 1 (3%) - 9 (24%) -
Figure 3: Average number of times a video has been vie-
wed.
4 DISCUSSION
3.5 Videos From Non-white-listed
Channels The goal of this study was to identify the number of
videos from hospitals, health organisations and active
To get an impression of the type of videos not tracked user channels that are in practice available to users.
in our study, we also examined properties of videos On the positive side, the study shows that for each
published by non-white-listed channels. Because of query, videos from white-listed channels are in fact
the large number of videos, we restricted this investi- available among the top-500 ranked videos. A pro-
gation to the top-50 results of two queries: “diabetes blem, however, is that these videos represent a small
type 1” and “diabetes injection”. For all top-50 vi- proportion of the total number of retrieved videos, and
deos we manually examined relevance to query and that many of them are found in low ranked positions
channel type. that make them in practice beyond reach for the user
Relevance and channel type for the examined vi- issuing the query. Thus, precision for videos from
deos are shown in Table 7 and Table 8, respectively. white-listed channels is not very good. Among the
Videos from both white-listed (WL) and non-white- top-100 ranked videos for a diabetes related query,
listed channels are included in the tables. Among one can on average expect 15% to be from white-
the non-white-listed videos, most came from private listed channels (2.8% from hospitals, 8.9% from he-
users (47 videos), while only 3 videos were from he- alth organisations and 3.3% from active users).
alth organisations/centres. We further observed that Of the 2584 tracked videos, 64% were most fre-
white-listed channels had the highest proportion of re- quently ranked in a position lower than 500, only oc-
levant videos. casionally appearing within the top-500 results. This
shows that many relevant videos from credible chan-
nels are in practice unreachable for users. Also, stan-
dard deviation values and observed ranking variations
for individual videos show that the ranking of videos
is fairly stable. This implies that only a small per-
22
Are Trustworthy Health Videos Reachable on YouTube? - A Study of YouTube Ranking of Diabetes Health Videos
centage of low ranked videos improved their ranking wing and even encouraging social interaction on vi-
position sufficiently to be available to users and that deos may also help visibility of the video.
users hardly obtain any new videos (from white-listed However, an accurate video title/description is
channels) by issuing a query multiple times. On the only a step in the right direction for improving video
other hand, ranking stability also guarantees that top- rank position and precision. We believe there is a need
ranked videos from white-listed channels are availa- for new video retrieval tools that not only focus on re-
ble to users over a period of time. This benefits new levance and popularity as it is done today, but also re-
users that will have access to a few popular and poten- trieves health information based on requirements for
tially good quality health videos from credible chan- credibility of the sources and trustworthiness of the
nels. videos. This provides topics for future research.
One conclusion from our study is therefore that re- Some limitations to our work should be noted.
levant diabetes-related health videos are available on Firstly, even though our white-lists of hospitals and
YouTube, but too few are given a ranking that make health organisations include a large number of chan-
them reachable for the user. nels, they cannot include every hospital and health
The YouTube ranking algorithm is based on video organisation available. The focus was not to track
popularity among users. Previously the algorithm was every relevant and trustworthy video in the result set
based on view count of the video, while the current from YouTube, but rather to track videos from speci-
version (since 2012) is based on Watch Time, which fic channel types that are assumed to be of interest to
is the amount of time on aggregate that viewers watch health consumers. Also, it should be noted that the
a video (Robertson, 2014). Even though Watch Time quality of each video was not assessed in this study.
is a better measure of success for a video (since it re- We base the study on the assumption that videos from
wards engaging videos that keep viewers watching), hospitals, health organisations and also active users
it still requires videos to be available to users in order are of interest and therefore worthwhile investigating.
to get sufficient attention and improve Watch Time. We are fully aware that videos from other channels
Also, there is no guarantee that an engaging, much (not tracked in our study) may provide useful and
watched video is trustworthy with respect to the he- trustworthy information. Furthermore, for each query
alth information it provides. we only examined the top-500 ranked videos from
In our study, the investigation of correlation bet- YouTube. When some queries return over 600.000
ween ranking position and user attention in the form videos, this is a small number. However, we believe
of social interactions, gave mixed results. There were that a position over 500 is not significant in terms of
on average a higher number of social interactions (i.e. availability to users.
likes/dislikes, comments and views) for the highest
ranked videos, but we also saw many examples of vi-
deos that had a high-ranked position with no social 5 CONCLUSION
interaction and very few views.
A critical factor in identifying relevant videos ba- To gain knowledge about how health videos are ran-
sed on a textual query, is the accuracy of the metadata ked on YouTube, we have tracked diabetes health
with respect to video content. When examining the videos on YouTube every day over a period of 1.5
correlation between video title and query terms, we month. We focused on videos published by credible
found that a majority (88%) of the highest ranked vi- channels, such as hospitals, health organisations and
deos (Group A videos), but also a large number of users actively publishing diabetes-related videos. Our
low ranked videos, had a perfect match between vi- findings show that most videos from these channels
deo title and query terms. However, by inspection, are given a persistent low ranking that makes them
we also found many video descriptions that were very in practice unavailable to users. Additionally, since
short and of such a general nature that they did not ranking position of videos is fairly stable, users re-
describe the video content. Video titles were also in ceive the same videos over and over again if issuing
many cases inaccurate with respect to video content. a query multiple times. Thus, users may find it dif-
An implication of these findings is that video pu- ficult to obtain new information from YouTube. A
blishers should make an effort in providing precise conclusion from this work is that research is needed
textual description of videos, where video title and to provide users with new tools that enable health vi-
description matches the video content as accurately deo retrieval based on requirements concerning not
as possible. This is a simple way of improving the only relevance and popularity, but also credibility of
likelihood for being selected as relevant and possi- the sources and trustworthiness of the videos. Me-
bly ranked sufficiently high to be reachable. Allo- chanisms for alternative ranking or less stable ranking
23
HEALTHINF 2017 - 10th International Conference on Health Informatics
could also be useful for making a larger number of re- Diaz, J. A., Griffith, R. A., Ng, J. J., Reinert, S. E., Fried-
levant videos available to the user. mann, P. D., and Moulton, A. W. (2002). Patients’
use of the internet for medical information. Journal of
general internal medicine, 17(3):180–185.
Dutta-Bergman, M. (2003). Trusted online sources of he-
ACKNOWLEDGEMENTS alth information: differences in demographics, health
beliefs, and health-information orientation. Journal of
The authors appreciate support from UiT The Arctic medical Internet research, 5(3):e21.
University of Troms through funding from Troms Re- Fat, M. J. L., Doja, A., Barrowman, N., and Sell, E. (2011).
search Foundation, and the important contributions of Youtube videos as a teaching tool and patient resource
the ITACA-TSB Universitat Politècnica de València for infantile spasms. Journal of Child Neurology,
group. 26(7):804–809.
Fox, S. (2011a). Peer-to-peer healthcare. Pew Internet &
American Life Project.
Fox, S. (2011b). The social life of health information, 2011.
REFERENCES Pew Internet & American Life Project Washington,
DC.
AlGhamdi, K. M. and Moussa, N. A. (2012). Internet Freeman, K. S. and Spyridakis, J. H. (2009). Effect of con-
use by the public to search for health-related infor- tact information on the credibility of online health in-
mation. International journal of medical informatics, formation. IEEE Transactions on Professional Com-
81(6):363–373. munication, 52(2):152–166.
Azer, S. A., AlGrain, H. A., AlKhelaif, R. A., and AlEs- Gabarron, E., Fernandez-Luque, L., Armayones, M., and
haiwi, S. M. (2013). Evaluation of the educational va- Lau, A. Y. (2013). Identifying measures used for as-
lue of youtube videos about physical examination of sessing quality of youtube videos with patient health
the cardiovascular and respiratory systems. Journal of information: a review of current literature. Interactive
medical Internet research, 15(11):e241. Journal of Medical Research, 2(1):e6.
Bennett, E. (2011). Social media and hospitals: From
Griffiths, F., Cave, J., Boardman, F., Ren, J., Pawlikowska,
trendy to essential. Futurescan 2001: Healthcare
T., Ball, R., Clarke, A., and Cohen, A. (2012). Social
Trends and Implications 2011-2016, pages 43–48.
networks–the future for health care delivery. Social
Bermúdez-Tamayo, C., Alba-Ruiz, R., Jiménez-Pernett, science & medicine, 75(12):2233–2241.
J., Garcı́a Gutiérrez, J.-F., Traver-Salcedo, V., and
Hughes, B., Joshi, I., Lemonde, H., and Wareham, J. (2009).
Yubraham-Sánchez, D. (2013). Use of social me-
Junior physician’s use of web 2.0 for information see-
dia by spanish hospitals: perceptions, difficulties,
king and medical education: a qualitative study. Inter-
and success factors. Telemedicine and e-Health,
national journal of medical informatics, 78(10):645–
19(2):137–145.
655.
Briones, R., Nan, X., Madden, K., and Waks, L. (2012).
When vaccines go viral: an analysis of hpv vac- Karlsen, R., Morell, J. E. B., Fernández-Luque, L., and Sal-
cine coverage on youtube. Health communication, cedo, V. T. (2013). A domain-based approach for re-
27(5):478–485. trieving trustworthy health videos from youtube. In
MedInfo, page 1008.
Butler, D. P., Perry, F., Shah, Z., and Leon-Villapalos, J.
(2013). The quality of video information on burn first Madathil, K. C., Rivera-Rodriguez, A. J., Greenstein, J. S.,
aid available on youtube. Burns, 39(5):856–859. and Gramopadhye, A. K. (2015). Healthcare informa-
tion on youtube: a systematic review. Health informa-
Cha, M., Kwak, H., Rodriguez, P., Ahn, Y.-Y., and Moon,
tics journal, 21(3):173–194.
S. (2009). Analyzing the video popularity charac-
teristics of large-scale user generated content sys- Morell, J. E. B., Karlsen, R., Salcedo, V. T., and Luque,
tems. IEEE/ACM Transactions on Networking (TON), L. F. (2012). Analysis of hospital youtube videos as
17(5):1357–1370. health reliable sources. IVWorkshop on on Technology
Chelaru, S. V., Orellana-Rodriguez, C., and Altingovde, for Healthcare and Healthy Lifestyle.
I. S. (2012). Can social features help learning to Moturu, S. T., Liu, H., and Johnson, W. G. (2008). Trust
rank youtube videos? In International Conference evaluation in health information on the world wide
on Web Information Systems Engineering, pages 552– web. In 2008 30th Annual International Conference
566. Springer. of the IEEE Engineering in Medicine and Biology So-
Cheng, X., Dale, C., and Liu, J. (2008). Statistics and so- ciety, pages 1525–1528. IEEE.
cial network of youtube videos. In Quality of Service, Murugiah, K., Vallakati, A., Rajput, K., Sood, A., and
2008. IWQoS 2008. 16th International Workshop on, Challa, N. R. (2011). Youtube as a source of informa-
pages 229–238. IEEE. tion on cardiopulmonary resuscitation. Resuscitation,
de Boer, M. J., Versteegen, G. J., and van Wijhe, M. 82(3):332–334.
(2007). Patients use of the internet for pain-related Pant, S., Deshmukh, A., Murugiah, K., Kumar, G., Sa-
medical information. Patient education and counse- chdeva, R., and Mehta, J. L. (2012). Assessing the
ling, 68(1):86–97. credibility of the youtube approach to health informa-
24
Are Trustworthy Health Videos Reachable on YouTube? - A Study of YouTube Ranking of Diabetes Health Videos
25
MonAT: A Visual Web-based Tool to Profile Health Data Quality
Abstract: Electronic Health Records (EHRs) are an important asset for clinical research and decision making, but the
utility of EHR data depends on its quality. In health, quality is typically investigated by using statistical
methods to profile data. To complement established methods, we developed a web-based visualisation tool
called MonAT Web Application (MonAT) for profiling the completeness and correctness of EHR. The tool
was evaluated by four researchers using anthropometric data from the Born in Bradford Project (BiB Project),
and this highlighted three advantages. The first was to understand how missingness varied across variables,
and especially to do this for subsets of records. The second was to investigate whether certain variables for
groups of records were sufficiently complete to be used in subsequent analysis. The third was to portray
longitudinally the records for a given person, to improve outlier identification.
26
Noselli, M., Mason, D., Mohammed, M. and Ruddle, R.
MonAT: A Visual Web-based Tool to Profile Health Data Quality.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 26-34
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
MonAT: A Visual Web-based Tool to Profile Health Data Quality
Table 1: Concept and Description of (Johnson et al., 2015)’s ontology for Completeness Dimension.
Concept Description
a DomainCoverage Data represents Domain Concepts
b DomainComplete Presence or absence of expected information
c RepresentationComplete Data is not missed without consider the Domain
d Sufficiency Longitudinal data is sufficient to investigate a given Task
e Relevance Data complies the Domain and is sufficient to investigate a given Task
f TaskCoverage Variables used to investigate a given Task appears in the data
g Flexibility Data is sufficient to investigate different Tasks
Table 2: Concept and Description of (Johnson et al., 2015)’s ontology for Correctness Dimension.
Concept Description
h RepresentationIntegrity Data is not corrupted, no data entry errors
i Reliability The data can be used because it is correct
l RepresentationCorrectness The data is complete and accurate
types that must be considered in developing visual- 2008). Bradford is a city in the North of England
ization techniques” and “users wants to see both cate- with high levels of socio-economic deprivation and
gorical and numerical data when interactively explor- ethnic diversity. Women were recruited at the Brad-
ing the data, and they like to look at the detail in the ford Royal Infirmary at 26-28 weeks gestation. The
record”. full BiB cohort recruited 12,453 women comprising
There is a huge amount of data quality investiga- 13,776 pregnancies between 2007 and 2010 and the
tions specifically in health care and medical research cohort is broadly characteristic of the city’s maternal
(Stausberg et al., 2015) but tackling data quality as- population. The mothers and children are followed
sessment with a visual analytic perspective is quite up longitudinally through direct surveys and linkage
novel (Kohlhammer et al., 2011). to routine healthcare records. Ethical approval for the
Two examples of visual analytic tools are Time- data collection was granted by the Bradford Research
Cleanser (Gschwandtner et al., 2014) and Profiler Ethics Committee (Ref 07/H1302/112).
(Kandel et al., 2012). TimeCleanser is a visual analyt- We obtained access to a subset of the BiB chil-
ics system that helps to clean time-oriented data. Pro- dren’s growth variables (Wright et al., 2013) in two
filer adopts visualization and statistical analysis for flat files. The first file contains 500 records with chil-
data quality assessment. The cleansing job is driven dren’s raw observations (Table 3). There are 360
by summaries and automated detection of anomalies children. The greatest number of records per child
and then visualizes and interacts with the results. is 21. The greatest number of height observations
MonAT aims to help experts detect and flag com- per child is 3. The greatest number of weight obser-
pleteness and correctness data quality issues by pro- vations per child is 20. On average, there are 0.51
viding interactive and connected visualizations. height observations and 1.38 weight observations per
We designed MonAT to cater to the (Weiskopf and child. The second file contains the same informa-
Weng, 2013)’s data quality definitions and consider- tion cleaned by statisticians following an established
ing the (Johnson et al., 2015)’s ontology (Table 1 and cleansing method (see Section 3.1).
Table 2). MonAT offers a visualization that can help
to classify the data in the (Rubin, 1976)’s categories 3.1 Data Cleansing Process
and considers the longitudinal characteristic of health
data. We met several times with BiB statisticians. The
aim of the meetings was to understand their cleans-
ing method, detect deficiencies, and establish require-
3 BORN IN BRADFORD ments for our tool.
The BiB method uses STATA and goes through
the following steps to clean height and weight vari-
Born in Bradford (BiB) is a longitudinal multi-ethnic
ables:
birth cohort study aiming to examine the impact of
environmental, psychological and genetic factors on • Implausible values. Weight observations greater
maternal and child health and wellbeing (Raynor, than 25kgs are removed.
27
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 3: Variables in the anthropometric data set that was used to evaluate MonAT.
Variables
Name Type Description #Categories
ChildID Encoding Child’s ID to identify longitudinal data 360
age Numerical (Integer) Child’s age calculate in days
weight Numerical (Float) Child’s weight calculated in kilograms
height Numerical (Float) Child’s height calculated in centimeter
gender Categorical Child’s sex 2
eth0ethall 22
eth0eth9gp 9
eth0ethgrp Categorical Child’s ethnicity category 6
ethgrp4 4
eth0eth3gp 3
source Categorical Information about the data provenance 3
• Outliers. Data are divided by baby’s sex and quality issues with the age and ethnicity variables. An
mother’s ethnicity group. Four Standard Devia- assumption that underlies categorical variables such
tion (4SD) from mean is calculated separately for as ethnicity is that they do not change over the time.
the groups over intervals of two months. Values However, a child’s ethnicity may not be present for
greater than +4SD and smaller than -4SD are con- each data record, or ethnicity may be recorded dif-
sidered as outliers and deleted from the data set. ferently over time, indicating that some data are not
• Negative Increment. Weight and height observa- consistent.
tions are checked by comparing two consecutive Third, numerical longitudinal variables (weight
numerical observations and deleting the second and height, in the case of the anthropometric data set)
observation if it does not follow certain criteria. are only cleaned in a pair-wise fashion, rather as a
Weight observations are also compared with the whole. The sequence of points in a plot defines the
subsequent measurement. Weight values between overall weight (or height) profile of a child. Inspec-
the first two weeks of age with a drop of more than tion of individual points in the context of the chil-
10% and weight and height values with a drop of dren’s overall profile can help researchers to identify
more than 5% in the other intervals are removed. outliers. Such profiles are even more useful for inves-
tigating negative increments, because a visual check
• Plot. Any further outlier is analyzed by plotting can identify which point is suspicious rather than al-
weight and height against age by sex and the three ways assuming that the second observation in a pair
ethnicity categories. is wrong, as is the case with the current BiB process.
• Combine height and weight observations. An-
other plot shows weight against height to check
for further outliers.
4 MonAT
• Ponderal Index (a ratio of a person’s height to
weight) is calculated and plotted against age by
This section list the requirements and describes the
sex and ethnicity to check for further outliers.
design and implementation of novel visualization
tool, MonAT, which allows researchers to profile data
3.2 Limitations by combining basic computations and human cogni-
tive capabilities.
Our analysis highlighted three key limitations in the
BiB data cleansing process. First, the process does
not consider missing data at all, which prevents feed-
4.1 Requirements
back being given to data providers and places the onus
for investigating missingness solely on the users of Based on the limitations discussed in 3.2, we identify
BiB data. two key requirements for our tool.
Second, the process only cleans a subset of the Profiling Completeness. A normal statistical ap-
variables that are in a given data set. For example, proach to deal with missingness is to remove records
BiB only cleaned the weight and height variables in containing missing data. However, this can lead to bi-
the anthropometric dataset. There may also be data ased results. Missing data profiling (Table 1) can help
28
MonAT: A Visual Web-based Tool to Profile Health Data Quality
Figure 1: Screen shot showing the three main areas of MonAT. The Horizontal Menu (HM) is on the top. The Data Quality
Dimension Menu (DQDM) on the left shows the Completeness sub-menu expanded. It contains the four filters: the List
of Variables Filter (DQDM.1), the Group Filter (DQDM.2), the Chart Filter (DQDM.3), and the Color Filter (DQDM.4).
The Visualization Area (VA) in the middle-right-bottom shows Present-Missing Overview bar chart (VA.1), Tables overview
(VA.2), and Grouped Present-Missing Data (VA.3).
to mitigate bias when researchers are defining data in- Control (MVC). MonAT web interface (Figure 1) is
clusion criteria. divided into three main areas: the Horizontal Menu
Profiling Correctness. Abnormal observations can (HM), the Data Quality Dimension Menu (DQDM),
lead to misleading findings. Outliers can occur in cat- and the Visualization Area (VA).
egorical variables due to erroneous free input text or The HM contains a function to select a local flat
data processing errors. In numeric variables outliers file. Statistical information and some additional vari-
can be due to mistyping, measurement errors, or data ables for managing page layout are automatically cal-
processing errors. When observations are related to culated.
each other, longitudinal data profiling can improve This menu stores the data in local memory in
outlier identification. JSON format object. The type of variable (numer-
Other, general requirements were as follows. ical, categorical, index or date), number of present
First, a tabular view showing summary statistics (e.g., and missed observations per each variable are pre-
minimum, maximun and mean of numerical obser- calculated and stored in the JSON object. For numeri-
vations, and the number of categories in categorical cal variables, minimum, mean, and maximum are cal-
variables) is important to provide an overview of data. culated. For categorical variables, a list of categories
Second, MonAT needs to be accessible to researchers is created. The scope of all this information is the
without specialist knowledge of statistical tools and root: the variables can be accessed from every com-
programming languages (e.g., STATA and R). Third, ponent. Some additional variables are added with a
the interface should be user friendly and intuitive, and root scope to allow flexible layouts to be created.
support workflows that are easy to learn and follow. The DQDM is a dynamic menu that maps the di-
Fourth, researchers should find that MonAT provides mensions of data quality (Weiskopf and Weng, 2013)
added value for data profiling. to sub-menus. The application automatically creates
this menu when user upload a file. Currently there are
4.2 Design and Implementation two sub-menus - one for ‘Completeness’ and one for
‘Correctness’.
MonAT is a web-base tool implemented using Django The VA is the core of MonAT, and where it shows
Rest Framework, AngularJS, and Krispo’s nvd3 (D3) visualization and tabular output in response to users’
reusable charts. interactions. We designed different VA components
The architecture of MonAT follows the concepts for profiling completeness and correctness.
of Single Page Application (SAP) and Model View
29
HEALTHINF 2017 - 10th International Conference on Health Informatics
(a) (b)
Figure 2: The Present-Missing Overview bar chart, showing the number of present and missing observations (orange and
black bars, respectively) for nine variables. The plots show missingness for: (a) all 500 records in the data set, and (b) the 154
records where the ‘eth0eth9grp variable is missing (selected by clicking on the black bar for that variable in (a)).
4.2.1 Completeness two numerical variables that create a plot (Figure 3.a).
The two variables are respectively the x and y axes of
Interactions with the Completeness DQDM creates the plot. The filter automatically creates a contextual
VA components to explore different levels of missing- menu (Figure 3.b), a series of checkboxes that allows
ness (Table 1). users to visualize Data in Context and Distributions.
The checkbox List of Variables Filter (Figure 1 - The Data in Context (Figure 3.a) can be analyzed
DQDM.1) represents the Domain of the data (Table to evaluate sufficiency, task coverage and variable
1.a). It allows users to understand what tasks can be flexibility (Table 1.d, 1.f, and 1.g) by interacting with
answered with the set of variables (Table 1.f). the contextual menu (Figure 3.b) and Logic Function
Interactions with the checkbox list create a Filter (3.c).
Present-Missing Overview (Figure 1 - VA.1), and Ta- The Logic Function Filter allows investigation of
bles Overview (Figure 1 - VA.2). variables’ missingness with ‘AND’ and ‘OR’ opera-
The Present-Missing Overview, a grouped/stacked tions.
interactive bar chart, shows missing and present val- The Distribution (Figure 3.d and 3.e) shows the
ues, calculated over all the entries (Table 1.b). It al- number of missing values of selected variable, in re-
lows analysis of data quantity (Table 1.c and Figure spect of the two axes of the scatterplot to investigate
2). correlation of missingness between variables. It can
The Tables Overview shows four tables, one for be used to evaluate the Missing Data Mechanisms.
each type of variable (numerical, categorical, index,
and date) with the number of present and missing ob- 4.2.2 Correctness
servations, categories and statistical information.
The Group Filter (Figure 1 - DQDM.2) is a drop- Users may analyze correctness by interacting with
down menu for selecting a variable to group the data. the Correctness DQDM. The set of filters is similar
It creates the Grouped Present-Missing Data (Figure to the Completeness DQDM, but the VA components
1 - VA.3), a grouped bar chart, which shows infor- change.
mation about number of groups that miss variables Interactions with the Distribution Filter, a check-
selected in the List of Variables Filter (Figure 1 - box list of variables, shows a boxplot for each selected
DQDM.1). The y axis represents the number of miss- variable, allowing users to detect outliers for numeri-
ing observations and the bar length represents a vari- cal values (points above or below the upper and lower
able. Each barsize represents the number of groups whiskers) (Table 2.h and 2.i).
missing a variable. It is useful for inclusion criteria The Chart Filter creates a Data in Context view
giving information of sufficiency and relevant obser- to let users detect outliers and analyze negative incre-
vations (Table 1.b and 1.e). ment on longitudinal data. It helps to analyze correct-
The Chart Filter (Figure 1 - DQDM.3) is a combi- ness and suitability of the data for a given task (Table
nation of two drop-down menu allowing selection of 2.i and Table 2.l). It can also be used to spot variation
30
MonAT: A Visual Web-based Tool to Profile Health Data Quality
Figure 3: The VA shows Data in Context. A contextual menu (b) allows show missing and present observations of selected
variables (eth0thgrp, ethgrp4, and height) in the age against weight scatterplot (a) with an AND operation (Logic Function
Filter c). The contextual menu also contains a check box button to show/hide Distributions (d, e) of the selected variables.
in categories (i.e., variation of ethnicity category for a respectively. The fourth participant was a PhD stu-
given child) (Table 2.h). dent with experience in data analysis.
5.1.2 Materials
5 MonAT EVALUATION A set of exercises were created with the aim to high-
light issues in the tool and identify new functions for
This section describes a formative evaluation of the release version of MonAT. The exercises tested
MonAT, using the BiB Project anthropometric data the main functions of Completeness (4.2.1) and Cor-
set. We carried out a formative evaluation to list a rectness (4.2.2) dimensions. Examples of the Visual-
minimum set of functions that end-users would bene- ization Components are shown in Figures 1 and 3.
fit while using the tool.
The aims of the evaluation were to assess the value 5.1.3 Procedure
of MonAT’s existing functionality for investigating
data completeness and correctness, and to identify im- At the start of the evaluation, participants were given
portant additional functionality for the tool. an information sheet about the aims of the evaluation,
a description of the data set, and a brief description
of the MonAT functionality. Then participants were
5.1 Method asked to think aloud while they completed some data
completeness and correctness exercises. If they were
This section presents information on recruited partic- uncertain about anything, participants were encour-
ipants, materials and procedure for the evaluation. aged to ask the experimenter questions during the ex-
ercises. At the end of the exercises the experimenter
5.1.1 Participants conducted a semi-structured interview to gain further
feedback about MonAT and identify additional func-
We recruited four participants aged between 28 and tionality that participants thought would be beneficial.
51. One of them had worked at the Bradford Institute The first set of exercises required the use of
for Health Research (BIHR) for two years and was MonAT to investigate the completeness functionality.
knowledgeable about the BiB Data Collection (BiB Participants started by selecting a subset of vari-
DC). Two of them were post-doctoral researchers, ables listed in the completeness DQDM and eval-
with experience of visual analytics and data analysis, uated the Present-Missing Overview and the Tables
31
HEALTHINF 2017 - 10th International Conference on Health Informatics
Overview. Then, they used the Group Filter to inves- ing observations for selected variables (in this case
tigate missingness in the groups. eth0eth9gp and height), grouped by the value of an-
The next steps were to plot a chart, select some other variable (in this case ‘childID’). Participants ini-
variables in the Contextual Menu and evaluate the tially found it difficult to understand the meaning of
differences between visualizing values in logic AND this visualization but, once they did, they considered
and logic OR. Finally, they visualized the Distribution it to be useful for investigating whether groups had
charts. sufficient values for a given task (Table 1.d and 1.e).
The second set of exercises focused on the cor- Participants suggested being able to interact with
rectness functionality. Participants interacted with the bars in the Grouped Present-Missing Data (as it is
Correctness DQDM to dynamically create the visual- for the Present-Missing Overview) to show frequency
izations and detect outliers. distributions of missing values. They also said they
would like to be able to select more than one group.
5.2 Results For example to include in the further analysis groups
having no missing values or not more than one value
Overall, participants were impressed by the novel ca- missed for a given variable.
pabilities of MonAT. This section reports participants The scatterplot (Figures 3) shows missing and
main comments and suggestions. present Data in Context. The contextual menu (at
Participants found the Present-Missing Overview the top of the Figure 3) allows users to include vari-
(Figure 1 VA.1) useful for understanding how miss- ables in the scatterplot. Participants found it useful to
ingness varied across variables, and especially having visualize how categorical missing observations relate
the possibility to select a subset of the records. For ex- to the scatterplot variables. For example (Figure 3a)
ample, the chart shows that there is a similar amount the three selected variables (eth0ethgr, ethgrp4 and
of missing data for the ethnicity variables (first five height) shown in AND, present missing data mostly
black bars). By selecting one of these bars, the par- in early children days (from 0 to 300). Participants
ticipant can explore that similarity, and an example is considered it useful to be able to ‘AND’ or ‘OR’ the
shown in Figure 2. Participants preferred stacked bars selected variables, and suggested that ‘XOR’ (only
for that rather than grouped bars. one of the selected variables is missing) would also
The participants liked the Tables Overview (Fig- be useful.
ure 1 VA.2). However they recommended that it was Participants made a number of other comments,
shown in a separate panel to leave the focus on the which were as follows. The Distributions that are
visual chart. shown in the bar charts of Figure 3 are difficult to see,
which could be addressed by binning the data to re-
duce the number of bars that are drawn.
Referring to the correctness exercises, the scatter-
plot and the scatterplot with lines (Figure 5) show
Data in Context to reveal outliers. Investigating the
data as single points may lead to some of them being
defined as outliers because they lie above the 99.9th
percentile (Figure 5a). However, a longitudinal visu-
alization indicates that some of those points are cor-
rect because they are from a single child and follow
a reasonable curve (Figure 5b). Participants found
these scatterplots useful to visualize the longitudinal
data to explore correctness. However, to improve the
legibility of a plot they suggested the use of bins to
Figure 4: The x axis shows the number of groups hav- visualize a subset of the data. The number of groups
ing missing data for selected variables (age, gender, height,
(children) should be low to avoid confusion. More-
weight). In this example there are 21 children (groups) over
154 records. The y axis shows the number of missing values over, the longitudinal groups should be smartly se-
per variable. In this example, there are four children miss- lected to avoid overlaps in the visualization.
ing exactly three observations for the height. A mouse over Overall, participants found MonAT useful for pro-
on bar displays a tooltip that shows related information. filing the quality of the data. They suggested adding
‘print’ and ‘download’ function for each visualiza-
The Grouped Present-Missing Data (Figure 1 tion, so the visualizations can be easily included in
VA.3 and Figure 4) shows the number of miss- presentations and reports. Moreover, the tool can be
32
MonAT: A Visual Web-based Tool to Profile Health Data Quality
(a) (b)
Figure 5: Data in Context for outlier identification, showing: (a) all of the height data for female children (the red points lie
above the 99.9th percentile), and (b) the height profile of a single child (the red line and points).
33
HEALTHINF 2017 - 10th International Conference on Health Informatics
34
Comparison of Different Implementations of a Process Limiting
Pharmaceutical Expenditures Required by German Law
Keywords: Controlling Measures, Outpatient Care, Morbidity Adjusted Benchmark, Prescription Data, MRG, Big Data.
Abstract: German legislation demands controlling measures for outpatient drug costs. As of 2017 the health insurance
actors rose to a challenge to reform the benchmark system on the federal state level. We look at the previous
system applied until 2015, the improvements in 2016 and the method the regional parties agree on for 2017.
After discussing hard- and software systems and the underlying data briefly we describe the flaws of the old
approach and develop a general model for controlling measures in the outpatient field. Finally we present the
first real world applications of the new model: a patient type classification system leading to target costs and a
derived distance structure of physicians regarding their prescription behaviour.
35
Emcke, T., Ostermann, T., Heidbreder, M. and Schuster, R.
Comparison of Different Implementations of a Process Limiting Pharmaceutical Expenditures Required by German Law.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 35-40
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
36
Comparison of Different Implementations of a Process Limiting Pharmaceutical Expenditures Required by German Law
k2∗ (c∗ , f ∗ , j∗ ) = m p∈P: f (b(p))= f ∗ ,c(p)=c∗ ,v(p)= j∗ k̄(p, c∗ ) ratio of costs per patient in the subgroup compared
with the corresponding degree of severity: to the whole MRG was considered. If the ratio lies in
certain intervals (0-0.5, 0.5-0.75, 0.75-1.25,..., 10) the
i2 (c, f , j) = i k2∗ (c, f , j)/k∗ (c, f ) . age severity level 0,1,...,9 were assigned. The same
can be conducted with respect to other factors corre-
The same can be done by looking at prescription in- lated with morbidity. By using subgroup structures a
tensity: risk adjustment can be accomplished. All of this has
k3∗ (c∗ , f ∗ , j∗ ) = m p∈P: f (b(p))= f ∗ ,c(p)=c∗ ,ō(p)= j∗ k̄(p, c∗ ) not to be precise on the level of the patient but on
the physicians level. Regarding the considered MRG
A10A (Insulins and analogues) seven degrees of se-
i3 (c, f , j) = i k3∗ (c, f , j)/k∗ (c, f ) .
verity in the range of 101.27 e up to 1,385.61 e re-
Total degree
of severity is given by: sulted:
i(p) = max i1 (c(p), f (b(p),t(p)), i2 (c(p)), f (b(p)), v(p)),
Table 2: Example of severity levels of MRG A10A.
i3 (c(p)), f (b(p), ō(p)) . degree cost in Euro number of patients
The MRG including severity levels is recalculated
2 101.27 21
with respect to physician groups: 3 273.68 60,634
kg∗ (c∗ , f ∗ , j∗ ) = m p∈P: f (b(p))= f ∗ ,c(p)=c∗ ,i(p)= j∗ k̄(p, c∗ ) . 4 517.87 16,840
5 707.95 20,904
Thereby we get the target cost for benchmarking the
6 995.74 2,085
physician:
7 1,385.61 1,954
80%
severity of drug treatment and could also take other 70%
weight functions instead of cost. The following is an
costs in %
60%
20%
10%
Table 1: Example of (basic) MRG determination. 0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
37
HEALTHINF 2017 - 10th International Conference on Health Informatics
y = 0.9505x + 0.0514
2.7608 84,660 dermatologists R² = 0.9784
150%
2.7552 16,155 surgeons
2.7327 40,045 neck nose ear physician
100%
2.6253 91,868 gynaecologists
2.4939 37,199 urologists
50%
2.2263 49,653 neurologists
2.1716 1,325 endocrinologists 0%
0% 50% 100% 150% 200% 250%
2.1210 3,851 rheumatologists benchmarking result health insurance status
2.0282 40,149 orthopaedic
Figure 3: Correlation of benchmarks using health insurance
1.6552 2,123 anaesthetists
status vs. age groups.
1.4179 51,819 ophthalmologists
1.3517 26,392 pulmonologists
1.1722 7,003 psychiatrists
Hence, a new system based on MRG is introduced
in 2017. There is little correlation between the results
obtained by the previous and the new results on the
practitioners level. That‘s due to the fact that many
3 RESULTS factors were disregarded in the past and inconsisten-
cies were compensated by “manual intervention“:
The application of the treatment case oriented approa-
correlation of benchmarking results at the practitioners' level
ches over the last decades showed that these systems 200%
benchmarking results of practices using the
150%
0%
0% 25% 50% 75% 100% 125% 150% 175% 200%
age dependent treatment cases per insurance status benchmarking result of practices using the MRG approach used in 2017
300,000
Figure 4: Correlation of benchmarks applying the previous
250,000 (until 2016) and the new approach (2017).
treatment cases
200,000
38
Comparison of Different Implementations of a Process Limiting Pharmaceutical Expenditures Required by German Law
In those new MRG models all patients of a cer- for the patient) versus 2,515.02 e for orthopedics. In
tain practice are classified and a specific structure for urology the top ten positions with respect to the num-
each practice is the result. As an example, we consider ber of patients cover 83.6 % of the costs. In the case
a physician with 14.0 % of his patients in the MRG of GP these costs are only 44.2 %:
A10A (Insulins and analogues) and 11.8 % patients in
the MRG V04C (other diagnostic agents = test strips Table 7: MRG patient shares of urologists.
measuring glucose). In this group of general practi-
frac. cost MRG drug group
tioners (GP) patients in those groups only account for pat. p. pat.
3.8 % in these two groups. The physician can thereby
34.8% 44.67 G04C Drugs used in benign prostatic hypertrophy
be identified as a diabetologist:
16.7% 136.12 G04B Other urologicals, incl. antispasmodics
39
HEALTHINF 2017 - 10th International Conference on Health Informatics
We can define the discipline t ∈ S of a physician Schuster, R. and Voss, H. (2012). Mediziner-technischer
k ∈ P by the value s ∈ S for which: Fortschritt und demografischer Wandel bei den GKV-
Ausgaben im DRG-Bereich im Krankenhaus. GMDS
∑ |pm
k − qm |
s
2012.
m∈M Schuster, R. Emcke, T. and Schuster, F. (2016). Ver-
has a minimal value. The distance of a physician to a gleich der Richtgrößenauswertungen für Arzneimittel
im Vertragsärztlichen Bereich mit Statusgruppen und
group measures to which extent he is typical or not. Altersgruppen. HEC 2016.
Extreme values may be a hint for the need for spe-
Sinowatz, F. (2015). Ressourcenalokation in der hausärztli-
cial considerations. One can use cluster methods in chen Versorgung: eine empirische Untersuchung. Dis-
order to receive a classification of physicians without sertation LMU München: Medizinische Fakultät.
the use of their medical discipline which is primarily Spitzenverband der Krankenkassen Bund und Kassenärzt-
determined by admission law. liche Bundesvereinigung (2015). Rahmenvorgaben
nach 84 Abs. 7 SGB V -Arzneimittel- für das Jahr
2015.
Wersborg, T. (2006). Morbiditätsbezogene Richtgrößen
4 CONCLUSIONS zur Steuerung einer bedarfsgerechten und wirtschaft-
lichen Arzneimittelversorgung innerhalb der gesetzli-
The 2016 switch from health insurance status to age chen Krankenversicherung in Deutschland. Disserta-
groups did not eliminate the flaws of the old bench- tion LMU München: Medizinische Fakultät.
marking/budget approach. New promising ideas on
the regional level like MRG have a huge potential still
to be researched and utilized. The necessary data is
provided, hard-/software and knowledge are availa-
ble. Steady change and especially new form of he-
alth care require adapting benchmarking systems on
a sound data and legal foundation. Therefore MRG
seems to be a highly suitable approach meeting the
criteria.
REFERENCES
Bratzke, B. Spies, K.-P. and Krebs, S. (2012). Morbi-
ditätskomponente bei Arznei- und Heilmittelbudgets
einführen. Deutscher Ärztetag, Drucksache V I-37.
Breyer, F. and Ulrich, F. (2000). Gesundheitsausgaben, Al-
ter und medizinischer Fortschritt: Eine Regressions-
analyse. Jahrbücher für Nationalökonomie und Stati-
stik, 220:1–17.
Busse, R. Panteli, D. and Krebs, S. (2015). Arzneimittel-
versorgung in der GKV und 15 anderen europäischen
Gesundheitssystemen: Ein systematischer Vergleich.
Working papers in health policy and management.
Universitätsverlag der TU Berlin, 11.
GKV Versorgungsstärkungsgesetz (GKV-VSG) (2015).
BGBl., I:1211.
Gottwald, N. (2015). Damoklesschwert Richtgrößen-
prüfung. Im Dschungel der 25-Prozent-Regel. HNO-
Nachrichten. Springer, 3.
Korzilius, N. (2015). Arzneimittelrichtgrößen: Ärzte sollen
angstfrei verordnen. Dtsch Arztebl, 112.
Schuster, R. (2015). Morbidity Related Groups (MRG) and
drug economic index - a new concept after the age of
Richtgrößen benchmarks in Germany. GAA 2015.
Schuster, R. and von Arnstedt, E. (2012). Mediziner-
technischer Fortschritt und demografischer Wandel
bei den GKV-Ausgaben im Vertragärztlichen Bereich.
GMDS 2011.
40
Deviations in Birth Rates with Respect to the Day of the Week and the
Month for a 100 Year Period Regarding Social and Medical Aspects in
Explaining Models
Keywords: Sunday Births, Long Time Considerations, Social Aspects, Instable Problems, Shannon Entropy, Gini
Coeffient.
Abstract: During the last hundred years the birth rates on Sundays changed dramatically with a neutral point around
1955. Modern birth regulation is considered as the main reason for that. Medical backgrounds for this situation
were discussed in the 1970s. Prior to that no analysis has relevant case numbers. The time from conception
to birth measured in days is divisable by 7. The time of conception is relevant in relation to social aspects.
Conception rates can be determined under the assumption that we can split up the population in a low and a
high risk share. This consideration principally leads to an instable problem on a discrete cyclic space. But
using some limiting considerations we get a numerically stable solution with feasible characteristics. For
observing long time changes we need a relevant smoothing operator. In numerical calculations we look for a
quadratic minimum solution or alternatively a linear program. For the discussion of inequality the concept of
Shannon entropy as well as and Lorenz curve and Gini coefficient are relevant.
1 INTRODUCTION 10,0%
Long time deviations of births on Tuesday, Wednesday and Sunday 1910-2005
the statutory health and care insurances. Reduced 1910 1915 1920 1925 1930 1935 1940 1945 1950 1955 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005
deviation
Tue
birthrates at weekends are usually discussed in the -5,0% Wed
Sun
related to insurance benefits decades later. Even sur- Figure 1: Long term development of birth rates on Tuesday,
vival rates may depend on weekday of birth. On the Wednesday and Sunday 1910-2005.
other hand the benefits of health insurance may de-
pend on the underlying risk structure. Even the health fluences cause short and long term changes. In order
status (”medical age”) may also depend on the week- to avoid large variations we use a 5 year smoothing of
day of birth. data. Interesting points are the day of birth and day
Next we consider different daily birth rates and health of fertilization 100-85 years ago with varying social
costs with respect to the month of birth during differ- background. Large amounts of data are required to
ent decades of the last century. Social and medical in- determine significant statistical effects. For this time
41
Schuster, F., Ostermann, T., Schuster, R. and Emcke, T.
Deviations in Birth Rates with Respect to the Day of the Week and the Month for a 100 Year Period Regarding Social and Medical Aspects in Explaining Models.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 41-47
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
period no register data are digitally available in the ex- gories: first three days after birth and mothers with
tend needed. One has to take into account the exten- an age under or over 50 years. A derived, more de-
sive migration movements during the last 100 years. tailed refinement could lead to mortality tables in de-
A possible solution might be given by aggregated dig- pendence of the day and month of birth. Due to the
ital administrative data of health and care insurances. low availability of historical information this remains
But precise resolution (day) is rarely available after a modeling challenge.
aggregation has been done for other reasons. The The time from the last menstrual period (LMP) to
first discussion of the influence of the weekday of childbirth is usually taken as 40 weeks or 280 days.
birth on a large data base was given in (Macfarlane, Pregnancy from conception to childbirth is 38 weeks
1978) and (Mathers, 1983) using birth data of the or 266 days long. But there are no large scale mea-
seventies, our data focuses on some decades before. surements for mean values and standard deviations
Furthermore the number of births with respect to the and in particular about deviations from normal dis-
weekday differs much from the current pattern. Re- tribution. We can divide the population into two sub-
lated backgrounds are discussed in the stated refer- sets with respect to high and low pregnancy risk: X =
ences (cf.(Kibele et al., 2013), (Klein et al., 2001), X1 + X2 as random variables. Let s(X) be the standard
(Klein and Unger, 2002), (Lampert and Kroll, 2014), deviation of X. We use s(X1 ) < s(X2 ). It is known
(Ma et al., 2012), (Mackenbach, 2006), (Schnell and from literature that we have 9 < s(X) < 13. We use
Trappmann, 2006), (Schuster and Emcke, 2016), (Os- s(X1 ) = 1, 2, 3. X1 leads to increasing peaks, X2 gives
termann and Schuster, 2015)). a nearly uniform variation to all days. If fertilization
data would be given, the distribution of the random
variable length of pregnancy would be a smoothing
parameter on cyclic space (with discretization to days
2 MATERIAL AND METHODS of week). But if we have given the birth data and
want to derive the weekday distribution of the fertil-
We use health and care insurance data from a German ization we get an inversion operator which tends to be
federal state. With respect to sufficient statistical sig- instable. Constraints lead to numerical stabilization.
nificance in the care insurance field we can go as far We start with a quadratic-deviations model. Let f(i)
back as people born in 1905 by using data from 1998 be the observed deviation from 1/7 for likelihood of
till 2006, in the health insurance data from 2006 one birth at day i (i = 0, 1,...,6) and w(i) the fertilization
can track back until 1920. Although we only need deviation pattern at day i (i = 0, 1,..., 6). Than ds ( j)
aggregated data, such data with a weekday resolution shall be the translation of j days by normal distribu-
are rarely available. tion with standard deviation s using integer intervals.
We use the script language perl in order to aggregate We look for the quadratic minimum:
data and for the association of day of the week and 2
date. If we refer to birth rates with respect to months 6 30
we have to take into account their different lengths. ∑ f (i) − ∑ d(i − j)w( j) −→ Min!
Gender was only available for the care insurance data. i=0 j=−30
The detailed insurance can be identified by a 9-digit with the constraints −1 < −a < w(i) < b < 1. Prac-
identification code (IK-number). We used a reference tically we use a = b = 1/(7 ∗ 5) in order to limit the
table containing the insurance type in order to get a deviation for each day with respect to the mean of the
known social indication. week to 20 %. Alternatively we could use linear pro-
If we use drug data, there is information about addi- gramming:
tional private payment of patients. Patients with low
30
social status have an additional payment exemption.
There is also a mixed status in which patients get an f (i) − ∑ d(i − j)w( j) < s, s −→ Min!
j=−30
additional payment exemption after having payed a
certain amount themselves. We are interested in the For calculations we use Microsoft Excel and Mathe-
social circumstances during birth, but we measure the matica from Wolfram Research.
social status many years later. A Markov model for In order consider the different deviations during the
transition of states would be useful. But there is no considered time period we use the concept of Shan-
real information about transition rates. If we assume non entropie ∑6i=0 −pi ln(pi ) for the birth rates pi
that the states are stable, we underestimate social ef- at day i. The same considerations we can adopt to
fects. months instead of the weekdays. Alternative mea-
Another type of analysis could combine low and high sures of the inequality are given by the Lorenz Curve
risk at birth with a survival in the following cate- and the related Gini coefficient. In order to quan-
42
Deviations in Birth Rates with Respect to the Day of the Week and the Month for a 100 Year Period Regarding Social and Medical Aspects
in Explaining Models
tify the deviation from the equal distribution we de- other weekdays are somewhere between with instabil-
fine xi = pi − 1/7 and from ∑6i=0 pi = 1 it follows ities with respect to time periods. One has to take into
∑6i=0 xi = 0. The function (1/7 + x) ln(1/7 + x) has consideration that only about 20% of the people ever
the Taylor series: −ln(7)/7 + x(1 − ln(7)) + 7x2 /2 − get benefits of care insurance. In contrast to this the
49x3 /6 + O(x4 ) . As result we get a constant if we great majority of older people gets at least one drug
sum up the index i from 0 to 6 (with respect to the each year. If we use drug prescription data of 2006
weekdays, with respect to the months we have to sum we get the distribution of birth rates in Figure 4. There
up from 0 to 11). Therefore the entropy reflects a Deviations in the weekday of birth (weighted)
tion between Shannon entropy and Gini coefficient Monday Tuesday Wednesday Thursday Friday Saturday Sunday J 1920-1924
J 1925-1929
0.004
Figure 4: Deviations of birth rates in dependence of the
0.003 weekday (health insurance data).
0.002
are only small differences if we use drug prescription
0.001
data of 2007 or 2008. At Saturdays the birth rates are
less increased compared to care insurance, the rates
- 0.06 - 0.04 - 0.02 0.02 0.04 0.06
at Sundays are even larger. The reduced birth rates
on Tuesdays and Wednesdays correspond with the re-
- 0.001
sults from the care insurance analysis.
- 0.002 If we compare the drug costs of the patients born
between 1920 and 1924 with those born between
Figure 2: Difference of term in the Shannon sum and its 1925 and 1929 we find an average annual increase
quadratic Taylor series representation. of 1.51%. For such considerations it is important to
use an age group with monotonously increasing drug
costs. Having regard to that we create subgroups with
respect to the weekday of birth, cf. Figure 5.
3 RESULTS drug cost deviations in 2006
n=144.533 patients
2,5%
dev. 1920-24
-0,5%
-1,0%
Deviations in the weekday of birth (care insurace)
-1,5%
6,0%
-2,0%
4,0% -2,5%
day of week
2,0%
Figure 5: Drug costs in dependence of the weekday of birth
J 1905-1909
0,0%
J 1910-1914
J 1915-1919
for age groups born 1920-24 and 1925-29.
Monday Tuesday Wednesday Thursday Friday Saturday Sunday J 1920-1924
J 1925-1929
-2,0%
The weekdays with increased and reduced costs do
-4,0%
not match those of increased and reduced birth rates.
The 1.51% increased drug costs of patients born on
-6,0% Saturdays can be interpreted as having a one year
Figure 3: Deviations of birth rates in dependence of the higher biological age than calendar age. On the
weekday (care insurance data). other hand the people born on Thursdays are one year
43
HEALTHINF 2017 - 10th International Conference on Health Informatics
0,0%
8% no copaiment copaiment mixed
-1,0%
6%
-2,0%
4% -3,0%
w -4,0%
2%
m
deviation
J 1920-24
-5,0%
J 1925-29
0%
1900 1905 1910 1915 1920 1925 1930 1935 1940 1945 1950 -6,0%
-2% -7,0%
-8,0%
-4%
-9,0%
-6%
-10,0%
category
Next we consider subgroups with respect to the social Deviation of the birth rates from social status
10%
status. We use additional payment as a proxy. 9%
8%
Deviation of the birth rates from social status 1920-24
8% 7%
6% 6%
deviation
J 1920-24
5%
4% J 1925-29
4%
2%
3%
0%
deviation
no copaiment
Mon Tue Wed Thu Fri Sat Sun 2%
copaiment
-2% mixed
1%
-4%
0%
no copaiment copaiment mixed
-6% category
-8%
Figure 10: Birth rates on Sundays in dependence of the so-
-10%
day of week
cial status in 1920-24 vs. 1925-29.
Figure 7: Birth rates in dependence of the social status and Additionally we can use social information using the
the weekday of birth for the period 1920-24.
type of insurance, cf. Figure 11.
Deviations for birth rates on Sundays in dependence of socials status due to insurance type
social week
3%
none week
10%
1%
8% 0%
1900 1905 1910 1915 1920 1925 1930 1935 1940 1945 1950
-1%
6%
-2%
year
4%
no copaiment
2% copaiment
mixed
Figure 11: Birth rates on Sundays in dependence of the so-
0%
cial status using health insurance type.
Mon Tue Wed Thu Fri Sat Sun
-2%
We will consider the low risk population and cal-
-4%
culate the different fertility rates by the considered
-6% quadratic-deviations model with standard deviations
Figure 8: Birth rates in dependence of the social status and 1, 2 and 3 and a limitation of the rate deviations by
the weekday of birth for the period 1925-29. 20%, cf. Figure 12.
44
Deviations in Birth Rates with Respect to the Day of the Week and the Month for a 100 Year Period Regarding Social and Medical Aspects
in Explaining Models
25%
Both results show the global minimum for the year
20%
1955. We remember that this year separates the age
15%
of increased and that of reduced Sunday birth rates.
10% There is a different resolution between the entropy
5%
ori
and the Gini result. The Shannon entropy result uses a
deviation
0%
Sun Mon Tue Wed Thu Fry Sat
v1
v2
v3
nonlinear effect but does not order the used rates, the
-5%
Gini result is linear but uses ordered rates. Thereby it
-10%
is interesting that both results coincide so much.
-15%
-20%
Till now we have considered the weekday period. It
-25%
is also interesting to consider months.
weekday
birth rates in dependence of the quater of birth
10%
deviation
0% quater 1
values from 10% to 25%, we would get the same re- -15%
Shannon entropy and Gini coefficients have the same Figure 15: Birth rates in dependence of the quarter of birth.
behavior with respect to local maxima and minima.
Additionally we can use social information using the In 1920-1980 for the first six months there are in-
type of insurance, cf. Figure 13. creased birth rates. Reduced birth dates we have since
1920. Before 1920 the situation is quite different. The
Entropy with respect to the day of birth (x 1000)
25
mean costs in dependence of the month of birth are
quite heterogeneous with respect to different histori-
20
cal periods, cf. Figure 16.
cost deviations in dependence of the birth months
15
2,0%
1,5%
10
1,0%
0,5%
5
1910-1930
1935-1980
0,0%
1910-1980
Jan Feb Mar Apr May June July Aug Sept Oct Nov Dec
1960-1980
0
1905 1910 1915 1920 1925 1930 1935 1940 1945 1950 1955 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 -0,5%
20%
18%
Figure 16: Deviations in drug costs in dependence of the
16%
month of birth during different historical periods.
14%
12%
If we consider the period from 1920 till 1980, we have
10%
increased costs during the first half of the year and re-
8%
duced costs during the second half of the year. One
6% explanation could be, that the month of birth has dif-
4% ferent influences due to the historical period of birth.
2%
On the other hand the effect can depend on the age
0%
1905 1910 1915 1920 1925 1930 1935 1940 1945 1950 1955 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 of the persons. We compare the mean effect for birth
rates and drug costs from 1920 till 1980 with respect
Figure 14: Gini coefficient with respect to the weekdays of
to the quarters of the year, we see that generally in-
birth in dependence of 5 year periods.
creased birth rates and health status measured by drug
costs behave reverse, cf. Figure 17.
45
HEALTHINF 2017 - 10th International Conference on Health Informatics
-1,0%
birth rates
cost dev.
can suspect a strong connection to the residual life ex-
-2,0% pectancy. Thursday births around 90 years ago have
-3,0%
a one year higher residual life expectancy. Saturday
-4,0%
births have a one year lower residual life expectancy,
Sunday births have 4 months higher residual life ex-
-5,0%
quater pectancy. In contrast to the situation stated in Macfar-
Figure 17: Deviations in birth rates and drug costs with in lane (1978) lower perinatal mortality rates at week-
dependence of the quarters of the year. ends can be caused by the fact that quality of care was
higher due to family background. In those times spe-
Last we compare drug costs in dependence of the cialist obstetric services have been less common com-
quarter of the year for the two groups born from 1910 pared to later decades. It is quite important, that the
till 1930 versus the group born between 1960 an 1980, psycho-social near birth circumstances 90 years ago
cf. Figure 18. may induce significant differences today.
deviations in drug costs 1910-1930 vs. 1960-1980
1,2%
1,0%
0,8%
REFERENCES
0,6%
0,4%
0,2%
Kibele, E. U., Jasilionis, D., and Shkolnikov, V. M.
1910-1930
0,0%
1960-1980 (2013). Widening socioeconomic differences in mor-
-0,2%
Q1 Q2 Q3 Q4
tality among men aged 65 years and older in Germany.
-0,4%
J Epidemiol Community Health, 67(1):453–457.
-0,6% Klein, T., Schneider, S., and Löwel, H. (2001). Bildung
-0,8%
und Mortalität. die Bedeutung gesundheitsrelevanter
-1,0%
Aspekte des Lebensstils. Zeitschrift für Soziologie,
Figure 18: Deviations in drug costs in dependence of the 30(5):384–400.
month of birth during different historical periods. Klein, T. and Unger, R. (2002). Aktive Lebenserwartung in
Deutschland und in den USA. Zeitschrift für Geron-
The highest difference we have at quarter two. It can tologie und Geriatrie, 35:528–539.
be a consequence of different historical health condi- Lampert, T. and Kroll, L. (2014). Soziale Unterschiede
tions near to birth. An other explanation would be an in der Mortalitt und Lebenserwartung. Hrsg. Robert
age dependent effect. Koch-Institut, Berlin, 5(2).
Ma, J., Xu, J., Anderson, R., and Jemal, A. (2012). Widen-
ing educational disparities in premature death rates
in twenty six states in the United States, 1993-2007.
4 CONCLUSIONS PloS one, 7(7).
Macfarlane, A. (1978). Variations in number of births and
In order to consider the time between birth and mea- perinatal mortality by day of week in England and
surements using data of health and care insurance the Wales. British Medical Journal, 2:1670–1673.
following statements and guesses can be made regard- Mackenbach, J. (2006). Health inequalities: Europe in pro-
ing the results. file. An independent expert report commissioned by
the UK Presidency of the EU. Department of Health,
In scenario 1 more births measured in insurance data London.
can be caused by more real births in the considered
Mathers, C. (1983). Births and perinatal deaths in Australia:
time 1915-1930. That can be due to different concep- variations by day of week. Journal of Epidemiology
tion and/or fertilization possibilities depending on the and Community Health, 37:57–62.
day of the week. A bias may be caused by migration. Ostermann, T. and Schuster, R. (2015). An Information-
In scenario 2 the day of birth may causes different sur- theoretical Approach to Classify Hospitals with Re-
vival expectancies in the critical first three days after spect to Their Diagnostic Diversity using Shannon’s
birth and the related health conditions during these Entropy. HEALTHINF.
days. That is why we analyze drug costs in depen- Schnell, R. and Trappmann, M. (2006). Konsequen-
dence of the day of birth. As we already stated, drug zen der Panelmortalitt im SOEP fr Schätzungen der
46
Deviations in Birth Rates with Respect to the Day of the Week and the Month for a 100 Year Period Regarding Social and Medical Aspects
in Explaining Models
47
Pattern Recognition Application in ECG Arrhythmia Classification
Keywords: Arrhythmia Classification, Pattern Recognition, Beat Segmentation, 1-D LBP, ELM Classification.
Abstract: In this paper, we propose a pattern recognition algorithm for arrhythmia recognition. Irregularity in the
electrical activity of the heart (arrhythmia) is one of the leading reasons for sudden cardiac death in the
world. Developing automatic computer aided techniques to diagnose this condition with high accuracy can
play an important role in aiding cardiologists with decisions. In this work, we apply an adaptive
segmentation approach, based on the median value of R-R intervals, on the de-noised ECG signals from the
publically available MIT-BIH arrhythmia database and split signal into beat segments. The combination of
wavelet transform and uniform one dimensional local binary pattern (1-D LBP) is applied to extract sudden
variances and distinctive hidden patterns from ECG beats. Uniform 1-D LBP is not sensitive to noise and is
computationally effective. ELM classification is adopted to classify beat segments into five types, based on
the ANSI/AAMI EC57:1998 standard recommendation. Our preliminary experimental results show the
effectiveness of the proposed algorithm in beat classification with 98.99% accuracy compared to the state of
the art approaches.
48
Nikan, S., Gwadry-Sridhar, F. and Bauer, M.
Pattern Recognition Application in ECG Arrhythmia Classification.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 48-56
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Pattern Recognition Application in ECG Arrhythmia Classification
network classifier leads to 98.78% classification cumulants and independent component analysis)
accuracy between normal and abnormal beats. In features were proposed for heart beat representation.
(Kadambe and Srinivasan, 2006), normal and An accuracy of 98.91% was achieved using the
abnormal time domain features, P, QRS and T fusion of SVM and radial basis function classifiers
waves from American Heart Association database to classify five types of arrhythmia. The
were classified with the accuracy of 96%, 90% and combination of fourth and fifth scale dual-tree
93.3%, respectively, by discretizing the wavelet complex wavelet transform (DTCWT) coefficients,
basis function using an adaptive sampling scheme. AC power, kurtosis, skewness and timing
Adaptive parameters of wavelet non-linear functions information were adopted in (Thomas et al., 2015)
and the relative weight of each basis function were as QRS characteristics. Multi-layer back propagation
estimated using a neural network. An accuracy of neural network was proposed to classify five types
99.65% for arrhythmia recognition was reported in of ECG beats of MIT-BIH Arrhythmia database with
(Yu and Chen, 2007) using wavelet transform and a the accuracy of 94.64%.
probabilistic neural network. However, a small As discussed, encouraging results on the
subset of MIT-BIH ECG database (only 23 records) arrhythmia classification have been obtained in
was employed for evaluation. In order to classify previous research. However, more applicable and
ECG beats, the authors in (Ebrahimzadeh and fully automatic techniques with high accuracy and
Khazaee, 2009) adopted statistical features from low complexity need to be developed. In particular,
Lyapunov exponents and wavelet coefficients power developing automatic computer aided segmentation
spectral density (PSD) values of eigenvectors and of ECG signal into heart beats is very important as
achieved a 94.64% accuracy for eight records from the first stage in beat classification. In previous
MIT-BIH arrhythmia database. Due to the effect of research (Thomas et al., 2015; Khalaf et al., 2015),
noise, and the nonstationary nature of ECG signal, R peaks were located using an annotated file which
nonlinear techniques appear to be more effective in makes the techniques semi-automatic. In contrast, in
extracting distinctive and hidden characteristics of the approach proposed in this paper, R peaks are
ECG signals. In (Martis et al., 2013b), higher order detected automatically based on a parabolic fitting
spectra (HOS) bi-spectrum cumulants and PCA algorithm. Moreover, a novel adaptive segmentation
dimensionality reduction approach were adopted to technique used in our work reduces the probability
represent ECG signals and feed-forward neural of beat misclassification and the risk of misdiagnosis
network and least square support vector machine due to the interference of adjacent beats which may
(SVM) were used for classifying different types of occur when a constant beat size was used as in
beats with an accuracy of 93.48%. In (Khalaf et al., previous works (Martis et al., 2013a; Elhaj et al.,
2015), a cyclostationary analysis was proposed as a 2016). As well, the chosen feature extraction
feature extraction approach to reduce the effect of technique has significant role in the accuracy of
noise and also to reveal hidden periodicities of ECG diagnosis. By discovering hidden patterns and
beats where spectral correlation coefficients were extracting distinctive features from the ECG signal,
utilised as statistical signal characteristics and which are less sensitive to noise, the accuracy of
passed through SVM for classification; this results in arrhythmia classification can be improved without
an accuracy of 98.6% for 30 records of the MIT-BIH requiring very complicated classifiers. Uniform 1-D
Arrhythmia database. Authors in (Oster et al., 2015) local binary pattern (LBP), used in our work, has the
proposed a switching Kalman filter technique for advantage of less sensitivity to noise and
arrhythmia classification, and automatic selection of effectiveness in extracting hidden and salient
beat type. This method also includes a beat type for information from non-stationary ECG signals and
unknown morphologies “X-factor” which due to low computational complexity, it can be
incorporates a form of uncertainty in classification employed in real-time applications (Kaya et al.,
for the case of indecision on the beat type. The 2014).
classification F1 score of the algorithm on MIT-BIH The proposed arrhythmia recognition approach
arrhythmia database was 98.3%. Employing the in this paper is based on beat classification by
fusion of linear and nonlinear features has benefits adopting the fusion of wavelet transform and
the advantages of handling noise and a more uniform 1-D LBP feature extraction of ECG signal
effective description of the signal. In (Elhaj et al., and extreme learning machine (ELM) classification.
2016), a combination of linear (PCA of DWT The ECG signal is pre-processed to remove the
coefficients) and nonlinear (high order statistics, unwanted effect of noise. Then, the de-noised signal
49
HEALTHINF 2017 - 10th International Conference on Health Informatics
Figure 1: Block diagram of the proposed arrhythmia recognition and classification algorithm.
50
Pattern Recognition Application in ECG Arrhythmia Classification
Tompkins, 1985).
൫ଵି௭ షయమ ൯
ܪሺݖሻ ൌ ି ݖଵ െ ሺଵି௭ షభ ሻ
. (3)
4 BEAT SEGMENTATION
Figure 2: Five categories of ECG beat classes based on the In order to recognize arrhythmia, we had to compute
ANSI/AAMI EC57-1998 standard. a beat classification by dividing each ECG signal
into beat segments and classify different types of
beats. The segmentation process consists of R peak
3 PREPROCESSING detection and isolation of beats based on the
duration of R-R intervals.
The effect of noise on the ECG signal reduces the
accuracy of recognition of arrhythmia in the ECG 4.1 R Peak Detection
records and therefore, the precision of diagnosis of
cardiovascular disease will be decreased. Various R peaks are the largest deviation of ECG signals
categories of noise are associated with the ECG from the baseline. The proposed algorithm for R
signal, such as powerline interference, device noise, peak detection in this work is based on the parabolic
muscle noise, motion noise, contact noise and fitting algorithm (Jokic et al., 2011). By adopting
quantization noise (Elhaj et al., 2016). In order to two polynomial functions (PFs) of degree 3, we
increase the accuracy of disease detection, pre- modelled the R peak. A signal ݔof length ܯis
processing is required to be applied on the ECG defined as follows.
signal to reduce the effect of noise and improve the ݔሺ݉ሻǣ ݔሺͳሻǡ ݔሺʹሻǡ ǥ ǡ ݔሺܯሻ (5)
signal to noise ratio. In this paper, we applied a
௧
digital elliptic band-pass filter with passband of 5-15 where ݔሺ݅ሻ is the ݅ sample of the signal. The
Hz (maximizes the QRS energy), which is approximation of signal ݔusing the polynomial
constructed by cascading a low-pass and high-pass function ݔො of order ݀ is denoted by the following
filters, to remove muscle noise and baseline wander equation.
(Pan and Tompkins, 1985) as follows. ݔොሺ݉ሻ ൌ ܿ ܿଵ ݉ ܿଶ ݉ଶ ڮ ܿௗ ݉ௗ ,
3.1 Low-pass Filter ݁ݎ݄݁ݓ ݉ ൌ ͳǡ ʹǡ ǥ ǡ ܯǤ (6)
By minimizing the least square error (the square of
The adopted low-pass filter has the following ݈ଶ norm of the residual), we can calculate the
transfer function and amplitude response, ܿ coefficients as follows.
respectively (Pan and Tompkins, 1985).
ெ
మ
൫ଵି௭ షల ൯ ଶ
݁ ݎൌ ԡݔො ሺ݉ሻ െ ݔሺ݉ሻԡଶଶ ൌ ሺݔොሺ݉ሻ െ ݔሺ݉ሻሻଶ ǡ (7)
ܪሺݖሻ ൌ ሺଵି௭ షభ ሻమ
, (1)
ୀଵ
݊݅ݏଶ ሺ͵߱ܶሻ ߲݁ ݎଶ
ȁܪሺ߱ܶሻȁ ൌ (2) ൌ ͲǤ (8)
߱ܶ ߲ܿ
݊݅ݏଶ ሺ ʹ ሻ
In order to find R peak, a differentiator is first used
3.2 High-pass Filter to highlight the high inclines of the ECG signal.
Then, the PFs are fitted from the Q peak to the R
The transfer function of the high-pass filter is based peak (through the ascending R leg) and from R peak
on the subtraction of the output of a first-order low- to the S peak (through the descending R leg) (Jokic
pass filter from an all-pass filter as follows (Pan and et al., 2011).
51
HEALTHINF 2017 - 10th International Conference on Health Informatics
5.1 Wavelet
Figure 3: Three-level wavelet decomposition.
Discrete wavelet transform is a viable and powerful
feature extraction technique to analyse ECG signals
locally in multi-resolution manner in time and
frequency domain simultaneously and separate the
signal frequency sub-bands. A signal can be
displayed with different scaling and wavelet basis
functions (Emadi et al., 2012). DWT extracts the
approximation (low frequency components) and
detailed coefficients (high frequency components) as Figure 4: 2-D LBP for a sample point of a 2-D signal: a)
shown in Fig 3 (ܣ and ܦ are approximation and choosing P neighbours on the neighbourhood of radius R
detail coefficients and ݅ ൌ ͳǡ ʹܽ݊݀͵). A continuous around a centre sample point, b) comparing signal values
for centre and neighbour points and c) creating the binary
wavelet transform is generated by a series of
pattern and associated decimal value for the centre sample.
translations and dilations of mother wavelet ߮ሺǤ ሻ as
follows (Ródenas et al., 2015).
52
Pattern Recognition Application in ECG Arrhythmia Classification
histograms as the feature sets, the image-size Furthermore, all feature vectors regardless of the
dimension of the feature space can be reduced to the beat size, have equal length of feature sets.
number of histogram bins (Ahonen et al., 2004). ܴ is
the radius of the neighbourhood and ܲ is the number
of neighbour samples which are compared with the
centre pixel as shown in Fig 4. If the value of the
neighbour sample is greater than or equal to the
centre sample, a ͳ is assigned to that neighbour and
if it is less than the centre pixel a Ͳ is assigned to
that sample. Therefore, we have a ܲ-bit binary
pattern for each pixel at ሺݎǡ ܿሻ location and the
decimal value (DV) associated with the binary
pattern is calculated as follows. Figure 5: Neighbouring around one sample point of ECG
signal for 1-D LBP feature extraction.
ܸܦሺݎǡ ܿሻ ൌ ܩሺ݃ െ ݃ ሻ Ǥ ʹିଵ ǡ (12)
ୀଵ
ͳ ݂݅ ݑ Ͳ 6 CLASSIFICATION
ܩሺݑሻ ൌ ൜ Ǥ (13)
Ͳ ݂݅ ݑ൏ Ͳ
In this section, we describe our approach for training
Decimal values are used to make the histogram for a classifier to learn the set of arrhythmia classes
the 2-D signal. Therefore, the size of feature vector from a set of the extracted features from ECG beat
which is extracted from the 2-D image is equal to segments. We then use the remaining features for
the number of histogram bins (ʹ ). In order to testing the classifier to predict the class labels of
reduce the size of features and remove redundant beat segments; we apply 10-fold cross validation (to
information, we ignore non-uniform patterns due to keep consistency with reference works). The feature
the fact that considerable amount of discriminating set of all ECG beat segments is divided into two
information (important local textures such as spots, randomly selected subsets for training and
line ends, edges and corners) is preserved by taking validation, for 10 times, and the classification
only uniform patterns into consideration (Ahonen et approach is applied every time to predict the
al., 2004). The binary pattern is uniform if there are arrhythmia class labels for the test set. Each time,
at most two bitwise transitions from Ͳ to ͳ or ͳ to Ͳ. 90% of the dataset is devoted to the training subset
Each histogram has ܲሺܲ െ ͳሻ ʹ bins for uniform and the rest forms the testing subset. The final
and ͳ bin for all non-uniform patterns, in total there accuracy is the average of 10 folds. We employ an
are ܲሺܲ െ ͳሻ ͵ bins. Therefore, the computational extreme learning machine as the proposed
complexity is also reduced (Nikan and Ahmadi, classification approach. Feed-forward neural
2015). networks are used extensively as classification
The one-dimensional version of LBP can be adopted strategies in medical pattern recognition applications
to extract distinctive characteristics from ECG due to their capability in approximating the
signals. The same procedure is applied on each nonlinear mappings in the data. In order to tune the
sample point of the signal by comparing P/2 weights and biases of the network, traditional
neighbours from right and left side of centre sample learning mechanisms such as gradient decent
to create the P-bit pattern as shown in Fig 5 (Kaya et method are employed. However, due to very slow
al., 2014). In this paper, the uniform 1-D LBP with iterative tuning by a gradient decent technique and
neighbourhood size of 8 points is applied on wavelet its convergence into local minima, feed-forward
coefficients from the previous section. Therefore, a neural networks suffer from slow learning and poor
histogram of 59 bins (based on the above scalability. Extreme learning machine (ELM), as a
formulations ܲሺܲ െ ͳሻ ͵ ൌ ͺሺͺ െ ͳሻ ͵ ൌ ͷͻ learning algorithm for single hidden layer feed-
bins) is created as the feature vector for each beat forward neural network (FF-NN), is a faster
segment. This technique not only discovers local technique. An ELM classifier is generalized single
sudden variances and hidden patterns from ECG hidden layer neural network with random hidden
signal but also has the advantage of having less nodes and determined hidden layer weights without
sensitivity to noise, extracting sparser iterative weight tuning (Huang et al., 2006). For
characteristics, and is computationally effective. distinct training samples, the single hidden layer FF-
53
HEALTHINF 2017 - 10th International Conference on Health Informatics
DTCWT+Morphological-ANN
94.64
(Thomas et al., 2015)
7 EXPERIMENTAL RESULTS
PDHI-SVM/RBF (Elhaj et al.,
98.91
In order to evaluate the performance of the proposed 2016)
algorithm for arrhythmia recognition and
classification, cross validation is applied on the SC-SVM (Khalaf et al., 2015) 98.60
entire MIT-BIH arrhythmia database (110094 beat
segments). Sensitivity and precision of classification DWT+PCA-NN (Martis et al.,
98.78
of each beat type are calculated using true positive 2013a)
(ܶܲ), false positive ( )ܲܨand false negative ( )ܰܨas
follows and shown in Table 1. Proposed algorithm 98.99
54
Pattern Recognition Application in ECG Arrhythmia Classification
the results in Table 2, the classification accuracies in Emadi, M., Khalid, M., Yusof, R., & Navabifar, F. (2012).
(Martis et al., 2013a) and (Elhaj et al., 2016) are Illumination normalization using 2D wavelet.
very close to the result of our proposed approach. Procedia Engineering, 41, 854-859.
However, the proposed adaptive segmentation Goldberger, A. L., Amaral, L. A., Glass, L., Hausdorff, J.
M., Ivanov, P. C., Mark, R. G., …, Stanley, H. E.
method in this paper reduces the interference of (2000). PhysioBank, PhysioToolkit and PhysioNet:
adjacent beats, which is caused by using fixed beat components of a new research resource for complex
size as in (Martis et al., 2013a) and (Elhaj et al., physiologic signals. Circulation, 101(23), E215-E220.
2016). Our proposed technique outperforms those Huang, G. B., Zhu, Q. Y., & Siew, C. K. (2006). Extreme
approaches by 232 and 89 less misclassifications, learning machine: theory and applications.
respectively. Neurocomputing, 70(1-3), 489-501.
Inan, O. T., Giovangrandi, L., & Kovacs, G. T. (2006).
Robust neural network based classification of
premature ventricular contraction using wavelet
8 CONCLUSIONS transform and timing interval feature. IEEE
Transactions on Biomedical Engineering, 53(12),
The proposed arrhythmia classification approach 2507-2515.
introduces a novel adaptive beat segmentation Jokic, S., Delic, V., Peric, Z., Krco, S., & Sakac, D.
method based on the median value of the R-R (2011). Efficient ECG modeling using polynomial
functions. Electronics and Electrical Engineering,
intervals which reduces the misclassification due to
4(110), 121-124.
the inclusion of adjacent beats in each segment. Kadambe, S., & Srinivasan, P. (2006). Adaptive wavelets
Moreover, applying uniform 1-D LBP on the for signal classification and compression.
wavelet coefficients not only reduces the International Journal of Electronics and
dimensionality of feature space to 59 bins, which Communications, 60(1), 45-55.
makes the proposed algorithm computationally Kaya, Y., Uyar, M., Tekin, R., & YÕldÕrÕm, S. (2014). 1D-
effective, but also extracts local sudden variances local binary pattern based feature extraction for
and sparser hidden patterns from the ECG signal and classification of epileptic EEG signals. Applied
has the advantage of having less sensitivity to noise. Mathematics and Computation, 243, 209-219.
Khalaf, A. F., Owis, M. I., & Yassine, I. A. (2015). A
ELM classification leads to 98.99% accuracy of beat
novel technique for cardiac arrhythmia classification
classification of ECG records in the MIT-BIH using spectral correlation and support vector
arrhythmia database, based on the ANSI/AAMI machines. Expert Systems with Applications, 42(21),
EC57:1998 standard recommendation, which 8361-8368.
outperforms the performance of the state of the art Khoshnoud, S., & Ebrahimnezhad, H. (2013).
arrhythmia recognition algorithms in the literature. Classification of arrhythmias using linear predictive
These types of algorithms create opportunities for coefficients and probabilistic neural network. Applied
automatic methods that can be applied to ECG Medical Informatics, 33(3), 55-62.
readings to help cardiologists assess the risk of Korurek, M., & Dogan, B. (2010). ECG beat classification
using particle swarm optimization and radial basis
arrhythmias that may result in sudden cardiac death.
function neural network. Expert Systems with
This, given the shortage of cardiologists, can Applications, 37(12), 7563-7569.
enhance our ability to screen people at risk. Martis, R. J., Acharya, U. R., & Min, L. C. (2013a). ECG
beat classification using PCA, LDA, ICA and discrete
wavelet transform. Biomedical Signal Processing and
REFERENCES Control, 8(5), 437-448.
Martis, R. J., Acharya, U. R., Mandana, K. M., Raya, A.
K., & Chakraborty, C. (2013b). Cardiac decision
Ahonen, T., Hadid, A., & Pietikainen, M. (2004, May). making using higher order spectra. Biomedical Signal
Face recognition with local binary patterns. in Processing and Control, 8(2), 193-203.
Proceedings of 8th European Conference on Moody, G. B., & Mark, R. G. (2001). The impact of the
Computer Vision (ECCV), Prague, 469-481. MIT-BIH arrhythmia database. IEEE Engineering in
Ebrahimzadeh, A., & Khazaee, A. (2009). An efficient Medicine and Biology Magazine, 20(3), 45-50.
technique for classification of electro-cardiogram Nikan, S., & Ahmadi, M. (2015). Local gradient-based
signals. Advances in Electrical and Computer illumination invariant face recognition using LPQ and
Engineering, 9(3), 89-93. multi-resolution LBP fusion. IET Image Processing,
Elhaj, F. A., Salim, N., Harris, A. R., Swee. T. T., & 9(1), 12-21.
Ahmed, T. (2016). Arrhythmia recognition and Oster, J., Behar, J., Sayadi, O., Nemati, S., Johnson, A. E.,
classification using combined linear and nonlinear & Clifford, G. D. (2015). Semisupervised ECG
features of ECG signals. Computer Methods and ventricular beat classification with novelty detection
Programs in Biomedicine, 127, 52-63.
55
HEALTHINF 2017 - 10th International Conference on Health Informatics
56
Using HL7 and DICOM to Improve Operational Workflow Efficiency
in Radiology
Keywords: DICOM, HL7, Medical Informatics Applications, PACS, Radiology Analytics, Radiology Informatics,
Radiology Workflow.
Abstract: Radiology departments are increasingly asked to do more with less annual budget and to remain competitive
while managing bottom lines. Identifying opportunities to improve workflow efficiency is an important aspect
of managing a department and reducing associated costs. Workflow enhancement tools can be built by making
use of HL7 and DICOM messages that are directly related to various workflow steps. In this paper, we discuss
the importance of using both HL7 and DICOM to determine more accurate metrics related to granular
workflow operations, such as distinguishing between billing and operational exam volumes. Using a
production dataset, we also demonstrate how visualization can be used to provide better visibility into routine
radiology operations.
57
Mabotuwana, T. and Hall, C.
Using HL7 and DICOM to Improve Operational Workflow Efficiency in Radiology.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 57-65
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
58
Using HL7 and DICOM to Improve Operational Workflow Efficiency in Radiology
center based approach will not capture all exams Due to the specialized nature of clinical software,
performed on this resource. Additionally, there are most of the systems often consume only HL7 or
often exams which are split into two or more billing DICOM. However, as discussed later in the paper,
codes although they occupy one scheduled slot. there are significant benefits to linking data from
Karami discusses a comprehensive list of metrics these two sources for more accurate metric
important for radiology across seven main categories calculation.
(Karami 2014) while other investigators (Morgan,
Branstetter et al. 2008, Cook and Nagy 2014) have 2.3 Overview of HL7
discussed the importance of analytics and other
business intelligence software for radiology. The An HL7 message is composed of a series of segments
underlying data source for systems that provide such with each segment identifying the type of information
capabilities can be broadly categorized as: the message contains (e.g., patient demographics,
1. Systems used directly in workflow – these lab/observation result, diagnosis, insurance and next
systems are used during routine operations and of kin). In turn, each segment includes one or more
composites (also referred to as “fields”) that contain
would include systems such as the EHR, RIS,
the actual information (such as names and result
HIS and PACS. Data is entered directly into
values). Composites can contain sub-composites (or
these systems. sub-fields) – for instance, patient name is a composite
2. Third-party software that subscribe to HL7 within the ‘PID’ segment and can contain over six
messages – these systems are often setup as a sub-composites (such as family name, given name,
‘listener node’ where a copy of all, or a middle name and suffix). Composites are typically
selected subset, of HL7 messages will be sent separated by a “|” character, while sub- composites
to, often via the HL7 interface engine. Having are usually separated using “^”.
an interface engine is not so common for Each HL7 message starts with a message header,
DICOM since PACS is often the only corresponding to segment MSH, and defines the
destination for images. message’s source, purpose, destination, and other
3. Third-party software that integrate with syntax specifics like composite delimiters. MSH field
systems used in workflow – these systems 9, denoted by MSH-9, is particularly important since
often have closely-coupled integration with this specifies the type of message that is being
systems used directly in workflow. For transmitted (such as ADT, ORM, ORU, ACK and so
instance, a new CT dose monitoring software on (HL7 2016)). The segments present in a given
application may be installed in a hospital as a message vary depending on the type of message that
new DICOM node and all CT machines can be is being transmitted. For instance, Figure 2 shows the
configured to forward a copy of DICOM composition of an ADT message (used to convey
structured report (which is a way to analyze information related to patient admission, discharge
dose-related data for CT) to this node.
Figure 2: Components of an HL7 ADT message for a fictitious patient (Altova 2016).
59
HEALTHINF 2017 - 10th International Conference on Health Informatics
and transfers) containing seven segments (MSH, pre-authorization from insurance). Each imaging
EVN, PID and so on). exam will be associated with one imaging order.
Similar to the number of segments within a When the patient arrives at the radiology department,
message type, the number of fields present within a the front desk staff would typically ‘arrive’ the patient
segment can vary as well. For instance, the PID in the EHR (could be the RIS or some other system
segment can contain over 30 different fields, although depending on the hospital configuration). At this
it is common for the segments to terminate after the point, the technologist knows that the patient has
last non-empty field (corresponding to value “C” in arrived for the scan (this could be by looking at a
Figure 2). ‘technologist view’ in the EHR/‘modality worklist’,
or some other means, such as the front desk staff
2.4 Overview of DICOM printing out a ‘patient requisition form’ and handing
over to a technologist). When the technologist is
DICOM is a specification for creation, transmission, ready for the patient, he/she will go to the patient
and storage of medical images and report data (The waiting area and call for the patient. After explaining
DICOM Standard). In addition to the binary pixel the process, the technologist will start preparing the
data, all DICOM files contain metadata related to patient for the scan, for instance, by giving oral
patient (e.g., name, gender and date of birth), contrast if needed. Once ready, the patient will move
acquisition setup (e.g., type of equipment used and into the scanning room and around the same time, the
settings such as source IP address and machine technologist will ‘start exam’ in the EHR. The
name), and study (such as study DICOM images get acquired at this point and sent to
description). Metadata is contained in the DICOM a modality workstation. The RIS/EHR/PACS systems
header which is essentially a list of key-value pairs – typically work independent of the modality
the keys are standardized values in hexadecimal. As workstation. At the end of the scan, the technologist
an example, tag (0008,1030) corresponds to the study will review and push the images from workstation to
description. the PACS and then ‘end exam’ in the EHR. At this
point, the images are ready to be reviewed by a
2.5 Typical Radiology Workflow and radiologist. All these workflow steps trigger HL7
Information extraction from HL7 messages. The end-to-end radiology workflow from
and DICOM order-to-report is more extensive as discussed by
McEnery (McEnery 2013), but the image acquisition
At a high level, once a referring physician has ordered process is where combining data from HL7 and
an imaging exam, the exam gets scheduled (after DICOM is most relevant. As such, we focus only on
necessary pre-procedure steps are completed, such as this part of the workflow.
60
Using HL7 and DICOM to Improve Operational Workflow Efficiency in Radiology
61
HEALTHINF 2017 - 10th International Conference on Health Informatics
62
Using HL7 and DICOM to Improve Operational Workflow Efficiency in Radiology
differently depending on the clinical system in use. take up to an hour (post-processing usually happens
For instance, when a technologist completes an exam on a separate machine while the technologist is start
in the EHR/RIS, the resulting HL7 ‘end exam’ scanning the next patient). Radiologists can typically
message will contain the complete operator name. On start reading exams as soon as a technologist has
the other hand, the technologist also needs to enter the ended an exam. If a technologist ends the exam after
name into the modality workstation; however, if all post-processing is complete, and uses the current time
reporting is EHR/RIS driven, technologists will often as the end exam time, then it would appear as if the
enter only their initials into DICOM since this exam took a long time to complete. On the other hand,
information is not used anywhere. Therefore, it is if the technologists back-times the study end time to
important to identify the right data source and merge when the exam truly ended (ignoring all the post-
processing time), it would appear as if the exam has
data from either HL7 or DICOM after identifying the
been waiting in the reading queue for a long time
study based on accession number.
which affects the report-turnaround time. As such, it
3.1.6 Site-specific Business Logic is important to agree upon how to interpret the
turnaround times in context.
It is important to give priority to any site-specific
business logic since these are used in routine 3.2 Identifying Workflow
operations. For instance, at the DICOM level, the Improvement Opportunities
modality for X-ray may be CR or DR (indicating
analog vs digital X-ray respectively) whereas Using HL7 end exam messages, we determined the
operational managers may consider all of them to be monthly study volumes (Figure 4) as well as the
XR. Similarly, cancelled exams and historical data volume by day of week and hour of day (Figure 5) for
imports should not count towards exam volume, MR, CT and XR.
although HL7/DICOM traffic related to such exams For CT and XR, the heatmap representation
may be visible on the network. It is important to indicates the times when most scans are completed –
accurately capture and implement such site specific as expected, this is during normal business hours –
business logic when making inferences from raw Monday to Friday between 8am to 6pm. On the other
data. hand, the MR heatmap suggests that there is some
unusually high activity happening later in the day,
3.1.7 Workflow Related Nuances between 10 and 11 pm for the months of March and
Given the diversity and complexity of various April.
radiology exams, there could be various workflow Upon investigation, the MR technologists
specific nuances. For instance, certain MR exams confirmed that they routinely end exams only towards
may require post-processing of images, which can the end of the day, typically during the shift change.
63
HEALTHINF 2017 - 10th International Conference on Health Informatics
64
Using HL7 and DICOM to Improve Operational Workflow Efficiency in Radiology
REFERENCES
Altova. (2016). "HL7 Technology Overview." Retrieved
Sep 7, 2015, from http://www.altova.com/
HL7_technology_primer.html.
Centers for Medicare & Medicaid Services.
"Comprehensive Care for Joint Replacement Model."
Retrieved Sep 17, 2016, from https://innovation.cms
.gov/initiatives/cjr.
Centers for Medicare & Medicaid Services. "Health Care
Payment Learning and Action Network." Retrieved
Sep 15, 2016, from https://www.cms.gov/newsroom
/mediareleasedatabase/fact-sheets/2015-fact-sheets-
items/2015-02-27.html.
Centers for Medicare & Medicaid Services. "NHE Fact
Sheet." Retrieved Sep 17, 2016, from https://www.cms
.gov/research-statistics-data-and-systems/statistics-
trends-and-reports/nationalhealthexpenddata/nhe-fact-
sheet.html.
Cook, T. S. and P. Nagy (2014). "Business intelligence for
the radiologist: making your data work for you." J Am
Coll Radiol 11(12 Pt B): 1238-1240.
HealthIT.gov. (2015). "Meaningful Use Definition &
Objectives." Retrieved Sep 7, 2015, from
http://www.healthit.gov/providers-
professionals/meaningful-use-definition-objectives
HL7. (2016). "HL7 Interface Engine." Retrieved Sep 8,
2015, from http://www.hl7.com/interface-engine.html.
HL7. (2016). "HL7 Messaging Standard Version 2.7."
Retrieved Sep 7, 2015, from http://www.hl7.org
/implement/standards/product_brief.cfm?product_id=1
46.
Karami, M. (2014). "A design protocol to develop
radiology dashboards." Acta Inform Med 22(5): 341-
346.
McEnery, K. (2013). Radiology Information Systems and
Electronic Medical Records. IT Reference Guide for
the Practicing Radiologist, American College of
Radiology.
Morgan, M. B., B. F. t. Branstetter, D. M. Lionetti, J. S.
Richardson and P. J. Chang (2008). "The radiology
digital dashboard: effects on report turnaround time." J
Digit Imaging 21(1): 50-58.
peer60. "Unnecessary Imaging: Up to $12 Billion Wasted
Each Year." Retrieved Sep 17, 2016, from
http://research.peer60.com/unnecessary-imaging/.
The Advisory Board Company. (2008). "Imaging
Marketing Strategy: Lessons from Progressive Centers
on Securing Share." Retrieved Sep 2, 2016, from
https://www.advisory.com/-/media/Advisory-
com/Research/IPP/Research-Study/2008/Imaging-
Marketing-Strategy/17272_IPP_Imaging_Marketing_
Strategy.pdf.
The DICOM Standard. "DICOM Homepage." Retrieved
Sep 2, 2016, from http://dicom.nema.org
/standard.html.
65
Technologies for Ageing in Place to Support Home Monitoring of
Patients with Chronic Diseases
Alexandra Queirós1, Luís Pereira2, Ana Dias3 and Nelson Pacheco Rocha4
1
Health Sciences School, University of Aveiro, Campo Universitário de Santiago, 3810-193 Aveiro, Portugal
2
Medtronic Portugal, Torres de Lisboa, Rua Tomás da Fonseca, Torre E - 11º andar, 1600-209 Lisboa, Portugal
3
Department of Economicas, Management, Industrial Engineering and Tourism, University of Aveiro, Campo
Universitário de Santiago, 3810-193 Aveiro, Portugal
4
Department of Medical Sciences, University of Aveiro, Campo Universitário de Santiago, 3810-193 Aveiro, Portugal
alexandra@ua.pt, luis.pereira@medtronic.com, anadias@ua.pt, npr@ua.pt
Keywords: Technologies for Ageing in Place, Home Monitoring, Chronic Diseases, Older Adults.
Abstract: Objectives - This study aims to identify: i) the most relevant chronic diseases in terms of the use of
technologies for ageing in place to support home monitoring; and ii) types, outcomes and impacts of
technologies for ageing in place being used to support home monitoring. Methods - A systematic review of
reviews and meta-analysis was performed based on a search of the literature. Results - A total of 35 reviews
and meta-analysis across 4 chronic diseases, diabetes, congestive heart failure, chronic obstructive
pulmonary disease, and hypertension, were retrieved. These studies compare home monitoring supported by
different technologies with usual care. Conclusion - Home monitoring has positive effects in various health
related outcomes, but further research is required to allow its incorporation in the clinical practice.
66
Queirós, A., Pereira, L., Dias, A. and Rocha, N.
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 66-76
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases
about the available home monitoring solutions; and technology’, ‘information and communication’,
ii) the researchers about home monitoring issues that ‘internet-based’, ‘web-based’, ‘on-line’,
are being object of research. ‘smartphones’, ‘mobile apps’, ‘mobile phone’,
‘monitoring devices’ or ‘consumer health
information’ were presented in the title or abstract
2 METHODS together with any of the keywords ‘healthcare’,
‘health care’, ‘patient’, ‘chronic disease’, ‘older’ or
Considered the aforementioned objective, the ‘elderly’.
systematic review of reviews and meta-analysis The search was limited to articles in English, but
reported in the present article was informed by the conducted in any country, and performed on 30 of
following research questions: April of 2016, to include reviews published during
What are the most relevant chronic diseases in the preceding 10 years.
terms of the use of technologies for ageing in
place to support home monitoring? 2.1 Inclusion and Exclusion Criteria
What are the types, outcomes and impacts of
technologies for ageing in place being used to The study reported in the present article included
support home monitoring? reviews and meta-analysis related to technological
In order to determine the most appropriate search solutions that can be used to support home
strategy, an initial scoping study was conducted. The monitoring of older adults living with a chronic
outcomes of this process were discussed with disease. Chronic disease is defined as an illness that
various researchers and captured in a review is prolonged in duration, has a non-self-limited
protocol with explicit descriptions of the methods to nature, is rarely cured completely and is associated
be used and the steps to be taken. with persistent and recurring health problems
The resources considered to be searched were (Thrall, 2005; Australian Institute of Health and
two general databases (i.e. Web of Science and Welfare, 2006).
Scopus) and two specific databases (i.e. PubMed, a Since the scientific literature presents a large
medical sciences database, and IEEE Explorer, a number of articles that report studies related to home
technological database). monitoring, it was planned to include systematic
The list of keywords for the systematic review reviews or meta-analysis only.
was created through three steps: The authors excluded all the articles not
First, health related and technological terms published in English or that report systematic
were selected for a draft search strategy based reviews of reviews. Furthermore, the authors also
on the terminology that the authors were excluded all the reviews and meta-analysis reporting
familiar due to their background readings. A solutions that: i) are not focused on the monitoring
preliminary search with the identified of health conditions; ii) target more than one chronic
keywords was tested by two authors. condition (e.g. diabetes together with congestive
Afterwards, the two authors carried out a hand heart failure); iii) target long-term health condition
search of the table of contents of three not related to older patients (e.g. paediatric
relevant journals: Journal of Telemedicine and conditions); iv) do not target the patients (i.e. studies
Telecare, Telemedicine and Ehealth and that were clinicians focused or were intended
Journal of Medical Internet Research. primary to deal with the problems of caregivers
Finally, new keywords were introduced in rather than the patients); and v) were designed to be
order to gather articles of the mentioned used in an institutional environment and not in the
journals that were not retrieved in the previous domicile of the patients.
queries.
The queries that resulted from these successive 2.2 Review Selection
refinements intended to include: i) all the reviews
where any of the keywords ‘telecare’, ‘telehealth’, After the removal of duplicates and articles not
‘telemedicine’, ‘homecare’, ‘telemonitoring’, ‘home published in English, the selection of the remainder
monitoring’, ‘remote monitoring´, ehealth´, articles was performed by two authors in three steps:
‘telerehabilitation’, ‘mobile health’, ‘mhealth’ or First, the authors assessed all titles for
‘assisted living’ were presented in the title or relevance and those clearly not meeting the
abstract; and ii) all the reviews where any the inclusion criteria were removed.
keywords ‘technology-based’, ‘information
67
HEALTHINF 2017 - 10th International Conference on Health Informatics
Afterwards the abstracts of the retrieved diseases - 31 articles; iv) the studies are not
articles were assessed against the inclusion systematic literature reviews or meta-analysis - 12
and exclusion criteria. articles - or are reviews of reviews - 3 articles; v) the
Finally, authors assessed the full text of the target users are not the patients but the caregivers - 8
articles according to the outlined inclusion and articles; vi) the reported solutions are to be used in
exclusion criteria. an institutional environment or are related to acute
In all these three steps any disagreement between conditions - 4 articles; vi) the studies were not
the two authors was discussed and resolved by reported in English - 5 articles.
consensus.
Articles found (n=2681):
2.3 Data Extraction Web Of Science (n=1263);
Scopus (n=550);
The following characteristics of the retrieved articles
were extracted: i) authors, title and year of PubMed (n=822);
publication; ii) aims of the review or meta-analysis; IEEE Explorer (n=46).
iii) target chronic disease; iv) technologies being
used; v) search strategy; vi) inclusion and exclusion
criteria; vii) quality assessment; viii) data extraction
procedure; ix) total number of primary studies; x)
Articles excluded by preliminary
total number of random clinical trials (RCT); xi)
total number of participants; xii) primary outcomes; screening (n=2079):
xiii) secondary outcomes; xiv) author’s Duplicate articles (n=1210);
interpretations; and xv) author’s conclusions. Articles without abstracts (n=42);
The relevant data were extracted and recorded
Excluded based on titles (n=512);
independently by two authors. Once more, any
disagreement between the two authors was discussed Excluded based on abstracts
and resolved by consensus. (n=315).
68
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases
subsections present the results of these 4 categories. feedback to the patients (Jackson, 2006; El-
Gayar, 2013).
3.2 Diabetes Smartphones (i.e. standalone smartphones and
smartphones integrating specific devices such
Of the 35 retrieved articles, 20 dealt with home as glucometers for automatic glucose level
monitoring of patients with diabetes. A significant upload) (Frazetta, Willet and Fairchild, 2012;
number of articles focuses both type 1 and type 2 Cassimatis and Kavanagh, 2012; Baron,
diabetes (Jaana and Paré, 2007; Verhoeven et al., McBain and Newman, 2012; El-Gayar, 2013;
2007; Baron, McBain and Newman, 2012; El-Gayar, Pal et al., 2013; Peterson, 2014; Tildesley, Po
2013; van Vugt et al., 2013; Or and Tao, 2014; and Ross, 2015; Garabedian, Ross-Degnan
Huang et al., 2015; Tildesley, Po and Ross, 2015; and Wharam, 2015; Hunt, 2015; Ortiz, Felix
Riazi et al., 2015; Garabedian, Ross-Degnan and and Sosa, 2015; Arambepola, 2016).
Wharam, 2015). Others articles focus type 2 diabetes Automatic patient data transmission by means
(Jackson, 2006; Ramadas et al., 2011; Frazetta, of monitoring devices (i.e. devices to monitor
Willet and Fairchild, 2012; Cassimatis and vital signals or devices to monitor behaviour
Kavanagh, 2012; Tao and Or, 2013; Huang et al., outcomes such as pedometers or
2015; Hunt, 2015; Ortiz, Felix and Sosa, 2015; accelerometers connected by wireless
Arambepola, 2016). Only one of the retrieved communications to monitor physical activity
studies focuses exclusively on type 1 diabetes (Jaana and Paré, 2007)).
(Peterson, 2014). Video-conference (Verhoeven et al., 2007; El-
By principle, the articles of the diabetes category Gayar et al., 2013).
include primary studies with high quality scientific Telephone calls (Riazi et al., 2015).
evidence. All the 20 retrieved articles considered The main outcome of most of the articles
RCT primary studies and 11 of them considered included in the diabetes category is the control of
RCT as one of the inclusion criteria (Jaana and Paré, glycaemia by using glycosylated haemoglobin
2007; Verhoeven et al., 2007; Cassimatis and (HbA1c) as a proxy. However, in all the studies, this
Kavanagh, 2012; Baron, McBain and Newman, aim is complemented with other health related
2012; Pal et al., 2013; Tao and Or, 2013; van Vugt outcomes (e.g. health related quality of life
et al., 2013; Or and Tao, 2014; Huang et al., 2015; (Verhoeven et al., 2007; Ramadas et al., 2011; Pal et
Tildesley, Po and Ross, 2015; Arambepola, 2016). al., 2013; van Vugt et al., 2013), weight (Ramadas et
On the other hand, aggregating all the primary al., 2011; Pal et al., 2013; Huang et al., 2015;
studies included in the 20 studies of the diabetes Garabedian, Ross-Degnan and Wharam, 2015),
category it is evident that the number of the involved depression (Pal et al., 2013), blood pressure
patients is relatively significant (e.g. 1 article reports (Verhoeven et al., 2007; Or and Tao, 2014; Riazi et
the involvement of 3578 patients (Pal et al., 2013) al., 2015; Garabedian, Ross-Degnan and Wharam,
and other reports the involvement of 3798 patients 2015), cholesterol level (Ramadas et al., 2011; Or
(Huang et al., 2015)). and Tao, 2014), triglycemius level (Or and Tao,
In technological terms, several articles (Ramadas 2014), fluctuation index (Ramadas et al., 2011)),
et al., 2011; Frazetta, Willet and Fairchild, 2012; El- behaviour outcomes (e.g. physical activity)
Gayar, 2013; Pal et al.; Tao and Or, 2013; van Vugt (Jackson, 2006; Verhoeven et al., 2007; Ramadas et
et al., 2013; Huang et al., 2015; Tildesley, Po and al., 2011; Cassimatis and Kavanagh, 2012; van Vugt
Ross, 2015; Riazi et al., 2015; Hunt, 2015) refer et al., 2013; Riazi et al., 2015; Garabedian, Ross-
web-based applications (Table 1). In general, these Degnan and Wharam, 2015; Hunt, 2015;
applications allow synchronous (e.g. instant Arambepola, 2016), patient self-motivation
messaging or chat) and asynchronous (e.g. electronic (Tildesley, Po and Ross, 2015), patient-clinician
mail or bulletin board) communications together communication (Tildesley, Po and Ross, 2015),
with web pages to register clinical parameters (e.g. medication adherence (Cassimatis and Kavanagh,
weight or blood pressure) and medication. 2012; Hunt, 2015) ), and structural outcomes related
Besides web-based applications, there are other to care coordination (Jaana and Paré, 2007;
technological solutions reported in different articles: Verhoeven et al., 2007).
Computer-assisted applications integrating the
management of clinical data with electronic
practice guidelines, reminder systems, and
69
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Articles that focus diabetes. Most of the articles of the diabetes category
report moderate to large significant reduction of
Study Technology (*) HbA1c when compared with usual care (Jackson,
Web-based applications, 2006; Jaana and Paré, 2007; Frazetta, Willet and
Jackson et
computer assisted applications 26/14 Fairchild, 2012; Cassimatis and Kavanagh, 2012;
al., 2006
and standard telephone calls Tao and Or, 2013; Or and Tao, 2014; Peterson,
Automatic patient data 2014; Huang et al., 2015; Tildesley, Po and Ross,
Jaana et al., 2015; Riazi et al., 2015; Garabedian, Ross-Degnan
transmission by means of 17/17
2007 and Wharam, 2015; Hunt, 2015; Ortiz, Felix and
monitoring devices
Sosa, 2015; Arambepola, 2016). However, several
Verhoeven
et al., 2007
Video-conference 39/39 studies are not conclusive about the reduction of
HbA1c (Verhoeven et al., 2007; Ramadas et al.,
Ramadas et 2011; Baron, McBain and Newman, 2012; Pal et al.,
Web-based applications 13/8
al., 2011 2013). In particular, computer-based diabetes self-
Frazettaet management interventions (Pal et al., 2013) and
Smartphones 7/7 consultations supported by video-conference
al., 2012
(Verhoeven et al., 2007) appear to have a small
Cassimatis
Smartphones 13/13 beneficial effect on glycaemia control.
et al., 2012
An article (El-Gayar et al., 2013) reporting
Baron, et research gaps of the technological approaches
Smartphones 24/24
al., 2012 identifies the need to improve the usability of the
Web-based applications, applications as well the need for more
El-Gayar et smartphones, computer assisted comprehensive solutions, including real-time
104/60
al., 2013 applications and video- feedback to the patients and the integration of
conference
electronic health records systems supporting the
Pal et al., Web-based applications and service providers.
16/16
2013 smartphones
Tao et al.,
Web-based applications 43/43
3.3 Congestive Heart Failure
2013
van Vugt et
The number of RCT and non-RCT primary studies
Web-based applications 13/13 included in the 9 articles dealing with congestive
al., 2013
heart failure varies from 9 to 42 (Table 2). The
Or et al., majority of the articles (i.e. 6 articles (Chaudhry et
Web-based applications 67/67
2014 al., 2007; Dang, Dimmick and Kelkar, 2009;
Peterson Smartphones 14/1 Polisena et al., 2010a; Ciere, Cartwright and
Newman, 2012; Conway, Inglis and Clark, 2014;
Huang et Web-based applications and
18/18 Nakamura, Koga and Iseki, 2014)) considered RCT
al., 2015 standard telephone calls
as one of the inclusion criteria.
Tildesley et Web-based applications and Considering the supporting technologies (Table
22/22
al., 2015 smartphones 2), automatic patient data transmission by means of
Riazi et al., Web-based applications and monitoring devices is being used together with
67/52
2015 standard telephone calls video-conference and standard telephone calls to
Garabedian
allow the assessment of symptoms and vital signs, as
Smartphones 1479 well as the transmission of automatic alarms.
et al., 2015
In terms of clinical outcomes, the main concerns
Web-based applications and are the impacts of home monitoring in heart failure-
Hunt, 2015 14/9
smartphones
related hospitalizations and all-cause mortality
Ortiz et al.,
Smartphones 8/4
(Conway, Inglis and Clark, 2014) when compared
2015 with usual care. However, several secondary
Arambepola outcomes are also considered such as self-care
Smartphones 13/13 behaviour (e.g. adherence to prescribed medication,
et al., 2016
(*) Number of RCT included in the review / Number of daily weighing or adherence to exercise
primary studies include in the review. recommendations (Ciere, Cartwright and Newman,
2012)).
70
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases
Table 2: Articles that focus congestive heart failure. However, there is a need for high-quality trials
(Chaudhry et al., 2007). Additionally, Grustam et al.
Study Technology (*) (2014) state that evidence from the scientific
Automatic patient data literature related to home monitoring to support
Martínez et
transmission by means of 42/13 congestive heart failure patients is still insufficient.
al., 2006
monitoring devices Also, more full economic analyses are needed to
Automatic patient data reach a sound conclusion. This means that further
Chaudhry et transmission by means of research is required in terms of comparisons of
9/9 home monitoring with usual care of patients with
al., 2007 monitoring devices and standard
telephone calls congestive heart failure.
Automatic patient data
Clark et al., transmission by means of
3.4 Chronic Obstructive Pulmonary
14/14 Disease
2007 monitoring devices and standard
telephone calls
All the retrieved articles dealing with chronic
Automatic patient data obstructive pulmonary disease analyse RCT primary
Dang et al.,
transmission by means of 9/9
2009 studies (Table 3). In particular, 3 of them considered
monitoring devices
RCT as one of the inclusion criteria (Polisena et al.,
Automatic patient data 2010b; Pedone and Lelli, 2015; Lundell et al., 2015).
Polisena et
transmission by means of 9/9 Home monitoring is supported by commercially
al., 2010a
monitoring devices available devices to measure and transmit different
Automatic patient data types of information (e.g. weight, temperature, blood
transmission by means of pressure, oxygen saturation, spirometry parameters,
Ciere et al., symptoms, medication usage or steps in 6-minutes
monitoring devices and standard 12/7
2012
telephone calls and video- walking distance). In some cases the automatic data
conference acquisition is complemented by clinical staff using
questionnaires in telephone interviews (Polisena et
Automatic patient data al., 2010b; Pedone and Lelli, 2015). Video-
transmission by means of
Grustam et
monitoring devices and standard 32/21
conference can also be used to provide feedback to
al., 2014 the patients (Lundell et al., 2015).
telephone calls and video-
conference
Table 3: Articles that focus chronic obstructive pulmonary
Automatic patient data disease.
Conway et transmission by means of
25/25 Study Technology (*)
al. monitoring devices and standard
telephone calls
Automatic patient data
Automatic patient data Polisena et transmission by means of
10/10
transmission by means of al., 2010b monitoring devices and standard
Nakamura telephone calls
monitoring devices, including 13/13
et al., 2014
external, wearable, or Automatic patient data
implantable electronic devices Bolton et al.
transmission by means of 6/2
2011
(*) Number of RCT included in the review / Number of monitoring devices
primary studies include in the review.
Automatic patient data
Pedone et transmission by means of
Accordingly the reviewed articles home al., 2015 monitoring devices and standard
12/12
monitoring has a positive effect on clinical outcomes telephone calls
in community dwelling patients with congestive
heart failure. Home monitoring reduces mortality Automatic patient data
when compared with usual care and it also helps to Lundell et transmission by means of
9/9
lower both the number of hospitalizations and the al., 2015 monitoring devices and video-
conference
use of other health care services (Dang, Dimmick
and Kelkar, 2009; Polisena et al., 2010a; Conway, (*) Number of RCT included in the review / Number of
Inglis and Clark, 2014; Nakamura, Koga and Iseki, primary studies include in the review.
2014).
71
HEALTHINF 2017 - 10th International Conference on Health Informatics
In what concerns the primary and secondary first research question of the present study).
outcomes, 3 studies (Polisena et al., 2010b; Bolton et Type 1 and type 2 diabetes stand out from other
al. 2011; Pedone and Lelli, 2015) compare home chronic conditions with a total of 20 studies, which
monitoring with usual care of patients with chronic constitute 57.1% of the articles that were retrieved.
obstructive pulmonary disease, considering In order of relevance, the second chronic condition
mortality, admissions to hospital or other health care is congestive heart failure (i.e. 28.6% of the articles
utilization as primary outcomes. Secondary that were retrieved), which was followed by chronic
outcomes include, among others, health related obstructive pulmonary disease (i.e. 11.4% of the
quality of life, patient satisfaction, physical capacity articles that were retrieved). Furthermore, one article
and dyspnea. reporting a systematic review related to home
Home monitoring was found to reduce rates of monitoring of patients with hypertension was also
hospitalization and emergency department visits, included in the present systematic review.
while the findings related to hospital bed days of Self-management of diabetes requires patient
care varied between studies (Polisena et al., 2010b; adherence to best practice recommendations (e.g.
Pedone and Lelli, 2015). However, 1 study (Polisena glucose monitoring, dietary management or physical
et al., 2010b) reports a greater mortality in a activity) (Or and Tao, 2014), congestive heart failure
telephone-support group compared with usual care. has a high rate of hospital readmission (Bonow,
Additionally, there is evidence that home monitoring 2005; Joe and Demiris, 2013) and key aspects of the
has a positive effect on physical capacity and natural history of the chronic obstructive pulmonary
dyspnea (Lundell et al., 2015) and it is similar or disease are episodes of acute exacerbations, which
better than usual care in terms of quality of life and are considered related to a faster disease
patient satisfaction outcomes (Polisena et al., progression, presence of comorbidities, and worse
2010b). functional prognosis (Calvo, 2014). Therefore, the
The evidence systematized by the articles of the results of the present systematic review are in line
category related to chronic obstructive pulmonary with the current strong motivation for using
disease does not allow drawing definite conclusions, technological solutions as a way to monitor patients
as the studies are small. The benefit of home with chronic diseases at home and to promote an
monitoring of patients with chronic obstructive increasing compliance of self-care.
pulmonary disease is not yet proven and further In terms of types, outcomes, and impacts of
research is required before wide-scale technologies supporting home monitoring of patients
implementation be supported. with chronic diseases (i.e. the second research
question of the study reported in the present article),
3.5 Hypertension the results show that:
The technological solutions being used
Finally, concerning patients with hypertension 1 include web-based applications, computer
article systematizes the results of 12 RCT using assisted applications, smartphones, automatic
devices with automated data transmission, and patient data transmission by means of
video-conference. monitoring devices, video-conference and
The article reports improvements in the standard telephone calls (Tables 1-3).
proportion of participants with controlled blood In general, the systematic reviews compare
pressure compared to those who received usual care, home monitoring with usual care and the
but the authors conclude that more interventions are primary outcomes depend of the type of the
required and cost-effectiveness of the intervention patients being considered (e.g. glycaemia
should also be assessed (Chandak and Joshi, 2015). control for patients with diabetes, patient’s
readmissions and mortality for patients with
congestive heart failure and patients with
4 DISCUSSION chronic obstructive pulmonary disease, or
control of the blood pressure of patients with
According to the findings of the systematic review hypertension).
reported in the present article, diabetes, congestive Secondary outcomes are quite diverse and
heart failure, chronic obstructive pulmonary disease include health related quality of life, weight,
and hypertension are the most relevant chronic depression, blood pressure, behaviour
diseases in terms of the use of technologies for outcomes, self-management, care knowledge,
ageing in place to support home monitoring (i.e. the medication adherence, patient-clinician
72
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases
communication, or structural outcomes related secondary analyses (i.e. review of reviews and meta-
to care coordination. analysis), the limitations related to the dependency
The analysis of the retrieved articles suggest on the keywords and the databases selected, or the
that home monitoring has positive effects with assumption that the retrieved articles have a
a moderate to large improvements of different homogeneous quality, which was not verified.
outcomes when compared with usual care of Despite these possible biases, the authors believe
patients with diabetes, congestive heart that the systematically collected evidence
failure, chronic obstructive pulmonary disease contributes to the understanding of the use of
and hypertension (although in this case the technologies for ageing in place to support home
evidence is not as robust – only 1 article – as it monitoring of patients with chronic diseases.
is in the other 3 chronic diseases). However, In parallel with this study, the authors have used
some studies are not conclusive about this similar methods to analyse the role of technologies
positive impact and only report small for ageing in place to empower patients with chronic
beneficial effects. diseases. However, due to several limitations, the
Despite a high level of technological innovation authors decide not to report the results in this article.
and implementation, one of the findings is that Therefore, these results will be the object of a future
telephone calls are still an important channel for the publication. Also, as a future work, further studies
communication between patients and care providers. will be implemented, namely to analyse how
Furthermore, it seems that important aspects are technologies for ageing in place are being used to
neglected during the technological developments, support daily activities and promote the participation
since there are reports of usability drawbacks as well in social, economic, cultural, civil or spiritual
as reports of the need for more comprehensive matters of older adults.
solutions, including provision of real-time feedback
and the integration of the electronic health records
systems being used by the care providers (El-Gayar ACKNOWLEDGEMENTS
et al., 2013).
Therefore, the results show that not only This work was partially supported by COMPETE -
disruptive technological solutions have a key role Programa Operacional Competitividade e
when dealing with home monitoring, since practical Internacionalização (COMPETE 2020), Sistema de
and robust solutions are required, which means that Incentivos à Investigação e Desenvolvimento
the integration and the interoperability of existing Tecnológico (SI I&DT), under the project Social
technologies assume a great importance. Cooperation for Integrated Assisted Living
In general, the retrieved studies suggest positive (SOCIAL).
effects of home monitoring, but evidence provided
for the real benefit of home monitoring in some
aspects was not totally convincing. Further research,
including large scale RCT trials with consistent REFERENCES
primary and secondary outcomes, and robust
analysis about long-term sustainability, is required to Arambepola, C., Ricci-Cabello, I., Manikavasagam, P.,
allow the full incorporation of home monitoring in Roberts, N., French, D.P. and Farmer, A., 2016. The
impact of automated brief messages promoting
the clinical practice.
lifestyle changes delivered via mobile devices to
people with type 2 diabetes: a systematic literature
review and meta-analysis of controlled trials. Journal
5 CONCLUSION of medical Internet research, 18(4).
Australian Institute of Health and Welfare, 2006. Chronic
Diseases and Associated Risk Factors in Australia,
Considering the large amount of articles that report
2006. Australian Institute of Health and Welfare.
studies related to home monitoring of patients with Baron, J., McBain, H. and Newman, S., 2012. The impact
chronic diseases, the authors decided to perform a of mobile monitoring technologies on glycosylated
review of reviews and meta-analysis. hemoglobin in diabetes: a systematic review. Journal
Although the authors tried to be as elaborate as of diabetes science and technology, 6(5), pp.1185-
possible in methodological terms to guarantee that 1196.
the review selection and the data extraction were Bolton, C.E., Waters, C.S., Peirce, S. and Elwyn, G.,
rigorous, it should be acknowledged that this study 2011. Insufficient evidence of benefit: a systematic
has limitations, namely the weaknesses inherent to
73
HEALTHINF 2017 - 10th International Conference on Health Informatics
review of home telemonitoring for COPD. Journal of patient adherence and intensity of treatment in an
evaluation in clinical practice, 17(6), pp.1216-1222. outpatient memory clinic. Journal of medical Internet
Bonow, R.O., Bennett, S., Casey, D.E., Ganiats, T.G., research, 16(5), p. e122. Doi: 10.2196/jmir.3377.
Hlatky, M.A., Konstam, M.A., Lambrew, C.T., Dang, S., Dimmick, S. and Kelkar, G., 2009. Evaluating
Normand, S.L.T., Pina, I.L., Radford, M.J. and Smith, the evidence base for the use of home telehealth
A.L., 2005. ACC/AHA clinical performance measures remote monitoring in elderly with heart failure.
for adults with chronic heart failure: a report of the Telemedicine and e-Health, 15(8), pp.783-796.
American College of Cardiology/American Heart El-Gayar, O., Timsina, P., Nawar, N. and Eid, W., 2013. A
Association task force on performance measures systematic review of IT for diabetes self-management:
(writing committee to develop heart failure clinical are we there yet?. International journal of medical
performance measures) endorsed by the Heart Failure informatics, 82(8), pp.637-652.
Society of America. Journal of the American College Eysenbach, G., 2008. Medicine 2.0: social networking,
of Cardiology, 46(6), pp.1144-1178. collaboration, participation, apomediation, and
Calvo, G.S., Gómez-Suárez, C., Soriano, J.B., Zamora, E., openness. Journal of medical Internet research, 10(3),
Gónzalez-Gamarra, A., González-Béjar, M., Jordán, p.e22.
A., Tadeo, E., Sebastián, A., Fernández, G. and Frazetta, D., Willet, K. and Fairchild, R., 2012. A
Ancochea, J., 2014. A home telehealth program for systematic review of smartphone application use for
patients with severe COPD: the PROMETE study. type 2 diabetic patients. Online Journal of Nursing
Respiratory medicine, 108(3), pp.453-462. Informatics (OJNI), 16(3).
Cassimatis, M. and Kavanagh, D.J., 2012. Effects of type Garabedian, L.F., Ross-Degnan, D. and Wharam, J.F.,
2 diabetes behavioural telehealth interventions on 2015. Mobile phone and smartphone technologies for
glycaemic control and adherence: a systematic review. diabetes care and self-management. Current diabetes
Journal of telemedicine and telecare, 18(8), pp.447- reports, 15(12), pp.1-9.
450. Genet, N., Boerma, W.G., Kringos, D.S., Bouman, A.,
Chandak, A. and Joshi, A., 2015. Self-management of Francke, A.L., Fagerström, C., Melchiorre, M.G.,
hypertension using technology enabled interventions Greco, C. and Devillé, W., 2011. Home care in
in primary care settings. Technology and Health Care, Europe: a systematic literature review. BMC health
23(2), pp.119-128. services research, 11(1), p.1.
Chaudhry, S.I., Phillips, C.O., Stewart, S.S., Riegel, B., Grustam, A.S., Severens, J.L., van Nijnatten, J., Koymans,
Mattera, J.A., Jerant, A.F. and Krumholz, H.M., 2007. R. and Vrijhoef, H.J., 2014. Cost-effectiveness of
Telemonitoring for patients with chronic heart failure: telehealth interventions for chronic heart failure
a systematic review. Journal of cardiac failure, 13(1), patients: a literature review. International journal of
pp.56-62. technology assessment in health care, 30(01), pp.59-
Ciere, Y., Cartwright, M. and Newman, S.P., 2012. A 68.
systematic review of the mediating role of knowledge, Househ, M., 2014. The role of short messaging service in
self-efficacy and self-care behaviour in telehealth supporting the delivery of healthcare: An umbrella
patients with heart failure. Journal of telemedicine and systematic review. Health informatics journal,
telecare, 18(7), pp.384-391. p.1460458214540908.
Clark, R.A., Inglis, S.C., McAlister, F.A., Cleland, J.G. Huang, Z., Tao, H., Meng, Q. and Jing, L., 2015.
and Stewart, S., 2007. Telemonitoring or structured MANAGEMENT OF ENDOCRINE DISEASE:
telephone support programmes for patients with Effects of telecare intervention on glycemic control in
chronic heart failure: systematic review and meta- type 2 diabetes: a systematic review and meta-analysis
analysis. Bmj, 334(7600), p.942. of randomized controlled trials. European Journal of
Connelly, K., Mokhtari, M. and Falk, T.H., 2014. Endocrinology, 172(3), pp.R93-R101.
Approaches to Understanding the impact of Hunt, C.W., 2015. Technology and diabetes self-
technologies for aging in place: a mini-review. management: An integrative review. World journal of
Gerontology, 60(3), pp.282-288. diabetes, 6(2), pp.225-233.
Conway, A., Inglis, S.C. and Clark, R.A., 2014. Effective Jaana, M. and Paré, G., 2007. Home telemonitoring of
technologies for noninvasive remote monitoring in patients with diabetes: a systematic assessment of
heart failure. Telemedicine and e-Health, 20(6), observed effects. Journal of evaluation in clinical
pp.531-538. practice, 13(2), pp.242-253.
Cruz, V.T., Pais, J., Bento, V., Mateus, C., Colunas, M., Jackson, C.L., Bolen, S., Brancati, F.L., Batts?Turner,
Alves, I., Coutinho, P. and Rocha, N.P., 2013. A M.L. and Gary, T.L., 2006. A systematic review of
rehabilitation tool designed for intensive web-based interactive computer?assisted technology in diabetes
cognitive training: Description and usability study. care. Journal of general internal medicine, 21(2),
Journal of Medical Internet Research, 15 (12), p. e59. pp.105-
Doi: 10.2196/resprot.2899. Joe, J. and Demiris, G., 2013. Older adults and mobile
Cruz, V.T., Pais, J., Alves, I., Ruano, L., Mateus, C., phones for health: A review. Journal of biomedical
Barreto, R., Bento, V., Colunas, M., Rocha, N. and informatics, 46(5), pp.947-954.
Coutinho, P., 2014. Web-based cognitive training:
74
Technologies for Ageing in Place to Support Home Monitoring of Patients with Chronic Diseases
Kickbusch, I. and Nutbeam, D., 1998. Health promotion Pastalan, L.A., 1990. Aging in place: The role of housing
glossary. Geneva: World Health Organization. and social supports (Vol. 6, No. 1-2). Psychology
Kitsiou, S., Paré, G. and Jaana, M., 2015. Effects of home Press.
telemonitoring interventions on patients with chronic Pedone, C. and Lelli, D., 2015. Systematic review of
heart failure: an overview of systematic reviews. telemonitoring in COPD: an update. Pneumonol
Journal of medical Internet research, 17(3), p.e63. Alergol Pol, 83, pp.476-8484.
Koch, S., 2013. Achieving holistic health for the Peterson, A. (2014). Improving Type 1 Diabetes
individual through person-centered collaborative care Management With Mobile Tools A Systematic
supported by informatics. Healthcare informatics Review. Journal of diabetes science and technology,
research, 19(1), pp.3-8. 8(4), 859-864.
Kvedar, J., Coye, M.J. and Everett, W., 2014. Connected Polisena, J., Tran, K., Cimon, K., Hutton, B., McGill, S.,
health: a review of technologies and strategies to Palmer, K. and Scott, R.E., 2010. Home
improve patient care with telemedicine and telehealth. telemonitoring for congestive heart failure: a
Health Affairs, 33(2), pp.194-199. systematic review and meta-analysis. Journal of
Lundell, S., Holmner, Å., Rehn, B., Nyberg, A. and Telemedicine and Telecare, 16(2), pp.68-76.
Wadell, K., 2015. Telehealthcare in COPD: a Polisena, J., Tran, K., Cimon, K., Hutton, B., McGill, S.,
systematic review and meta-analysis on physical Palmer, K. and Scott, R.E., 2010. Home telehealth for
outcomes and dyspnea. Respiratory medicine, 109(1), chronic obstructive pulmonary disease: a systematic
pp.11-26. review and meta-analysis. Journal of telemedicine and
Martínez, A., Everss, E., Rojo-Álvarez, J.L., Figal, D.P. telecare, 16(3), pp.120-127.
and García-Alberola, A., 2006. A systematic review of Queirós, A., Carvalho, S., Pavão, J. and da Rocha, N.P.,
the literature on home monitoring for patients with 2013. AAL Information based Services and Care
heart failure. Journal of telemedicine and telecare, Integration. In HEALTHINF 2013 - Proceedings of
12(5), pp.234-241. the International Conference on Health Informatics,
McBain, H., Shipley, M. and Newman, S., 2015. The pp. 403-406.
impact of self-monitoring in chronic illness on Queirós, A., Silva, A., Alvarelhão, J., Rocha, N.P. and
healthcare utilisation: a systematic review of reviews. Teixeira, A., 2015. Usability, accessibility and
BMC health services research, 15(1), p.1. ambient-assisted living: a systematic literature review.
Moher, D., Liberati, A., Tetzlaff, J. and Altman, D.G., Universal Access in the Information Society, 14(1),
2009. Preferred reporting items for systematic reviews pp.57-66. Doi: 10.1007/s10209-013-0328-x.
and meta-analyses: the PRISMA statement. Annals of Ramadas, A., Quek, K.F., Chan, C.K.Y. and Oldenburg,
internal medicine, 151(4), pp.264-269. B., 2011. Web-based interventions for the
Mori, A.R., Mazzeo, M., Mercurio, G. and Verbicaro, R., management of type 2 diabetes mellitus: a systematic
2013. Holistic health: predicting our data future (from review of recent evidence. International Journal of
inter-operability among systems to co-operability Medical Informatics, 80(6), pp.389-405.
among people). International journal of medical Riazi, H., Larijani, B., Langarizadeh, M. and Shahmoradi,
informatics, 82(4), pp.e14-e28. L., 2015. Managing diabetes mellitus using
Nakamura, N., Koga, T. and Iseki, H., 2014. A meta- information technology: a systematic review. Journal
analysis of remote patient monitoring for chronic heart of Diabetes & Metabolic Disorders, 14(1), p.1.
failure patients. Journal of telemedicine and telecare, Slev, V.N., Mistiaen, P., Pasman, H.R.W., Verdonck-de
20(1), pp.11-17. Leeuw, I.M., van Uden-Kraan, C.F. and Francke, A.L.,
Or, C.K. and Tao, D., 2014. Does the use of consumer 2016. Effects of eHealth for patients and informal
health information technology improve outcomes in caregivers confronted with cancer: A meta-review.
the patient self-management of diabetes? A meta- International journal of medical informatics, 87,
analysis and narrative review of randomized controlled pp.54-67.
trials. International journal of medical informatics, Tao, D. and Or, C.K., 2013. Effects of self-management
83(5), pp.320-329. health information technology on glycaemic control
Ortiz, P.M.V., Felix, P.M. and Sosa, E.S.G., 2015. Text for patients with diabetes: a meta-analysis of
messaging interventions to glycemic control in type 2 randomized controlled trials. Journal of telemedicine
diabetes adults: systematic review/Mensajes de texto and telecare, 19(3), pp.133-143.
para el control glucémico en adultos con diabetes tipo Teixeira, A., Pereira, C., e Silva, M.O., Alvarelhão, J.,
2: revisión sistemática. Enfermería Global, 14(1), Silva, A.G., Cerqueira, M., Martins, A.I., Pacheco, O.,
p.445. Almeida, N., Oliveira, C. and Costa, R., 2013. New
Pal, K., Eastwood, S.V., Michie, S., Farmer, A.J., Barnard, telerehabilitation services for the elderly. I. Miranda,
M.L., Peacock, R., Wood, B., Inniss, J.D. and Murray, M. Cruz-Cunha, Handbook of Research on ICTs and
E., 2013. Computer based diabetes self management Management Systems for Improving Efficiency in
interventions for adults with type 2 diabetes mellitus. Healthcare and Social Care, IGI Global, pp.109-132.
The Cochrane Library. Doi: 10.4018/978-1-4666-3990-4.ch006.
Thrall, J.H., 2005. Prevalence and Costs of Chronic
Disease in a Health Care System Structured for
75
HEALTHINF 2017 - 10th International Conference on Health Informatics
76
Generating a Distilled N-Gram Set
Effective Lexical Multiword Building in the SPECIALIST Lexicon
Keywords: MEDLINE N-Gram Set, Multiwords, Medical Language Processing, Natural Language Processing, the
SPECIALIST Lexicon.
Abstract: Multiwords are vital to better Natural Language Processing (NLP) systems for more effective and efficient
parsers, refining information retrieval searches, enhancing precision and recall in Medical Language
Processing (MLP) applications, etc. The Lexical Systems Group has enhanced the coverage of multiwords in
the Lexicon to provide a more comprehensive resource for such applications. This paper describes a new
systematic approach to lexical multiword acquisition from MEDLINE through filters and matchers based on
empirical models. The design goal, function description, various tests and applications of filters, matchers,
and data are discussed. Results include: 1) Generating a smaller (38%) distilled MEDLINE n-gram set with
better precision and similar recall to the MEDLINE n-gram set; 2) Establishing a system for generating high
precision multiword candidates for effective Lexicon building. We believe the MLP/NLP community can
benefit from access to these big data (MEDLINE n-gram) sets. We also anticipate an accelerated growth of
multiwords in the Lexicon with this system. Ultimately, improvement in recall or precision can be anticipated
in NLP projects using the MEDLINE distilled n-gram set, SPECIALIST Lexicon and its applications.
77
Lu, C., Tormey, D., McCreedy, L. and Browne, A.
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST Lexicon.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 77-87
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
MEDLINE.2016. However, single-word Lexicon without further query expansion resolves issues
terms comprise 98.42% of MEDLINE unigrams if the caused by fixed-phrase MWEs. Furthermore, the
word count (WC) is taken into consideration. In other Metathesaurus concept associated with a sentence
words, the current Lexicon has a very high recall rate often coincides with the longest multiword in the
of single words in MEDLINE, because most sentence. This idea is implemented in MetaMap by
frequently used single words in MEDLINE are identifying the longest LMWs in sentences for
covered. As for LMWs, we observe a continuous mapped concept ranking. Accordingly, a
growth in the Lexicon from 88,324 (32.86%) in 2002 comprehensive lexicon with a rich resource of MWEs
to 446,928 (48.81%) in 2016. Both the high coverage is an essential component to a more precise, effective,
of existing single words and the trend of increasing and efficient NLP system.
growth of LMWs in the Lexicon lead to our position
that multiword acquisition is key for future Lexicon 1.3 MWEs and LMWs
building.
Research on Multiword Expressions (MWEs) has
1.2 Multiwords in NLP been growing since the late 1990s. State of the art
methods including statistical association measures
Multiwords are vital to the success of high quality (Silva and Lopes, 1999; Fazly et al., 2009; Pecina,
NLP applications (Sag et al., 2002; Fraser, 2009). 2010), machine learning (Boukobza and Rappoport,
First, multiwords are ubiquitous. Technical 2009; Tsvetkov and Wintner, 2011; Green et al.,
terminologies in many specialized knowledge 2011), syntactic patterns (Seretan and Wehrli, 2009;
domains, particularly in areas like medicine, Kim and Baldwin, 2010; Green et al., 2013), web
computer science and engineering, are often created queries (Takahashi and Morimoto, 2013), semantic
as Multiword Expressions (MWEs) (Frantzi et al., analysis (Pearce, 2001; Baldwin et al., 2003), and a
2000; Green et al., 2013; Ramisch, 2014). Second, combination of the above methods (Calzolari et al.,
MWEs are hard to deal with in NLP tasks, such as 2002; Bejþek et al., 2013; Sangati and Cranenburgh,
identification, parsing, translation, and 2015) are used in MWE research for acquisition,
disambiguation, not only because MWEs have a large identification, interpretation, disambiguation and
amount of distinct phenomena, but also due to the other applications. Despite a great deal of research on
absence of major syntactic theories and semantic MWEs, there is no approach that fits perfectly for
formalisms. Our Lexicon with multiwords remedies building LMWs in the SPECIALIST Lexicon. LMWs
these issues. For example, most NLP applications on are a subset of MWEs due to our requirements that a
word segmentations are word-oriented legitimate Lexical entry must have a POS, inflections,
(tokenization), relying on POS taggers, stemmers, and be a unit of meaning. In short, the broader notion
and chunkers to segment each MWE as a phrasal unit of MWEs are distinguished from LWMs in four ways.
from the sentence. This process can be improved if First, a collocation (an arbitrary statistically
multiwords can be identified as a phrasal unit directly significant association between co-occurring items) is
(such as through a Lexicon lookup) and not processed not necessarily a LMW because it is not necessarily
further by taggers, e.g. phrasal preposition (“because qualified as a Lexical entry. For example,
of”, “due to”), and adverbs (“on time”). Thus, POS “undergoing cardiac surgery” occurs frequently
ambiguity can be reduced through identifying the (3,770 hits in 3,062 documents) in the 2016
POS of these MWEs. Third, non-decomposable MEDLINE n-gram set, but it is not a LMW because
MWEs, such as fixed phrases (“kingdom come”, “by it is not functioning as a special unit of meaning by
and large”) and idioms (“kick the bucket”, “shoot the itself. Moreover, this collocation is sometimes, but
breeze”), are very challenging tasks for NLP not always, a single POS. On the other hand, its
syntactically as well as semantically. While syntactic subterm, “cardiac surgery”, which occurs frequently
aspects of idiom usage necessitates a beyond-Lexical- (37,171 hits in 22,404 documents) in MEDLINE, is a
level solution to those non-decomposable MWEs, LMW. In other words, frequency alone is not
fixed phrases are handled well as LMWs in our sufficient to determine if a term is a LMW. For the
Lexicon. NLP techniques, such as Query Expansion, same reason, some phrases are not LMWs. For
do not work well on fixed-phrase MWEs for concept example, “in the house” is not a LMW while “in
mapping, unless they are seen as LMWs. For house” is. Second, verb particle constructions are
example, “hot dog” should not be expanded as “high handled by complementation types (Browne et al.,
temperature canine” to find its concept. Instead, a 2000) in Lexical records to coordinate lexical
direct Lexicon look up of “hot dog” (E0233017) meaning with syntactic characteristics of the verb.
78
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST Lexicon
For example, “beat someone up” can be constructed associated with processed element words are missed.
from the Lexical record of “beat”, as shown in Figure If we use the mean value, 65%, as an estimated
1. Similarly, light verbs that are covered within multiword ratio based on the empirical measurement
Lexical records, such as “make love” and “give birth”, (Ramisch, 2014), it will take more than 21 years for
are included in the Lexical records of “make” current LSG staff to add all multiwords to the Lexicon
(E0038623) and “give” (E0029785), respectively. by this approach (on average, 20,000 terms are added
The information on these types of MWEs is stored by LSG staff annually). And this estimate does not
inside the Lexical records and they are not considered account for the fact that many new multiwords are
LMWs (not a base form or inflectional variants of a continuously being created by biomedical researchers
Lexical entry). However, they can be and English users in general. Thus, we decided to
retrieved/identified by a parser based on the Lexicon. develop a new system to effectively build LMWs to
Third, non-decomposable idioms are beyond the the Lexicon by using an n-gram approach. MEDLINE
scope of the Lexicon, such as “kick the bucket” and was chosen as the corpus because it is the biggest and
“shoot the breeze”. Aligning the syntactic analysis of most commonly used resource in the biomedical
idiomatic phrases with their semantic interpretations domain. The MEDLINE n-gram set (MNS) was
is beyond the scope of what a lexicon can accomplish. generated by the following steps: 1) English titles and
Thus, they are not under consideration here. Fourth, abstracts from MEDLINE documents are collected
due to the complicated nature of multiwords, much and then tokenized to sentences and words (tokens);
previous MWE research only focuses on bi-grams or 2) by requirements, the MNS includes up to 5-grams
tri-grams, which do not meet the requirement of with information of associated document count (DC)
including up to five-grams to reach an estimated and word count (WC); 3) n-gram and DC|WC are
recall value of 99.47% of multiwords (Lu et al., used as key and values in Java HashMap class for n-
2015). gram retrieval; 4) due to the large scale, the computer
program for retrieving n-grams exceeds the
{base=beat
entry=E0012175
maximum keys in the Java HashMap class (230-1)
cat=verb when n > 3. Thus, a new model is developed to
variants=irreg|beat|beats|beat|beaten|beating| resolve this issue. This model involves processes of
intran splitting, grouping, filtering, combining and sorting
intran;part(about) (Lu et al., 2015). The MNS is generated by above
tran=np processes and has been distributed annually to the
tran=np;part(back) public since 2014. The MNS provides comprehensive
tran=np;part(up) raw n-gram data from titles and abstracts of
tran=np;part(down) MEDLINE. Due to its large-scale size (> 19M n-
tran=np;part(in) grams), it is difficult to be handled by computer
link=advbl programs with complicated algorithms. So, a distilled
cplxtran=np,advbl MEDLINE n-gram set (DMNS), with reduced size,
nominalization=beating|noun|E0219216 higher precision and similar recall in terms of LMWs,
} is required for the multiword acquisition task and
Figure 1: Lexical record of the verb “beat”. useful for NLP applications.
Previously, an element word approach (Lu et al., Filters (exclusive filters) are designed to be applied
2014) was used to build the Lexicon by linguists on the MNS to generate the DMNS by trapping
through a web-based computer-aided tool, LexBuild invalid LMWs. The design goal of these filters is set
(Lu et al., 2012). Unigrams with high frequency (WC) to keep the similar (high) recall rate by not trapping
from the MEDLINE n-gram set that are not in the valid LMWs. Ideally, all valid multiwords should
Lexicon were used as element words for finding new pass through these filters. The precision of the filtered
LMW candidates through the Essie search engine (Ide n-gram set can be improved significantly by applying
et al., 2007). There are several issues with this a series of filters with high recall rate. Exclusive
approach: 1) it is time consuming; 2) multiwords filters are developed based on empirical models with
associated with high frequency element words do not heuristic rules in this task. They are categorized into
necessarily have high frequency; 3) new multiwords three types as described below. Patterns and trapped
79
HEALTHINF 2017 - 10th International Conference on Health Informatics
examples are illustrated for each filter in the format associated acronym and thus cannot be a valid
of [pattern] and “example” in this paper, respectively. LMW. Trapped examples include: “magnetic
resonance imaging (MRI)”, “imaging (MRI)”,
3.1 General Exclusive Filters “magnetic resonance (MR) imaging” and
“(CREB)-binding protein (CBP)”.
This type of filter is intuitive and based on surface Indefinite Article Filter: A lowercased term that
features of terms. Terms composed merely of certain starts with an indefinite article and a space, [a ],
characters/words, such as punctuation, digits, without other n-grams that match as its spelling
numbers, spaces and stopwords do not meet the variants (spVar) pattern in the corpus (n-gram
requirement of having a special unit of lexical set) is trapped. Patterns of [a-XXX] and [aXXX]
meaning to themselves. They are used for the general are used as the spVar pattern of indefinite
purpose of filtering out invalid LMWs: articles of [a XXX], where XXX represents any
Pipe Filter: A term that contains pipe(s) is term. Trapped examples include: “a
trapped because a pipe is used as a field significant”, “a case”, “a case of”, “a dose-
separator in most NLP systems. Trapped dependent” and “a delivery rate per”.
examples include: “(|r|”, “Ag|AgCl”, etc. UPPERCASE Colon Filter: A term that contains
Punctuation or Space Filter: A term that the pattern of [UPPERCASE:] is trapped. In
contains nothing but punctuation or space(s) is MEDLINE, this is a conventional usage for this
trapped. Trapped examples include: “=”, “+/-“, pattern, such as [CONCLUSION:],
“<”, “(%)” and “-->”. [RESULTS:], [OBJECTIVE:], [METHODS:],
Digit Filter: A term that contains nothing but [MATERIALS AND METHODS:], and
digit(s), punctuation, and space(s) is trapped. [BACKGROUND:]. Trapped examples include
Trapped examples include: “2000”, “95%”, “3- “MATERIALS AND METHODS: The”, “95%
5”, “$1,500”, “(+/10.05)”, “192.168.1.1” and CI:” and “PHPT:”
“[192, 168]”. Disallowed Punctuation Filter: A term that
Number Filter: A term that contains nothing but contains disallowed punctuation is trapped.
number(s) is trapped. This filter can be Disallowed punctuation includes:
considered as a domain filter because all {}_!@#*\;"?~=|<>$`^. Trapped examples
numbers are already recorded in the Lexicon. include: “(n =”, “(P < 0.05)”, “N^N”, “group
Trapped examples include: “two”, “first and (n=6) received” and “CYP3A7*1C”.
second”, “one third”, “twenty-eight”, “Four Measurement Pattern Filter: A term that
hundred and forty-seven” and “half”. contains a measurement pattern is trapped. A
Digit and Stopword Filter: A term that contains measurement pattern is [number + unit],
nothing but digit(s) or stopword(s) is trapped. including age (“4-year-old”, “4 year-old”, “four
Trapped examples include: “50% of”, “of the”, year-old”, “4 year-olds” and “4 years or older
“1, 2, and”, “2003 to 2007”, “for >=50%” and with”), time (“four months”, “1 January 1991”,
“OR-462”. “from May 2002” and “6 hours plus”), range
(“2-3 days” and “1-2 tablets”), temperature (“at
3.2 Pattern Exclusive Filters -5 degrees”), dosage (“10 cigarettes per day”
and “0.1-2.3 mg/day”) and others (“60 inches”,
This type of filter looks for certain matching patterns “0.5 mg”, “3 mg/EE”, “10 mg/kg” and “50
in a term for trapping. Computer programs are mg/kg/day”).
implemented based on observed empirical patterns. Incomplete Pattern Filter: A term that contains
Some filters require sophisticated algorithms. an incomplete pattern is trapped. A valid
Parenthetic Acronym Pattern (PAP) Filter: A multiword should have completed parentheses
parenthetic acronym is a conventional way of or brackets. Incomplete patterns are terms that
representing an acronym expansion with the do not have an even number of left and right
associated acronym. The pattern is an acronym parentheses or square brackets or they are not
expansion followed by an acronym within a closed. Trapped examples include: “II (Hunter
closed parenthesis, e.g., [acronym-expansion syndrome”, “0.05) higher”, “bond]C-C[triple”,
(ACRONYM)]. The expansions of acronyms “(chi(2)” and “interval [95%”.
are usually valid multiwords. A term that
contains this pattern is trapped because it
contains a potential multiword plus the
80
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST Lexicon
81
HEALTHINF 2017 - 10th International Conference on Health Informatics
Sixteen high recall rate filters are applied to the gram set (19,325,338). Figure 2 shows a schematic
MEDLINE n-gram set in the same sequential order as diagram for generating the distilled MNS by applying
the first column in Table 1 to filter out invalid LMWs. these filters on the MNS. These filters are designed
Columns 6, 7 and 8 in Table 1 list the number of to independently trap invalid lexMultiwords, so the
trapped terms, the passing rate (PR) and cumulative order of filter application does not affect the final
passing rate (cum. PR) for all filters applied on the results. These filters are generic and can be used by
MEDLINE n-gram set. The passing rate of the ith different NLP projects if they meet the project
filter is the pass through terms/total terms when requirements. The Lead-End-Term filters (ID: 12-16)
applying the ith filter on the MNS individually. The have higher efficiency (trapped terms/total terms) by
pass through terms equals the total terms minus the trapping more n-grams in this process while the recall
trapped terms. The cum. PR of ith filter is the rate is above 99.99%. Theoretically, the distilled
cumulative passing rate after applying i filters in the MEDLINE n-gram set, preserves valid terms in the
sequential order of the first column in Table 1 to the MNS and thus has higher precision and similar recall
MNS. In other words, the trapped number is the sum compared to the MNS. The size of DMNS is reduced
of trapped terms by filters that apply before the ith to 38% of MNS, making it possible for complicated
filter. As a result (i = 16), the distilled MEDLINE n- computer programs to work in a reasonable time
gram set, after filtering out the majority (11,922,490) frame in practice, such as the SpVar Pattern matcher
of invalid LMWs by these 16 filters, contains about (please see section 5.1).
38.31% (7,402,848) n-grams of the MEDLINE n-
Table 1: Results of applying exclusive filters on Lexicon recall test and the MEDLINE n-gram set.
Figure 2: Schematic diagram of the MNS, filters and the distilled MNS.
82
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST Lexicon
4.3 Evaluation of DMNS and “- in details,” have the same core-term form of
“in details”. Core-terms might have punctuation
We further verify the DMNS by comparing the internally, such as "in (5) details". It is a useful
performance of the MNS and the DMNS. A smaller normalization to cluster terms with the same core
test set is set up by retrieving LMW candidates from together from the n-gram set in multiword
the Parenthetic Acronym Pattern (PAP) matcher. acquisition. As a result, 17,707 LMW candidates are
Matchers (inclusive filters) are designed to retrieve retrieved by this process. They are tagged by LSG
LMWs from MEDLINE n-grams by trapping valid linguists and are added to the Lexicon if they are valid
multiwords that match valid LMW patterns. In other LMWs. 15,850 candidates in this set are tagged as
words, terms trapped by matchers should be valid valid LMWs to reach 89.51% precision for this PAP
LMWs. The design goal of matchers is set to generate matcher, where precision is defined as: TP/(TP+FP),
high precision LMW candidates. On the other hand, as shown in case 1 in Table 2. The recall cannot be
the recall of matchers might decrease because not all found because all LMWs from MEDLINE cannot be
valid LMWs are trapped. identified in real practice. The result of this PAP
matcher is used as the baseline for performance test
Acronym expansions are good patterns for a to compare the results of other filters and matchers.
matcher because they have a high possibility of Accordingly, recall in case 1 is set to 1.00 for the
generating valid LMWs. The PAP matcher model is purpose of comparison. F1 score is defined as: (2 x
implemented as follows. First, apply Parenthetic precision x recall) / (precision + recall), is calculated
Acronym Pattern Filter on the MEDLINE n-gram set and shown in the last column in Table 2.
to retrieve terms matching the pattern of [acronym We repeat the same process by applying the PAP
expansion (ACRONYM)]. For example, “computed matcher to the DMNS to retrieve LMWs. The results
tomography (CT)”, “magnetic resonance imaging (case 2) show an improvement on F1 score with better
(MRI)”, “Unified Health System (SUS)”, etc. are precision and almost the same recall. This confirms
retrieved from the n-gram set. Second, retrieve the theoretic conclusion and the result of the recall
expansions if they match the associated acronym. test on these filters, that the distilled MEDLINE n-
Heuristic rules are implemented, such as checking the gram contains almost the same amount of valid
initial characters of first and last words of the multiwords as the MEDLINE n-gram set while its
expansion to match the first and last characters of the size is reduced to 38%. Furthermore, the cumulative
associated acronym. For example, the expansion of recall rates of these 16 filters on the recall test
“Unified Health System (SUS)” is identified as an (0.9996, multiple product of recall column in table 1)
invalid LMW because the first initial of the expansion and the recall rate of case 2 in Table 2 (0.9994) are
(U) does not match the first character of acronym (S). almost identical. This confirms that the approach of
Third, remove terms if the expansion is a subterm of applying these filters results in a similarly high recall
other expansions in the list. For example, both n- rate for both the Lexicon and the test set from PAP
grams of “cell sarcoma (CCA)“ and “clear cell matcher. Similar results of the Lexicon recall test and
sarcoma (CCA)” pass the first two steps. The invalid DMNS in Table 1 and the performance test of the
LMW of “cell sarcoma” is removed in this step PAP matcher on the MNS and the DMNS in Table 2
because it is a subterm of the valid LMW “clear cell for 3 releases (2014 to 2016) of the Lexicon and
sarcoma”. MEDLINE are found to confirm the consistency of
We applied the PAP matcher to the MNS to this approach.
retrieve LMW candidates. The lowercased core-terms
of these candidates are collected as the test set. Core-
term normalization is to normalize an n-gram to its
core form by stripping the leading and ending
punctuation. For example, “in details,”, “- in details”
Table 2: Performance comparison of MNS, DMNS and SVP matchers on a test set with 17,707 terms.
83
HEALTHINF 2017 - 10th International Conference on Health Informatics
84
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST Lexicon
85
HEALTHINF 2017 - 10th International Conference on Health Informatics
86
Generating a Distilled N-Gram Set - Effective Lexical Multiword Building in the SPECIALIST Lexicon
87
Spectral Data Fusion for Robust ECG-derived Respiration with
Experiments in Different Physical Activity Levels
Iman Alikhani1 , Kai Noponen1, Arto Hautala1 , Rahel Ammann2 and Tapio Seppänen1
1 Physiological Signal Analysis Group, Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland
2 Swiss Federal Institute of Sport, Magglingen, Switzerland
{iman.alikhani, kai.noponen, arto.hautala, tapio.seppanen}@oulu.fi, rahel.ammann@baspo.admin.ch
Keywords: Respiratory Sinus Arrhythmia, Heart Rate Variability, Spectral Fusion, R-peak Amplitude, QRS Morphologi-
cal Shape, Time-frequency Analysis, Robustness, Single-channel ECG.
Abstract: In this paper, we study instant respiratory frequency extraction using single-channel electrocardiography
(ECG) during mobile conditions such as high intensity exercise or household activities. Although there are a
variety of ECG-derived respiration (EDR) methods available in the literature, their performance during such
activities is not very well-studied. We propose a technique to boost the robustness and reliability of widely
used and computationally efficient EDR methods, aiming to qualify them for ambulatory and daily monitoring.
We fuse two independent sources of respiratory information available in ECG signal, including respiratory si-
nus arrhythmia (RSA) and morphological change of ECG time series, to enhance the accuracy and reliability
of instant breathing rate estimation during ambulatory measurements. Our experimental results show that
the fusion method outperforms individual methods in four different protocols, including household and sport
activities.
88
Alikhani, I., Noponen, K., Hautala, A., Ammann, R. and Seppänen, T.
Spectral Data Fusion for Robust ECG-derived Respiration with Experiments in Different Physical Activity Levels.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 88-95
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Spectral Data Fusion for Robust ECG-derived Respiration with Experiments in Different Physical Activity Levels
nals with the reference breathing phase recorded from breathing frequency. This model assumes that pole
both plethysmography and nasal air flow signals. The magnitude is a metric for the signal quality and ap-
third paper (Cysarz et al., 2008), compares the perfor- parently higher quality signal contains distinctive res-
mance of the estimated breathing rate derived from piratory fluctuation. They claimed that this selective
RPA and RRI signal with the actual values and exper- framework outperforms EDR estimations compared
imented on a database consisting of sleep and wake to individual RPA and RRI signal by 0.5 and 0.02 unit
data. The first paper claims that spectral-based EDR of mean absolute error (MAE), respectively, in young
estimation cannot produce accurate results and time- subjects and 0.14 and 0.13 unit within elderly sub-
domain advanced counting method is a more stable jects.
alternative for the EDR problem which could offer In order to address EDR throughout sport activi-
higher correlation. The second paper, concludes that ties, it should be noted that apart from potential ar-
the correlation coefficient between AUR based EDR tifacts during such measurements, physiological car-
and plethysmography signal is 0.56 after temporal de- diolocomotion coupling (CLC) component is intro-
lay matching, making AUR superior to both the RPA duced in the heart activity. It is already reported that
and the RSA by more than 0.05. One limitation of the there is a coupling between locomotor, respiration and
study is the small data set that they have experimented heart (Nomura et al., 2003). CLC is caused by the ca-
with. The authors of the third paper found fairly de- dence of running, walking or activities which involves
cent agreement (concordance correlation coefficient limb movement and exterior impacts from floor com-
of 0.41 to 0.79 within different age groups) between ing toward body. The rhythmic cadence of subjects
the EDR estimation and reference respiration. They alters HRV signal in a periodic manner, by influenc-
also noted that RSA components strength weaken for ing muscle pump on the circulatory system and car-
people over 50 years old which is in agreement with diac reflexes (Novak et al., 2007). This makes EDR
the findings of the first paper. estimation an even more challenging problem during
Although fairly good correspondence has been mobile activities, particularly at higher exercise inten-
achieved with rather inactive subjects, morphologi- sities.
cal variation of ECG that is generated by respiration- Although EDR is an old-standing topic in physi-
related chest movement can be contaminated by a ological signal analysis, the performance of methods
person’s movement, body position changes, and up- during typical daily activities, specifically household
per/lower limb motions; especially during sport activ- and sport activities, is not very well-examined in the
ities. Consequently, there is a clear need for a robust literature. Our goal in this paper is to evaluate widely-
EDR method that can tolerate such interference and used EDR techniques and propose a preliminary ro-
remain reliable. bust framework for instant breathing rate estimation
The aforementioned EDR methods estimate the throughout uncontrolled ambulatory condition where
respiration from the ECG derived quantities rather di- a mobile subject performs daily activities. We ana-
rectly. More advanced techniques have been proposed lyze the signals in a robust way to extract the most
in search for a more dependable EDR method to be correlated component to the instant respiratory fre-
able to assess breathing frequency or rhythm more ro- quency. To this extent, we are using a fusion tech-
bustly. Decomposition-based EDR methods, includ- nique to make the system redundant, in case artifact,
ing principal component analysis (PCA) and kernel CLC or any other components alter the extracted in-
PCA, were investigated in (Widjaja et al., 2012). In stantaneous respiratory estimation.
addition, adapted PCA and independent component
analysis (ICA) were utilized in (Tiinanen et al., 2009;
Tiinanen et al., 2015) to extract the RSA compo- 2 MATERIALS AND METHODS
nent from RRI signal and subsequently estimate the
breathing rate of subjects. Recently, a robust tech-
In this section, the construction of signals expected
nique was published in (Orphanidou et al., 2013),
to contain respiratory frequency information is ex-
which they proposed a selective framework that eval-
plained. The modeling of signal’s spectral content us-
uates both RPA and RRI signals selecting the one
ing AR time-frequency model and their adjustments,
with more strongly modulated respiratory component.
as well as the fusion of information acquired by indi-
They represented the filtered RPA and RRI signals
vidual sources are described.
with auto regressive (AR) models. An AR model con-
siders the signal to be characterized by a number of
spectral poles. They picked the pole within the res-
piratory band with higher magnitude as the estimated
89
HEALTHINF 2017 - 10th International Conference on Health Informatics
2.1 Calculation of RRI, RPA and MSV Using the aforementioned procedure, it is assured
that less than 5% of the RRi s are edited. Accord-
Single-channel ECG is recorded concurrently with a ingly, the RPA signal can be constructed from the
spirometer signal. In the subsequent ECG processing, ECG amplitudes at R-peak instants. The construc-
there are some steps that are followed before extrac- tion of MSV is explained comprehensively in (Nopo-
tion of RRI, RPA and MSV signals. nen et al., 2012). Initially, a 50 ms window is defined
Firstly, baseline wander reduction has been per- symmetrically around detected R-peak locations. It
formed using a second-order Savitzky-Golay filter is followed by the collection of all QRS complexes
with one second window. The filter fits a polynomial within the window in a matrix and a definition of a
function with the given order on each frame of ECG statistical mean shape as a template for the scale vari-
data minimizing the least-squares error, and replaces ation measure. The candidate QRS complexes are
the considered sample with the fitted value. We as- projected into the template and the scale difference
sume that the fitted function follows the baseline of between them is considered as MSV signal.
the ECG signal closely. Therefore, we subtract the Finally, we use an 8 Hz spline interpolation to have
baseline from the ECG. uniformly sampled signal in further spectral analysis.
A sample of ECG segment as well as constructed and
Secondly, the R-peaks of the ECG are detected.
interpolated signals are depicted in Figure 1.
We passed the signal through a 20th-order high-pass
Butterworth IIR filter using a zero-phase digital fil-
tering technique to suppress P and T waves and keep 600
Amplitude 400
R waves steady. The output of filter is explored (us- 200
0
ing MATLAB findpeaks function) for peaks with spe- -200 ECG
29 30 31 32 33 34 35 36 R peak
cific criteria, including passing a minimum amplitude, 800
Time [ms]
R-Peak Amplitude
nal is obtained from the successive R-peak time stamp 400
29 30 31 32 33 34 35
Interpolated RPA
36
differences as RRi , where the ith value of this signal 1
90
Spectral Data Fusion for Robust ECG-derived Respiration with Experiments in Different Physical Activity Levels
Phase (radians)
Magnitude (dB)
0
1 domain fusion that strengthens the joint spectral com-
-0.5
ponents and diminishes the ones not shared with other
Imaginary Part
0.5 2
40 45 50 55 1 spectra. We hypothesize that the fusion will be ad-
Time[s] 0
vantageous in instantaneous breathing rate estimation.
0.8
1 -0.5 Let’s assume that the spectrogram of constructed sig-
0.6
nals can be expressed as:
PSD
-1
0.4 ⎛ sig sig sig
⎞
0.2 2 -1.5 p1,1 p1,2 · · · p1,n
⎜ sig sig sig ⎟
0
-2 ⎜ p2,1 p2,2 · · · p2,n ⎟
⎜ .. ⎟
0 1 2 3 4
-1 0 1
Frequency [Hz]
Real Part
Psig = ⎜ . .. .. ⎟ (1)
⎝ .. . . . ⎠
Figure 3: A 20-second segment of interpolated and filtered
RRI signal is fed to the AR model and output zero-pole plot psig
m,1 psig
m,2 ··· psig
m,n
is depicted in the right unity circle. Lower left sub-figure where sig could be RRI, RPA or MSV signal. Every
illustrates the power spectral density (PSD) of the upper left
RRI time series. The local trends of the PSD labeled by 1
column in the spectrogram corresponds to the PSD of
and 2 are constructed as a result of poles labeled by 1 and 2 signal in a specific 20-second time window which has
in the z-plane. These two poles are higher in magnitude and one second difference with the consecutive columns
closer to unity circle which means they have stronger effect of matrix and every row, to the lied energy at specific
on the construction of PSD curve. frequency band. In the fusion matrix, we compute
the product of these arrays element-by-element. It
To derive the respiratory frequency from the spec- should be noted that these PSDs contain the same
trum, in the case of a single source EDR using RRI, number of values. Thus, the fusion spectrogram can
RPA or MSV, we find the frequency bin having high- be stated as:
est power spectral density. For instance in the lower
left sub-figure of Figure 3, the frequency value of sig-
91
HEALTHINF 2017 - 10th International Conference on Health Informatics
⎛
rpa msv rpa msv rpa msv
⎞
1,1 .p1,1 .p1,1
prri 1,2 .p1,2 .p1,2
prri ··· 1,n .p1,n .p1,n
prri grams is visible, while the fusion spectrogram (bot-
⎜ rri rpa msv rri rpa msv rri rpa msv ⎟
⎜ p2,1 .p2,1 .p2,1 p2,2 .p2,2 .p2,2 ··· p2,n .p2,n .p2,n ⎟ tom sub-figure) earns the common component be-
⎜ ⎟
Pf us = ⎜ . . .. . ⎟ (2)
⎜ . . . ⎟ tween the individual spectrums and is considerably
⎝ . . . . ⎠
rri rpa msv
pm,1 .pm,1 .pm,1 rpa msv
pm,2 .pm,2 .pm,2
rri
··· rpa msv
pm,n .pm,n .pm,n
rri narrower.
Pf us basically gives a joint spectrogram which
considers the agreement between individual spectro- 2.4 Database
gram trends as well as their strength. The frequency
bin where the maximum energy is settled at each time Since, in this study, we are aiming to evaluate the per-
instant, is selected as the estimated respiratory fre- formance of our instantaneous respiratory frequency
quency. In case there is a correlation between at least estimation methods during uncontrolled ambulatory
two of the signal’s PSDs with sufficient strength, the measurements where the subjects can freely perform
fusion PSD also offers the same trend in the fusion their daily activities, we have collected 67 subjects
spectrum. However, if there is no correlation between (30 female and 37 male) aged from 18 to 60 years
PSDs, the fusion spectrum is affected by the PSD with old during household and sport activities. The overall
higher energy. In other words, the fusion method intu- general physiological characteristics of subjects are
itively considers the signal with stronger component stated in Table 1.
as suggested in (Orphanidou et al., 2013) and also de-
cides in a cooperative manner. Table 1: General characteristics of subjects participated in
this experiment.
1 1
Characteristic mean min max
0.5 0.9
0
Height (cm) 175 160 195
0.8
1550 1600 1650 1700 1750 1800
1
Weight (Kg) 75.4 45.6 122.8
0.7
Frequency [Hz]
92
Spectral Data Fusion for Robust ECG-derived Respiration with Experiments in Different Physical Activity Levels
2
RRI
1 RPA
MSV
-1
-2
142 144 146 148 150 152 154 156 158 160
Time [s]
2
RRI
1.5 RPA
MSV
Fusion
PSD
1 Ref
0.5
1 1 1
Imaginary Part
Imaginary Part
Imaginary Part
-1 -1 -1
-1 0 1 -1 0 1 -1 0 1
Figure 5: A 20-second sample household activity data including interpolated and filtered RRI, RPA and MSV signal as well
as their PSD in the middle sub-figure. The last sub-figure shows RRI, RPA and MSV z-plane, respectively, from left to right.
3 RESULTS 1 n
xj − yj
MAPE =
n ∑| yj
| (4)
j=1
3.1 Performance Measures • Concordance Correlation Coefficient: It is a reli-
able measure to evaluate the agreement between
Let’s assume that our estimated breathing frequency two sets of signals. It can be computed using
is expressed as x and the original respiratory fre-
quency as y and n is the number of samples, in order 2Sxy
Rc = (5)
to assess our estimation results, the following metrics Sx2 + Sy2 + (ŷ − x̂)2
are computed:
where x̂ and ŷ are the average frequency of esti-
• Root Mean Square Error: mated and original signals and
n
1 n 1
RMSE = ∑ (x j − y j )2 (3) Sxy =
n ∑ (x j − x̂)(y j − ŷ) (6)
n j=1 j=1
• Mean Absolute Percentage Error: MAPE weights and Sx and Sy are the standard deviation of x and
frequency of respiration. Basically, it considers a y, respectively.
larger error margin in higher breathing rate esti-
mation.
93
HEALTHINF 2017 - 10th International Conference on Health Informatics
3.2 Quantitative Results nal) and morphological-based (RPA and MSV sig-
nals), to boost the performance of estimation us-
Figure 5 illustrates a 20-second sample data. It shows ing computationally-efficient methods. In essence,
the signals, their frequency components distributions the presented method considers the agreement be-
and specification of poles. In the middle sub-figure, tween the individual estimators and their joint spec-
three PSDs as well as computed fusion PSD are de- tral power. Overall, our fusion method outperforms
picted. Reference respiratory frequency is also ex- the individual methods considering all the metrics and
pressed by a straight green line. Instant breathing experimented activity protocols.
rate estimation using PSD is corresponded to the fre-
quency where maximum energy is settled.
Table 3 summarizes the results of the methods REFERENCES
used in four activity protocols. The data shows that
the fusion method outperforms the individual meth- Correa, L. S., Laciar, E., Torres, A., and Jane, R. (2008).
ods in all the four protocols considering different met- Performance evaluation of three methods for respi-
rics. The performance of EDR derived from RRI ratory signal estimation from the electrocardiogram.
signal (RSA-based breathing frequency estimation) is In 2008 30th Annual International Conference of the
the weakest compared to other two individual signals IEEE Engineering in Medicine and Biology Society,
particularly in sport activities. It might be due to the pages 4760–4763. IEEE.
reason that RRI signal is more vulnerable to CLC or Cysarz, D., Zerm, R., Bettermann, H., Frühwirth, M.,
Moser, M., and Kröz, M. (2008). Comparison of res-
movement artifacts during high intensity exercise. piratory rates derived from heart rate variability, ecg
amplitude, and nasal/oral airflow. Annals of biomedi-
Table 3: Acquired overall results in four different activity cal engineering, 36(12):2085–2094.
protocols. Moody, G. B., Mark, R. G., Bump, M. A., Weinstein, J. S.,
Berman, A. D., Mietus, J. E., and Goldberger, A. L.
Activity (1986). Clinical validation of the ecg-derived respira-
Spect Metric
FS TC CY TN tion (edr) technique. Group, 1(3).
RMSE 6.2 5.4 5.3 8.3 Moody, G. B., Mark, R. G., Zoccola, A., and Mantero, S.
(1985). Derivation of respiratory signals from multi-
RRI MAPE 19.0 18.0 16.0 18.0 lead ecgs. Computers in cardiology, 12(1985):113–
Rc 0.23 0.19 0.39 0.33 116.
RMSE 5.0 4.5 3.4 6.9 Nomura, K., Takei, Y., and Yanagida, Y. (2003). Compar-
ison of cardio-locomotor synchronization during run-
RPA MAPE 16.0 15.0 10.0 15.0 ning and cycling. European journal of applied physi-
Rc 0.2 0.18 0.57 0.39 ology, 89(3-4):221–229.
RMSE 4.7 4.4 3.7 6.4 Noponen, K., Tiinanen, S., and Seppänen, T. (2012). De-
riving respiration from the electrocardiogram by serial
MSV MAPE 15.0 14.0 11.0 13.0 comparison with statistical mean shape. In 2012 Com-
Rc 0.25 0.19 0.5 0.43 puting in Cardiology, pages 809–812. IEEE.
RMSE 4.6 4.1 2.9 6.4 Novak, V., Hu, K., Vyas, M., and Lipsitz, L. A. (2007).
Cardiolocomotor coupling in young and elderly peo-
Fusion MAPE 14.0 13.0 8.8 13.0 ple. The Journals of Gerontology Series A: Biological
Rc 0.28 0.24 0.57 0.45 Sciences and Medical Sciences, 62(1):86–92.
Orphanidou, C., Fleming, S., Shah, S. A., and Tarassenko,
L. (2013). Data fusion for estimating respiratory rate
from a single-lead ecg. Biomedical Signal Processing
and Control, 8(1):98–105.
4 CONCLUSION Schäfer, A. and Kratky, K. W. (2008). Estimation of breath-
ing rate from respiratory sinus arrhythmia: compari-
Ambulatory measurement of instantaneous respira- son of various methods. Annals of Biomedical Engi-
tory frequency can be achieved via ECG surrogate neering, 36(3):476–485.
signal processing. However, the performance of Thayer, J. F., Sollers III, J. J., Ruiz-Padial, E., and Vila,
breathing rate estimation during uncontrolled condi- J. (2002). Estimating respiratory frequency from au-
toregressive spectral analysis of heart period. IEEE
tion when the subject is free to move and perform Engineering in Medicine and Biology, 21(4):41–45.
his/her daily activities is in question and not well-
Tiinanen, S., Noponen, K., Tulppo, M., Kiviniemi, A., and
studied. This paper proposed a spectral fusion tech- Seppänen, T. (2015). Ecg-derived respiration meth-
nique which combines the information from individ- ods: Adapted ica and pca. Medical engineering &
ual sources of EDRs, such as RSA-based (RRI sig- physics, 37(5):512–517.
94
Spectral Data Fusion for Robust ECG-derived Respiration with Experiments in Different Physical Activity Levels
95
Technological Approach for Behavior Change Detection toward Better
Adaptation of Services for Elderly People
Firas Kaddachi1 , Hamdi Aloulou1 , Bessam Abdulrazak1,2 , Joaquim Bellmunt3 , Romain Endelin1 ,
Mounir Mokhtari3,4 and Philippe Fraisse1
1 MontpellierLaboratory of Informatics, Robotics and Microelectronics (LIRMM), Montpellier, France
2 University of Sherbrooke, Sherbrooke, Canada
3 Image and Pervasive Access Lab (IPAL), Singapore, Singapore
4 Institut Mines-Telecom (IMT), Paris, France
Abstract: Aging process is associated with behavior change and continuous decline in physical and cognitive abilities.
Therefore, early detection of behavior change is major enabler for providing adapted services to elderly people.
Today, different psychogeriatric methods target behavior change detection. However, these methods require
presence of caregivers and manual analysis. In this paper, we present our technological approach for early be-
havior change detection. It consists in monitoring and analyzing individual activities using pervasive sensors,
as well as detecting possible changes in early stages of their evolution. We also present a first validation of the
approach with real data from nursing home deployment.
96
Kaddachi, F., Aloulou, H., Abdulrazak, B., Bellmunt, J., Endelin, R., Mokhtari, M. and Fraisse, P.
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for Elderly People.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 96-105
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for Elderly People
97
HEALTHINF 2017 - 10th International Conference on Health Informatics
problems, mobility impairments and memory hallucinations, aggressiveness and anxiety (Reis-
troubles. berg et al., 1997) (Cummings et al., 1994).
• Mini Mental State Examination (MMSE) tar- Using these tests, clinicians observe task execu-
gets detection of changes in cognitive abilities, tion and analyze senior behavior, in order to iden-
such as orientation problems, attention difficul- tify cognitive impairments, autonomy problems, rapid
ties and language troubles (Cockrell and Folstein, mood changes, nutritional and behavioral anomalies.
2002). Certain inconveniences limit the efficiency of psy-
• Benton, Five Word, Clock and Verbal Fluency chogeriatric tests. In fact, it is inconvenient for se-
Tests (4Tests) target changes in cognitive func- niors to recall past events with full details at assess-
tions, such as learning problems, memory troubles ment time. It is also often not convenient for elderly
and construction difficulties (Neuropsy, 2016). people to move to assessment place.
Besides, requesting that individuals reply to given
• Geriatric Depression Scale (GDS) investigates questions and perform determined tasks has potential
changes in mood and emotions (Parmelee and negative impact on their future behaviors after assess-
Katz, 1990); e.g., feeling sad and that one’s life ment. For example, anxiety of seniors can increase
is empty is associated with possible depression. in case they feel their inability to correctly reply to
• Instrumental Activities of Daily Living (IADL) orientation questions or perform mobility tasks. Fur-
identifies changes in activities of daily living that thermore, subjective evaluation of assessment results
are associated with autonomy loss, such as us- cause possible assessment inaccuracies.
ing telephone, using means of transport, tak-
ing medicines and managing personal finances 2.3.2 Technological Methods
(Barberger-Gateau et al., 1992).
Different technological methods target behavior
• Autonomie Gerontologique et Groupes Iso- change detection. They employ technologies de-
Ressources (AGGIR) investigates changes in ployed in the environment (e.g., movement sensors,
autonomy of seniors, such as movement trou- bed sensors, cameras and microphones) or worn by
bles, household difficulties and orientation im- seniors (e.g., smart phone, smart watch and neurosen-
pairments (Lafont et al., 1999). sors). These methods conduct advanced analysis of
• Get-Up and Go targets motor behavior changes acquired data, in order to detect changes in monitored
(Mathias et al., 1986). This test asks elderly peo- behaviors.
ple to get up, walk and turn around, in order to Allin et al. propose technological method for so-
analyze task execution and identify possible mo- cial behavior change detection (Allin et al., 2003).
bility impairments. This method detects emergence of physically and ver-
bally aggressive interactions. It employs cameras and
• Mini Nutritional Assessment (MNA) investi- microphones for continuous collection of video and
gates changes in nutritional status, such as eating audio recordings. Using hidden markov models, com-
difficulties, weight loss and protein intake insuffi- plex analysis of these recordings allows to build typ-
ciency (Vellas et al., 1999). ical movement patterns for anomaly detection. How-
• Behavioral Pathology in Alzheimers Disease ever, employed cameras and microphones affect pri-
(BEHAVE-AD) and Neuropsychiatric Inven- vacy of individuals.
tory (NPI) allow to detect possible behavioral im- Avvenuti et al. target detection of wandering and
pairments for elderly people, such as presence of falls from bed during sleep (Avvenuti et al., 2010).
98
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for Elderly People
99
HEALTHINF 2017 - 10th International Conference on Health Informatics
• Activities of Daily Living are essential complex • Duration is related to length of behavior execu-
tasks of daily living that demand important physi- tion; e.g., duration of preparing meals increases
cal and cognitive capacities, such as performing due to cognitive impairments, duration of stair
household, preparing meals, dressing, hygiene, climbing increases due to walk impairments, time
and urinary and fecal elimination. spent out of home increases thanks to raised in-
• Mobility refers to motor behaviors, such as mov- terest in social interactions and time spent in free
ing indoors and outdoors, getting up, turning time activities considerably increases thanks to
around and walking. raised interest in active aging.
• Cognition includes essential cognitive tasks such • Time refers to start and end times of behavior
as learning, language and managing financial sit- execution; e.g., sleep hours are irregular due to
uation. These complex tasks are associated with sleep troubles, eating meal hours are inappropri-
temporal orientation, spatial orientation, atten- ate due to nutritional problems, going out hours
tion, calculation and construction. are changing thanks to raised interest in social
activities and taking medicine hours are adhered
• Social Life refers to social behaviors, such as thanks to cognitive status improvement.
communicating with others, using means of trans-
port, shopping and participating in collective free • Place describes where behavior is executed; e.g.,
time activities. detected falls outdoors become more frequent due
to fear of going outside, visiting senior activ-
• Nutritional Status is related to serving oneself ity center becomes less usual due to social isola-
and eating. tion and visiting city park becomes more frequent
• Health and Biological Status targets health be- thanks to raised interest in physical exercise.
haviors that indicate vision, audition and vital
sign impairments, such as irregularities in taking 3.3 Global Context
medicines and increased hospitalization number.
• Mood and Emotions correlate with physical and Analyzing behavior in correlation with global con-
cognitive functions and are significant depression text enables better understanding of behavior change.
and stress indicators. Following, we discuss influence of general personal
information, general context information and specific
Table 2: Examples of Ambient Technologies for Behavior
temporary information on behavior change.
Change Indicator Monitoring. General personal information are general descrip-
tors of persons; e.g., age over 85, health care his-
Environment Technologies tory including more than three physical and mental
Indoor Movement, contact, proximity, diseases, and inconvenient family status increase the
vibration and pressure sensors probability of behavior changes (Tardieu et al., 2016).
Outdoor Smart phone and smart watch General context information describe the envi-
with beacons ronment of behavior execution; e.g., changing one’s
house affects activities of daily living, moving televi-
sion in room not easily accessible by elderly people
3.2 Metrics reduces watching television frequency, opening smart
city subways adapted for elderly people has positive
We analyze selected behavior change indicators re-
influence on outdoor activities and building senior ac-
garding different dimensions. These dimensions are
tivity centers raises interest in social interactions.
metrics that quantify way and manner of performing
Specific temporary information refer to short-term
these indicators, and allow to apply algorithms on col-
events, such as several consecutive days of heavy
lected data for change detection. Following, we dis-
snow that obligate senior to stay at home, recent hos-
cuss four significant metrics:
pitalization of husband that raises wife’s anxiety, and
• Quantity refers to number and amount of behav- recent friend visits that improve emotional state.
ior execution; e.g., number of friend visits de-
creases due to social isolation, number of move-
ments decreases due to walk impairments, number
of sport center visits increases thanks to raised in-
terest in physical exercise and number of hospital-
izations decreases thanks to health status improve-
ment.
100
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for Elderly People
101
HEALTHINF 2017 - 10th International Conference on Health Informatics
SLOW [i] = min(0, SLOW [i − 1] + data[i] + K) (3) We use movement sensor data to analyze physical ac-
In case SHIGH is higher then +H or SLOW is lower tivity periods (PAP) of persons. We simply define a
than -H, positive or negative change occurs. PAP as period of consecutive movements, that are de-
tected with time difference less than 3 minutes.
4.1.2 Window-based Algorithm We do not consider days of inactivity, that cor-
respond to hospitalizations or holidays outside indi-
Based on Bland-Altman analysis, window-based al- vidual rooms. In our analysis, we quantify collected
gorithm applies moving window on input data to dis- movement sensor data using following metrics:
tinguish between transient deviations and continuous
• Number refers to quantity of detected movements
change (Bland and Altman, 1995). Only in case
and PAPs.
selected number of deviations are consecutively de-
tected without interruption, change occurs. • Duration is total length of detected PAPs.
Positive or negative deviations are data values that • Intensity measures mean number of detected
are higher or lower than M ± SD, where M and SD movements per PAP. This corresponds to number
correspond respectively to mean and standard devi- of detected movements divided by number of de-
ation of all previously observed data including cur- tected PAPs.
rently observed datum.
Window length (N) depends on analyzed behav-
5.3 Results
ior; e.g., seven consecutive days of staying at home
correspond to change in going out frequency or three
consecutive months of loosing weight indicate change Figure 3 shows our analysis results for patient F over
in nutritional status. Positive or negative changes are 13 months. For each month, we compute average of
detected in case N consecutive positive or negative de- daily number of movements, PAPs, their duration and
viations occur. intensity. We also study influence of mean ambient
temperature on physical activities.
We observe decrease in movement and PAP num-
ber in case ambient temperature increases. However,
5 VALIDATION PAP duration grows and PAP intensity is quite stable.
This is also observed for other patients. Higher tem-
Following, we present a first validation of our ap- perature stimulate them to perform less activities with
proach through real data from nursing home deploy- longer total duration inside individual rooms.
ment. Considering mobility as indicator of behavior For early change detection, we apply cusum-based
change, collected data allow to analyze movements of and window-based algorithms on collected data after
patients inside their individual rooms. each day. In order to validate their results, we also
apply an offline algorithm on full months of data.
5.1 Data Collection In the literature, offline algorithms provide more
robust results than online algorithms, as they retro-
Table 3: Patient Gender, Age and Monitoring Period.
spectively analyze longer periods of data (Basseville
Patient Gender Age Period(months) et al., 1993; Liu et al., 2013).
A M 90 6 We select offline algorithm of Change Point Ana-
B M 89 5 lyzer (CPA) tool (Taylor, 2000). This algorithm im-
C M 81 2 plements an iterative combination of cumulative sum
D F 84 11 control charts and bootstrapping to detect changes.
E F 95 2 Table 4 shows dates and values of identified changes
F F 85 13 in movement number data of patient F.
G F 87 13 Results of cusum-based and window-based algo-
H F 92 9 rithms are compared to those obtained with CPA tool
I F 92 4 in Figure 4, considering true positive rate (TPR), pre-
cision (P), true negative rate (TNR) and accuracy (A).
Over one year, we deploy movement sensors in Cusum-based and window-based (N=5 and N=4)
bedrooms and bathrooms of 9 patients in a french algorithms show true positive rate of 28%, 40% and
nursing home in Occagnes (Table 3). Average age of 45% respectively, as they do not detect all changes.
patients is 88 years. Their precision is 64%, 56% and 33% respectively,
102
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for Elderly People
Figure 3: Monthly Average of Movement Number, PAP Number, Duration and Intensity for Patient F.
103
HEALTHINF 2017 - 10th International Conference on Health Informatics
used for sleep period and vital sign recognition, kinect against standard method is misleading. The lancet,
sensors enable more accurate monitoring of walking 346(8982):1085–1087.
activity, and beacon sensors with smart phones allow Cao, L. (2010). In-depth behavior understanding and use:
more precise understanding of outdoor activities. the behavior informatics approach. Information Sci-
New reasoning techniques are studied to corre- ences, 180(17):3067–3085.
late identified statistical changes with overall changes Cho, H. (2015). Change-point detection in panel data via
double cusum statistic.
in behavior toward better adaptation of provided ser-
vices; e.g., decrease in weight indicates negative nu- City4Age (2016). Elderly-friendly city services
for active and healthy aging. available as
tritional change and triggers sending of personalized http://www.city4ageproject.eu/.
notifications to improve nutritional status. Cockrell, J. R. and Folstein, M. F. (2002). Mini-mental state
examination. Principles and practice of geriatric psy-
chiatry, pages 140–141.
ACKNOWLEDGEMENT Cummings, J. L., Mega, M., Gray, K., Rosenberg-
Thompson, S., Carusi, D. A., and Gornbein, J. (1994).
The neuropsychiatric inventory comprehensive as-
We give our special thanks to Saint Vincent de Paul sessment of psychopathology in dementia. Neurology,
nursing home in Occagnes, France. Our deployment 44(12):2308–2308.
in this nursing home is also supported by VHP in- Hayes, T. L., Abendroth, F., Adami, A., Pavel, M., Zitzel-
ter@ctive project and the Quality Of Life chair. berger, T. A., and Kaye, J. A. (2008). Unobtru-
Our work is part of the European project City4Age sive assessment of activity patterns associated with
that received funding from the Horizon 2020 research mild cognitive impairment. Alzheimer’s & Dementia,
4(6):395–405.
and innovation program under grant agreement num-
Hayes, T. L., Larimer, N., Adami, A., and Kaye, J. A.
ber 689731.
(2009). Medication adherence in healthy elders: small
cognitive changes make a big difference. Journal of
aging and health.
REFERENCES Kaye, J., Mattek, N., Dodge, H. H., Campbell, I., Hayes,
T., Austin, D., Hatt, W., Wild, K., Jimison, H., and
Pavel, M. (2014). Unobtrusive measurement of daily
Allin, S., Bharucha, A., Zimmerman, J., Wilson, D., Robin-
computer use to detect mild cognitive impairment.
son, M., Stevens, S., Wactlar, H., and Atkeson, C.
Alzheimer’s & Dementia, 10(1):10–17.
(2003). Toward the automatic assessment of behav-
ioral distrubances of dementia. Kibria, G. (2016). Cumulative sum and exponen-
tially weighted moving average control charts.
Aloulou, H. (2013). Framework for ambient assistive liv-
preprint, available as http://www2.fiu.edu/ kibriag
ing: handling dynamism and uncertainty in real time
/Stat5666/Handout/Chapter99.pdf.
semantic services provisioning. PhD thesis, Evry, In-
stitut national des télécommunications. Lafont, S., Barberger-Gateau, P., Sourgen, C., and Dar-
Aloulou, H., Mokhtari, M., Tiberghien, T., Biswas, J., Phua, tigues, J. (1999). Relation entre performances cog-
C., Lin, J. H. K., and Yap, P. (2013). Deployment of nitives globales et dépendance évaluée par la grille
assistive living technology in a nursing home environ- aggir. Revue d’épidémiologie et de santé publique,
ment: methods and lessons learned. BMC medical 47(1):7–17.
informatics and decision making, 13(1):1. Lavikainen, H. M., Lintonen, T., and Kosunen, E. (2009).
Andersson, J. (2014). Locating multiple change-points us- Sexual behavior and drinking style among teenagers:
ing a combination of methods. a population-based study in finland. Health promotion
international, 24(2):108–119.
Avvenuti, M., Baker, C., Light, J., Tulpan, D., and Vec-
chio, A. (2010). Non-intrusive patient monitoring of Ledolter, J. and Kardon, R. (2013). Detecting the pro-
alzheimers disease subjects using wireless sensor net- gression of eye disease: Cusum charts for assessing
works. In 2009 World Congress on Privacy, Security, the visual field and retinal nerve fiber layer thickness.
Trust and the Management of e-Business. Translational vision science & technology, 2(6):2–2.
Barberger-Gateau, P., Commenges, D., Gagnon, M., Leten- Liu, S., Yamada, M., Collier, N., and Sugiyama, M. (2013).
neur, L., Sauvel, C., and Dartigues, J.-F. (1992). In- Change-point detection in time-series data by relative
strumental activities of daily living as a screening density-ratio estimation. Neural Networks, 43:72–83.
tool for cognitive impairment and dementia in elderly Magill, E. and Blum, J. M. (2012). Personalised ambi-
community dwellers. Journal of the American Geri- ent monitoring: supporting mental health at home.
atrics Society, 40(11):1129–1134. Advances in home care technologies: Results of the
Basseville, M., Nikiforov, I. V., et al. (1993). Detection of Match project, pages 67–85.
abrupt changes: theory and application, volume 104. Mathias, S., Nayak, U., and Isaacs, B. (1986). Balance in
Prentice Hall Englewood Cliffs. elderly patients: the” get-up and go” test. Archives of
Bland, J. M. and Altman, D. G. (1995). Comparing physical medicine and rehabilitation, 67(6):387–389.
methods of measurement: why plotting difference Mesnil, B. and Petitgas, P. (2009). Detection of changes in
104
Technological Approach for Behavior Change Detection toward Better Adaptation of Services for Elderly People
time-series of indicators using cusum control charts. The mini nutritional assessment (mna) and its use in
Aquatic Living Resources, 22(2):187–192. grading the nutritional state of elderly patients. Nutri-
Miller, J. W., Naimi, T. S., Brewer, R. D., and Jones, S. E. tion, 15(2):116–122.
(2007). Binge drinking and associated health risk Wilson, E. O. (2000). Sociobiology. Harvard University
behaviors among high school students. Pediatrics, Press.
119(1):76–85.
Moskvina, V. and Zhigljavsky, A. (2003). An algorithm
based on singular spectrum analysis for change-point
detection. Communications in Statistics-Simulation
and Computation, 32(2):319–352.
Neuropsy, R. (2016). Four
Tests. http://fmc31200.free.fr/MG-
liens/Neurologie/quatre tests.pdf. [Online; accessed
September-2016].
Ormrod, J. E. (2013). Educational Psychology: Pear-
son New International Edition: Developing Learners.
Pearson Higher Ed.
Page, E. (1954). Continuous inspection schemes.
Biometrika, 41(1/2):100–115.
Parmelee, P. A. and Katz, I. R. (1990). Geriatric depression
scale. Journal of the American Geriatrics Society.
Perner, L. (2008). Consumer behaviour and marketing strat-
egy.
Petersen, J., Austin, D., Yeargers, J., and Kaye, J. (2014).
Unobtrusive phone monitoring as a novel measure of
cognitive function. Alzheimer’s & Dementia: The
Journal of the Alzheimer’s Association, 10(4):P366–
P367.
Prochaska, J. O. and DiClemente, C. C. (2005). The trans-
theoretical approach. Handbook of psychotherapy in-
tegration, 2:147–171.
Reisberg, B., Auer, S. R., and Monteiro, I. M. (1997).
Behavioral pathology in alzheimer’s disease (behave-
ad) rating scale. International Psychogeriatrics,
8(S3):301–308.
Rosenstock, I. M. (1974). Historical origins of the
health belief model. Health Education & Behavior,
2(4):328–335.
Schwarzer, R. (2008). Modeling health behavior change:
How to predict and modify the adoption and main-
tenance of health behaviors. Applied Psychology,
57(1):1–29.
Szwacka-Mokrzycka, J. (2015). Trends in consumer be-
haviour changes. overview of concepts. Acta Scien-
tiarum Polonorum. Oeconomia, 14(3).
Takeuchi, J.-i. and Yamanishi, K. (2006). A unifying frame-
work for detecting outliers and change points from
time series. IEEE transactions on Knowledge and
Data Engineering, 18(4):482–492.
Tardieu, É., Mahmoudi, R., Novella, J.-L., Oubaya, N.,
Blanchard, F., Jolly, D., and Drame, M. (2016). Ex-
ternal validation of the short emergency geriatric as-
sessment (sega) instrument on the safes cohort. Geri-
atrie et psychologie neuropsychiatrie du vieillisse-
ment, 14(1):49–55.
Taylor, W. A. (2000). Change-point analysis: a powerful
new tool for detecting changes. preprint, available
as http://www. variation. com/cpa/tech/changepoint.
html.
Vellas, B., Guigoz, Y., Garry, P. J., Nourhashemi, F., Ben-
nahum, D., Lauque, S., and Albarede, J.-L. (1999).
105
Identifying Serendipitous Drug Usages in Patient Forum Data
A Feasibility Study
Abstract: Drug repositioning reduces safety risk and development cost, compared to developing new drugs.
Computational approaches have examined biological, chemical, literature, and electronic health record data
for systematic drug repositioning. In this work, we built an entire computational pipeline to investigate the
feasibility of mining a new data source – the fast-growing online patient forum data for identifying and
verifying drug-repositioning hypotheses. We curated a gold-standard dataset based on filtered drug reviews
from WebMD. Among 15,714 sentences, 447 mentioned novel desirable drug usages that were not listed as
known drug indications by WebMD and thus were defined as serendipitous drug usages. We then
constructed 347 features using text-mining methods and drug knowledge. Finally we built SVM, random
forest and AdaBoost.M1 classifiers and evaluated their classification performance. Our best model achieved
an AUC score of 0.937 on the independent test dataset, with precision equal to 0.811 and recall equal to
0.476. It successfully predicted serendipitous drug usages, including metformin and bupropion for obesity,
tramadol for depression and ondansetron for irritable bowel syndrome with diarrhea. Machine learning
methods make this new data source feasible for studying drug repositioning. Our future efforts include
constructing more informative features, developing more effective methods to handle imbalance data, and
verifying prediction results using other existing methods.
1 INTRODUCTION in the Phase I clinical trials. Thus the time and cost
of early drug discovery and development can be
Drug repositioning, also known as drug repurposing, saved, making repositioned drugs more available to
is the identification of novel indications for the patients of currently not properly treated diseases
marketed drugs and drugs in the late-stage and more cost-efficient to pharmaceutical companies
development (Dudley et al., 2011). A well-known (Yao et al., 2011). Despite some potential
example is sildenafil, which was originally intellectual property issues, drug repositioning
developed to treat angina in clinical trial. However, carries the promise of significant societal benefits
after failure, it was resurrected to treat erectile and has attracted broad interests from the biomedical
dysfunction (Ashburn and Thor, 2004). Another community in the past decade.
example is the repositioning of duloxetine from Traditionally, drug-repositioning opportunities
depression to stress urinary incontinence, which was were discovered by serendipity. In the case of
irresponsive to many drug therapies at that time sildenafil, the clinical team was inspired with the
(Ashburn and Thor, 2004). These successful stories new repositioning idea when they found that some
demonstrated advantages of drug repositioning over patients enrolled in the original trial for angina were
new drug discovery and development. Repositioned reluctant to return the medicine due to the desirable
drugs have a better safety profile than compounds in side effect (Shandrow, 2016). Various computational
the early discovery and development stage, as they methods have been developed to systematically
have already passed several preclinical tests in explore more drug-repositioning opportunities. One
animal models and safety tests on human volunteers common strategy is to mine chemical, biological, or
106
Ru, B., Warner-Hillard, C., Ge, Y. and Yao, L.
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 106-118
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study
clinical data for drug similarity, disease comorbidity, Vanderbilt University Medical Center and Mayo
or drug-disease associations that imply repositioning Clinic. These proof-of-concept studies also
opportunities (Dudley et al., 2011, Andronis et al., witnessed several limitations, due to the nature of
2011). For instance, Keiser et al. (2009) compared EHR data: (1) EHR systems do not record the causal
chemical structure similarities among 3,665 drugs relationships between events (e.g., drugs and side
and 1,400 protein targets to discover unanticipated effects) as they are mostly designed for clinical
drug-target associations and implicated the potential operation and patient management instead of
role of Fabahistin, an allergy drug, in treating research. Whether a statistical association is causal
Alzheimer’s disease. Sanseau et al. (2012) needs to be verified through temporal analysis with a
investigated data from genome-wide association lot of assumptions. Therefore, the models become
studies to systematically identify alternative disease and/or drug specific and remain difficult to
indications for existing drugs and suggested generalize and automate in large scale. (2) A
repositioning denosumab, which was approved for significant amount of valuable information, such as
osteoporosis, for Crohn's disease. Hu and Agarwal the description of medication outcomes, is stored in
(2009) created a drug-disease network by mining the clinicians’ notes in free-text format (Yao et al.,
gene-expression profiles in GEO datasbase and the 2011). Mining these notes requires advanced natural
Connectivity Map project. By analyzing topological language processing techniques and presents patient
characteristics of this network, they inferred the privacy issues. (3) In the US, data from a single
effects of cancer and AIDS drugs for Huntington's provider's EHR system only provide an incomplete
disease. Wren et al. (2004) constructed a network of piece of patient care (Xu et al., 2014). Integrating
biomedical entities including genes, EHR data from multiple providers may be a
diseases/phenotypes, and chemical compounds from solution, but currently encounters legal and technical
MEDLINE (U.S. National Library of Medicine, challenges, as discussed in depth by Jensen et al.
2016a), and computationally identified novel (2012). Due to these limitations, neither EHR, nor
relationships between those biomedical entities in any of scientific literature, biological, and chemical
scientific publications. One such relationship they data alone appear sufficient for drug repositioning
found and validated in the rodent model was research. We need to identify additional data sources
between chlorpromazine and cardiac hypertrophy. that contain patient medication history and
Gottlieb et al. (2011) designed an algorithm called outcomes, as well as develop advanced data
PREDICT, to discover novel drug-disease integration methods to identify synergistic signals.
associations from OMIM, DrugBank, DailyMed, In the last decade or so, another type of patient
and Drugs.com. Their algorithm predicted 27% of data has increased exponentially in volume with the
drug-disease associations in clinical trials registered emergence of smart phones and social media
with clinicaltrial.gov. Although these computational websites. People today not only post their travel
methods have demonstrated their promise, they often pictures but also share and discuss their experiences
face the issue of high false positive rates (Dudley et with diseases and drugs in patient forums and social
al., 2011, Shim and Liu, 2014). One primary reason media websites, such as WebMD, PatientsLikeMe,
is sharing similar chemical structures or co- Twitter, and YouTube (Ru et al., 2015). Such data
occurring in the same publication does not always directly describes drug-disease associations in real
imply medical relevance. Also, ignoring the context human patients and bypasses the translational hurdle
(e.g., whether the similarity or validation is observed from cell-line or animal model to human, thus has
in experiments on molecular, cell line, or animal led to increased research interests. For example,
models) might impact their capability to be Yang et al. (2012) detected adverse drug reaction
translated to human beings. (ADR) signals from drug related discussions in the
More recently, researchers began to verify some MedHelp forum by using an ADR lexicon created
drug-repositioning hypotheses using the Electronic from the Consumer Health Vocabulary. Yates and
Health Record (EHR) data. For example, Khatri et Goharian (2013) extracted ADR in the breast cancer
al. (2013) retrospectively analyzed the EHR of 2,515 drug reviews on askpatient.com, drugs.com, and
renal transplant patients at the University Hospitals drugratingz.com using a ADR synonym list
Leuven to confirm the beneficial effects of generated from the United Medical Language
atorvastatin on graft survival. Xu et al. (2014) System (UMLS) specifically for breast cancer.
verified that metformin, a common drug for type 2 Rather than collecting existing social media
diabetes, is associated with improved cancer survival discussions, Knezevic et al. (2011) created a
rate by analyzing the patients’ EHR data from Facebook group for people to report their ADR
outcomes and found social media a highly sensitive
107
HEALTHINF 2017 - 10th International Conference on Health Informatics
instrument for ADR reporting . Powell et al. (2016) construction and selection, data preprocessing,
investigated the MedDRA Preferred Terms that machine learning model training and evaluation, as
appeared on Twitter and Facebook and found 26% illustrated in Figure 1. Each module is further
of the posts contained useful information for post- described below.
marketing drug safety surveillance.
In this work, we expand current social media 2.1 Data Collection
mining research that is primarily ADR focused to
the discovery of serendipitous drug usages, which We started by collecting drug reviews posted by
can suggest potentially new drug repositioning anonymous users on the patient forum hosted by
hypotheses. We build a computational pipeline WebMD. WebMD is a reputable health care website
based on machine learning methods to capture the that exchanges disease and treatment information
serendipitous drug usages on the patient forum among patients and healthcare providers. In its
published by WebMD, which was reported in a patient forum, after filling the basic demographic
previous study (Ru et al., 2015) to have high-quality information including gender and age group, users
patient reported medication outcomes data. are allowed to rate drugs in terms of effectiveness,
However, this is an extremely difficult machine ease of use, overall satisfaction, and post additional
learning task because: (1) User comments on patient comments about their medication experience (See
forum are unstructured and informal human Figure 2). We chose it based on two considerations:
language prevalent with typographic errors and chat (1) With over 13 years’ history of operation and on
slangs. It is unclear how to construct meaningful average over 150 million unique visits per month,
features with prediction power; (2) the mentioning WebMD contains a large volume of drug reviews
of serendipitous drug usages by nature is very rare. that is highly desirable for conducting systematic
Based on our experience with the drug reviews on studies. (2) The quality of drug reviews was reported
WebMD, the chance of finding a serendipitous drug
to be superior to many other social media platforms
usage in user posts is less than 3% (See Methods).
in a previous study (Ru et al., 2015). Spam reviews,
Therefore, we caution the audience that our
commercial advertisements, or information
objective in this work is not to build a perfect
irrelevant to drugs or diseases are rare, probably
pipeline or a high performance classifier, but to
thanks to their forum modulators. We downloaded a
perform a feasibility check and identify major
total number of 197,883 user reviews on 5,351 drugs
technical hurdles in the entire workflow. We plan to
direct our systems engineering efforts towards by the date of March 29, 2015. Then, we used
improving the performance of those bottleneck Stanford CoreNLP (Manning et al., 2014) to break
modules as the next step. down each free-text comment into sentences, which
is the standard unit for natural language processing
and text mining analysis.
2 METHODS 2.2 Gold Standard Dataset for
Serendipitous Drug Usages
In this feasibility study, we built the entire
computational pipeline using standard tools and In machine learning and statistics, gold standard, or
applications, to identify serendipitous drug usages in accurately classified ground truth data is highly
patient forum data, which includes data collection, desirable, but always difficult to obtain for
data filtering, human annotation, feature
108
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study
supervised learning tasks. For identifying similar to the drug's known indications listed on
serendipitous drug usages, it would be ideal if a WebMD. Mathematically SNOMED CT is a
database of drug usages approved globally or directed acrylic graph model for medical
customarily used off-label were readily available as terminology. Medical concepts are connected by
the benchmark for known drug usages. The defined relationships, such as is-a, associated with,
professional team at WebMD has published and due to. The semantic similarity between two
monographs to introduce each drug, including concepts was usually measured by the length of the
information on drug use, side effects, interactions, shortest path between them in the graph (Pedersen et
overdose, etc. We thus used such data as the al., 2007, Shah and Musen, 2008). If the medical
benchmark for known drug usages in this work. We concept mentioned in a review sentence was more
assume a drug use is serendipitous if the user than three steps away from the known indications of
mentioned improvement of his or her condition or the drug, we assumed the mentioned medical
symptom that was not listed in the drug's known concept was more likely to be an unanticipated
indications according to WebMD (See the examples outcome for the drug and kept the sentence in the
in Figure 2). Otherwise, we set the mentioned drug dataset for the third filter. Otherwise, we excluded
use to be non-serendipitous. Below we explain in the sentence from further evaluation, as it was more
more details how we applied this principal to semi- likely to be related to the drug’s known usage rather
automatically prepare our gold standard dataset for than serendipitous usage we were looking for. In the
serendipitous drug usages. third step, we used the sentiment analysis tool,
Deeply Moving (Socher et al., 2013) offered by the
2.3 Data Filtering Stanford Natural Language Processing Group to
assess the sentiment of each sentence where
Three filters were designed to reduce the number of unanticipated medical concept occurred. We filtered
drug review sentences to a number more manageable out all sentences with Very Negative, Negative, or
for human annotation. Firstly, we identified and Neutral sentiment and only kept those with Positive
removed review sentences that did not mention any or Very Positive sentiments because serendipitous
disease or symptom at all, because these sentences drug usages are unexpected but desirable outcomes
have no chance to be related to serendipitous drug to patients. Negative sentiment is more likely to be
usages. To do this, we selected the UMLS concepts associated with undesirable side effects or potential
in English and with the semantic types equal to drug safety concerns. After these three filtering
Disease or Syndrome, Finding, Injury or Poisoning, steps, 15,714 drug review sentences remained for
Mental or Behavioral Dysfunction, Neoplastic further human annotation.
Process, or Sign or Symptom and used them to
approximate medical concepts that could be related 2.4 Human Annotation
to serendipitous drug usages. We then used
MetaMap (Aronson and Lang, 2010) to identify One public health professional and one health
these medical concepts in each review sentence. informatics professional with master degrees,
Next, for sentences that did mention any of those independently reviewed the 15,714 sentences and
concepts, we used SNOMED CT (U.S. National annotated whether each sentence was a true mention
Library of Medicine, 2016b) to determine whether of serendipitous drug usage based on the benchmark
the mentioned concept is semantically identical or
Figure 2: Examples of serendipitous drug usage mention on WebMD. In the example on the left, a patient reported that his
irritable bowel syndrome (IBS) symptoms were alleviated when taking sulfasalazine to treat rheumatoid arthritis. In the
example on the right, an asthma patient taking prednisone reported the improvement of her eczema.
109
HEALTHINF 2017 - 10th International Conference on Health Informatics
dataset of known drug usages defined by WebMD. effectiveness, ease of use, overall satisfaction, and
That is, they labeled a drug use to be serendipitous if the number of people who thought the review is
the user mentioned an improved condition or helpful (See Table 1).
symptom that was not listed in the drug's known In the data-filtering step, we created four more
indications according to WebMD. Otherwise, they features, which are (1) whether the sentence contains
assigned the mentioned drug use to be non- negation, (2) the UMLS semantic types of
serendipitous. In case that the annotators did not mentioned medical concepts; (3) the SNOMED CT-
agree with each other, they discussed and assigned a based semantic distance between a drug's known
final label together. Six months later, the two indication and the medical concept the user
professionals reviewed their annotation again to mentioned in a review sentence; (4) the sentiment
avoid possible human errors. In total, 447 or 2.8% of score of the review sentence.
sentences were annotated to contain true Prior knowledge in drug discovery and
serendipitous drug usage mentions, covering 97 development also tells that some therapeutic areas,
drugs and 183 serendipitous drug usages. The rest such as neurological disorders, bacteria infection,
15,267 sentences were annotated to contain no and cancers are more likely to have “dirty” drugs,
serendipitous drug usage mentions. This dataset was which bind to many different molecular targets in
used throughout the study as the gold standard human body, and tend to have a wide range of
dataset to train and evaluate various machine effects (Yao and Rzhetsky, 2008, Frantz, 2005,
learning models. Pleyer and Greil, 2015). Therefore, drugs used in
those therapeutic areas have higher chance to be
2.5 Feature Construction and Selection repositioned. We manually selected 155 drug usages
from those therapeutic areas and used them as binary
Feature construction and selection is an important features, which hopefully capture useful information
part of data mining analysis, in which the data is and improve machine learning predictions of
processed and presented in a way understandable by serendipitous drug usages.
machine learning algorithms. The original drug We also adopted a commonly used text-mining
reviews downloaded from WebMD website come
with 11 features, including patients’ ratings of drug
110
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study
method, n-gram (Fürnkranz, 1998), to generate more algorithms, namely SVM (Cortes and Vapnik,
textual features. An n-gram is a contiguous sequence 1995), random forest (Breiman, 2001) and
of n words from a given text and it captures the AdaBoost.M1 (Freund and Schapire, 1996) to build
pattern about how people use word combination in the prediction models. The implementation was
their communication. We used the tm package in R based on Weka (version 3.7) (Hall et al., 2009) and
(Feinerer and Hornik, 2012) to do this. After the LibSVM library (Chang and Lin, 2011). For SVM,
steps of punctuation and stop words removal, word we used the radial basis function (RBF) kernel and
stemming, and rare words pruning, we extracted conducted grid search to find the optimal parameters
3,264 unigrams, 10,064 bigrams, and 5,058 trigrams. including C and gamma (¤). LibSVM is able to
For each n-gram, we calculated the information gain produce both probability estimates (Wu et al., 2004)
(Michalski et al., 2013) to assess its differentiating and class labels as output. For random forest, we
power between true and false classes in Weka (Hall empirically set the number of trees to be 500 and
et al., 2009). We excluded n-grams whose iteratively searched for the optimal value for number
information gain equaled zero and kept 177 n-grams of features. By default the prediction gives a
with positive information gain (namely 64 unigrams, probability estimate for each class. For
73 bigrams, and 40 trigrams) as additional textual AdaBoost.M1, we selected the decision tree built by
features. In total, 347 features were constructed for C4.5 algorithm (Quinlan, 2014) as the weak learner
the machine learning classification, as summarized and obtained the optimal value for number of
in Table 1. iterations through iterative search. The Weka
implementation of AdaBoost.M1 only provides class
2.6 Data Preprocessing labels as prediction results. Our evaluation therefore
is based on class label predictions from all three
We normalized the data by linearly re-scaling all algorithms, without considering the probability
numerical features to the range of [-1, 1]. Such estimates from SVM and random forest.
processing is necessary for support vector machine As the chance of finding a serendipitous drug
(SVM) to ensure no features dominate the usage (positive class) is rare and the vast majority of
classification just because of their order of the drug reviews posted by users do not mention any
magnitude, as SVM calculates the Euclidean serendipitous usages (negative class), we were
distances between support vectors and the separation facing an imbalanced dataset problem. Therefore,
hyperplane in high-dimensional space (Ali and we used the oversampling technique (He and Garcia,
Smith-Miles, 2006). Then we split the 15,714 2009, Batuwita and Palade, 2010, Kotsiantis et al.,
annotated sentences into training, validation, and test 2006) to generate another training dataset where the
datasets, according to their post dates. Sixty percent proportion of positive class was increased from
of them, or 9,429 sentences posted between 2.8% to 20%. Afterward, we tried the same machine
September 18, 2007 and December 07, 2010, were learning algorithms on the oversampled training
used as the training dataset to build machine dataset, and compared the prediction results side-by-
learning models. Twenty percent of the data, or side with those from the original, imbalanced
3,142 sentences posted between December 08, 2010 training dataset.
and October 11, 2012 were used as the validation
dataset to tune the model parameters. The remaining 2.8 Evaluation
20% of data, or 3,143 sentences that were posted
between October 12, 2012 and March 26, 2015, We were cautious about choosing appropriate
were held as the independent test dataset. The performance evaluation metrics because of the
proportion of serendipitous drug usages in the three imbalanced dataset problem. Of commonly used
datasets was between 2.0% and 3.2%. This metrics, accuracy is most vulnerable to imbalanced
arrangement is essential to pick up the models that dataset since a model could achieve high accuracy
could generalize on future and unseen data and simply by assigning all instances into the majority
minimize the bias led by overfitting, as the class. Instead we used a combination of three
validation and test datasets occur temporally after commonly used metrics, namely precision, recall,
the training dataset. and area under the receiver operating characteristic
curve (also known as AUC score) (Caruana and
2.7 Machine Learning Models Niculescu-Mizil, 2004), to evaluate the performance
of various prediction models on the independent test
We selected three state-of-art machine learning dataset. We also conducted 10-fold cross validation
111
HEALTHINF 2017 - 10th International Conference on Health Informatics
by combining training, validation and testing of iterations specifies how many times the weak
datasets together, in order to compare our results learner will be trained to minimize the training error.
directly with some other drug-repositioning studies. Its optimal value equaled 36 without oversampling
In addition, we manually reviewed 10% of and 58 with oversampling.
instances in the test dataset that were predicted to be
serendipitous drug usages and searched through the 3.2 Performance Metrics
scientific literature to check if these predictions
based purely on machine learning methods can We evaluated the performance of six prediction
replicate the discoveries from biomedical scientific models, namely SVM, random forest and
community, as another verification on whether AdaBoost.M1 with and without oversampling, on
machine learning methods alone can potentially independent test dataset. The results were
predict completely new serendipitous drug usages. summarized in Table 2. The highest AUC score
All our data and scripts from this work will be (0.937) was achieved from the AdaBoost.M1 model,
made available to academic users upon request. whereas the lowest score (0.893) was from the SVM
with oversampling. On the whole, AUC scores for
all models were higher than 0.89, demonstrating the
3 RESULTS promise of machine learning models for identifying
serendipitous drug usages from patient forums.
The precision of random forest and
3.1 Parameter Tuning AdaBoost.M1 models with and without
oversampling, and the SVM model without
We used AUC score to tune the model parameters
oversampling were between 0.758 and 0.857, with
on the validation dataset. In case that the AUC
the highest precision achieved on the random forest
scores of two models were really close, we chose the
model without oversampling. However, the
parameter and model that yielded higher precision.
precision for the SVM model with oversampling was
This is because end users (e.g., pharmaceutical
0.474, which was significantly lower than the other
scientist) are more sensitive to cases that were
models. The recall of all models was less than 0.50.
predicted to be the under-presented, rare events,
This means more than 50% of serendipitous usages
which are serendipitous drug usages in this work,
were not identified. Obtaining either low recall or
when they evaluate the performance of any kind of
low precision remains a common challenge for
machine learning based predictive models. For SVM
making predictions from extremely imbalanced
models, the optimal value of gamma (¤), the width
datasets like ours (He and Garcia, 2009). In many
of RBF kernel was 0.001 without oversampling and cases, it becomes a compromise depending on the
0.1 with oversampling. The optimal value of C, application and the users’ need. In our experiment,
which controls the trade-off between model after we increased the proportion of the positive
complexity and ratio of misclassified instances, was class to 20% by oversampling, the recall of SVM
equal to 380 without oversampling and 0.1 with and random forest models increased slightly; but the
oversampling. For random forest models, the precision and the AUC score decreased.
number of features decides the maximum number of Oversampling seemed ineffective on AdaBoost.M1
features used by each decision tree in the forest, models. The AUC score, precision and recall for
which was found to be 243 without oversampling AdaBoost.M1 with oversampling all decreased,
and 84 with oversampling at the best performance
on validation dataset. For AdaBoost.M1, the number
112
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study
compared to the metrics on AdaBoost.M1 models depression levels among lower back pain patients
without oversampling. In the 10-fold cross with depression in an 8-week clinical trial. The self-
validation experiment, both recall and AUC scores reported depression scale of patients in the tramadol
seemed to be better than what were observed on the group was 6.5 points lower than the control group.
independent test set. Our AUC scores were close to Similarly the combinatory therapy of acetaminophen
the same scores reported by the drug-repositioning and oxycodone, another painkiller, was reported by
algorithm of PREDICT (Gottlieb et al., 2011), which Stoll and Rueter (1999) to have antidepressant effect
were also from a 10-fold cross validation. too.
For the 10% of instances in the test dataset that were In the specific comment, the patient reported that
predicted to be serendipitous drug usages, we Bupropion, an anti-depressant, helped him to lose
conducted a literature and clinical trial search to weight. The weight loss effect of bupropion might
provide a closer verification of our prediction be attributed to increased dopamine concentration in
models. Table 3 summarizes the analysis. We also the brain, which leads to suppressed appetite and
presented the condensed evidences in literature reduced food intake (Greenway et al., 2010). This
and/or clinical trial below, for each instance. serendipitous drug usage was also supported by
several clinical trials (Gadde et al., 2001, Anderson
3.3.1 Metformin and Obesity et al., 2002, Jain et al., 2002).
A patient reported weight loss while taking 3.3.4 Ondansetron and Irritable Bowel
metformin, a type 2 diabetes drug. Actually in the Syndrome with Diarrhea
past two decades, metformin's effectiveness and
safety for treating obesity in adult and child patients Ondansetron is a medication for nausea and
have been clinically examined in dozens of clinical vomiting. Sometimes it causes the side effect of
trials and meta-analyses studies with promising constipation in patients. Interestingly, this patient
results (Igel et al., 2016, Desilets et al., 2008, also had irritable bowel syndrome with diarrhea and
Paolisso et al., 1998, Peirson et al., 2014, McDonagh thus ondansetron helped to regulate that. This
et al., 2014). According to the literature review by serendipitous usage actually highlights the
Igel et al. (2016), one possible explanation is that justification of personalized medicine and has been
metformin could increase the body’s insulin tested in a recent clinical trial (Garsed et al., 2014).
sensitivity, which helps obese patients (who
typically develop resistance to insulin) to reduce 3.3.5 Desvenlafaxin and Lack of Energy
their craving for carbohydrates and to reduce the
In the last case, anti-depressant desvenlafaxine was
glucose stored in their adipose tissue. Other
reported to boost energy. Strictly speaking, lack of
explanations include that metformin may enhance
energy is not a disease but a symptom. With limited
energy metabolism by accelerating the
information on the patient's physical and
phosphorylation of the AMP-activated protein
psychological conditions before and after
kinase system, or it may cause appetite loss by
medication, it remains unclear whether the energy
correcting the sensitivity and resistance of leptin.
boost effect was due to changes in the neural system
3.3.2 Painkiller and Depression or was purely a natural reflection of more positive
moods after the patient took the anti-depressant
When tramadol was taken for back pain, a patient medicine. We did not find any scientific literature
found it also helpful with his depression and anxiety. discussing the energy boost effect of desvenlafaxine.
Tramadol is an opioid medication, which have been So this case could represent either a new
long used for the psychotherapeutic benefits serendipitous drug use or a promiscuous drug usage.
(Tenore, 2008). Tetsunaga et al. (2015) have
demonstrated tramadol's efficacy in reducing
113
HEALTHINF 2017 - 10th International Conference on Health Informatics
SVM-Oversampling
Ada-Oversampling*
Literature evidence
RF-Oversampling*
Known Serendipitous
SVM
Ada*
RF*
Drug Example
indications usage
Type 2
Igel et al.
Diabetes
(2016),
Mellitus,
I feel AWFUL most of the day, Desilets et
Metformin Polycystic Obesity x x x x x x
but the weight loss is great. al. (2008),
Ovary
Paolisso et
Syndrome,
al. (1998)
etc.
Depression, It also has helped with my Tetsunaga et
Tramadol Pain x x x x
anxiety depression and anxiety. al. (2015)
114
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study
115
HEALTHINF 2017 - 10th International Conference on Health Informatics
oversampling and not shown here. More robust Conference on Artificial Intelligence, 2006 Hobart,
machine learning algorithms that are less sensitive to Australia. Springer, 362-371.
imbalanced data or robust sampling methods will be Anderson, J. W., Greenway, F. L., Fujioka, K., Gadde, K.
desirable to further improve serendipitous drug M., Mckenney, J. & O'neil, P. M. 2002. Bupropion SR
Enhances Weight Loss: A 48-Week Double-Blind,
usage predictions. Placebo-Controlled Trial. Obesity Research, 10, 633-
Last but not least, we acknowledge that as an 641.
emerging data source, online patient forums have Andronis, C., Sharma, A., Virvilis, V., Deftereos, S. &
limitations too. Many patients who write drug Persidis, A. 2011. Literature mining, ontologies and
reviews online lack of basic medical knowledge. information visualization for drug repurposing.
Their description of the medication experience can Briefings in Bioinformatics, 12, 357-368.
be ambiguous, hyperbolic or inaccurate. Also Aronson, A. R. & Lang, F.-M. 2010. An overview of
important contextual information, such as co- MetaMap: historical perspective and recent advances.
Journal of the American Medical Informatics
prescribed drugs, may be missed in the review.
Association, 17, 229-236.
Without a comparison between an experiment group Ashburn, T. T. & Thor, K. B. 2004. Drug repositioning:
and a control group, serendipitous drug usages identifying and developing new uses for existing
extracted from patient forums need to be further drugs. Nature Review Drug Discovery, 3, 673-683.
verified for drug repositioning opportunities by Batuwita, R. & Palade, V. Efficient resampling methods
integrating with existing data sources, such as EHR for training support vector machines with imbalanced
and scientific literature. datasets. In: Proceedings of the International Joint
Conference on Neural Networks (IJCNN), 2010
Barcelona, Spain. IEEE, 1-8.
Breiman, L. 2001. Random forests. Machine Learning, 45,
5 CONCLUSIONS 5-32.
Caruana, R. & Niculescu-Mizil, A. Data mining in metric
Drug repositioning is an important but not yet fully space: an empirical analysis of supervised learning
utilized strategy to improve the cost-effectiveness of performance criteria. In: Proceedings of the 10th ACM
medicine and to reduce the development time. The SIGKDD International Conference on Knowledge
Discovery and Data Mining, 2004 Seattle, WA, USA.
dawn of social media brings large volumes of
ACM, 69-78.
patient-reported medication outcome data, and thus Chang, C. & Lin, C. 2011. LIBSVM: a library for support
creates an urgent need to examine it for the purpose vector machines. ACM Transactions on Intelligent
of drug repositioning. In this work, we collected, Systems and Technology (TIST), 2, 27.
filtered, and annotated drug review comments posted Chawla, N. V., Bowyer, K. W., Hall, L. O. & Kegelmeyer,
on WebMD patient forum. We built an entire W. P. 2002. SMOTE: synthetic minority over-
computational pipeline based state-of-art machine sampling technique. Journal of Artificial Intelligence
learning and text mining methods to mine Research, 16, 321-357.
serendipitous drug usages. Our models achieved Cortes, C. & Vapnik, V. 1995. Support-vector networks.
Machine Learning, 20, 273-297.
AUC scores that are comparable to existing drug
Desilets, A. R., Dhakal-Karki, S. & Dunican, K. C. 2008.
repositioning methods. Most instances that were Role of metformin for weight management in patients
predicted to be serendipitous drug usages are also without type 2 diabetes. Annals of Pharmacotherapy,
supported by scientific literature. So machine 42, 817-826.
learning approaches seem feasible to address this Dudley, J. T., Deshpande, T. & Butte, A. J. 2011.
problem of looking for a needle in the haystack. Exploiting drug–disease relationships for
More of our future efforts will be directed to develop computational drug repositioning. Briefings in
more informative features, improve disease mapping Bioinformatics, 12, 303-311.
accuracy, handle imbalanced data, and integrate Feinerer, I. & Hornik, K. 2012. tm: text mining package. R
package version 0.5-7.1.
findings from social media with other data sources,
Frantz, S. 2005. Drug discovery: playing dirty. Nature,
in order to build really functional drug-repositioning 437, 942-943.
applications. Freund, Y. & Schapire, R. E. Experiments with a new
boosting algorithm. In: Proceedings of the 13th
International Conference on Machine Learning, 1996
REFERENCES Bari, Italy. 148-156.
Fürnkranz, J. 1998. A study using n-gram features for text
categorization. Austrian Research Institute for
Ali, S. & Smith-Miles, K. A. Improved support vector Artifical Intelligence, 3, 1-10.
machine generalization using normalized input space.
In: Proceedings of the 19th Australasian Joint
116
Identifying Serendipitous Drug Usages in Patient Forum Data - A Feasibility Study
Gadde, K. M., Parker, C. B., Maner, L. G., Wagner, H. R., Knezevic, M. Z., Bivolarevic, I. C., Peric, T. S. &
Logue, E. J., Drezner, M. K. & Krishnan, K. R. R. Jankovic, S. M. 2011. Using Facebook to increase
2001. Bupropion for weight loss: an investigation of spontaneous reporting of adverse drug reactions. Drug
efficacy and tolerability in overweight and obese Safety, 34, 351-352.
women. Obesity Research, 9, 544-551. Kotsiantis, S., Kanellopoulos, D. & Pintelas, P. 2006.
Garsed, K., Chernova, J., Hastings, M., Lam, C., Marciani, Handling imbalanced datasets: A review. GESTS
L., Singh, G., Henry, A., Hall, I., Whorwell, P. & International Transactions on Computer Science and
Spiller, R. 2014. A randomised trial of ondansetron for Engineering, 30, 25-36.
the treatment of irritable bowel syndrome with Leaman, R., Do÷an, R. I. & Lu, Z. 2013. DNorm: disease
diarrhoea. Gut, 63, 1617-1625. name normalization with pairwise learning to rank.
Gottlieb, A., Stein, G. Y., Ruppin, E. & Sharan, R. 2011. Bioinformatics, 29, 2909-2917.
PREDICT: a method for inferring novel drug Manning, C. D., Surdeanu, M., Bauer, J., Finkel, J. R.,
indications with application to personalized medicine. Bethard, S. & Mcclosky, D. The Stanford CoreNLP
Molecular Systems Biology, 7, 496. natural language processing toolkit. In: The 52nd
Greenway, F. L., Fujioka, K., Plodkowski, R. A., Annual Meeting of the Association for Computational
Mudaliar, S., Guttadauria, M., Erickson, J., Kim, D. Linguistics: System Demonstrations, 2014 Baltimore,
D., Dunayevich, E. & Group, C.-I. S. 2010. Effect of MD, USA. 55-60.
naltrexone plus bupropion on weight loss in Mcdonagh, M. S., Selph, S., Ozpinar, A. & Foley, C.
overweight and obese adults (COR-I): a multicentre, 2014. Systematic review of the benefits and risks of
randomised, double-blind, placebo-controlled, phase 3 metformin in treating obesity in children aged 18 years
trial. The Lancet, 376, 595-605. and younger. JAMA Pediatrics, 168, 178-184.
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Michalski, R. S., Carbonell, J. G. & Mitchell, T. M. 2013.
Reutemann, P. & Witten, I. H. 2009. The WEKA data Machine learning: An artificial intelligence approach,
mining software: an update. ACM SIGKDD Springer Science & Business Media.
explorations newsletter, 11, 10-18. Paolisso, G., Amato, L., Eccellente, R., Gambardella, A.,
He, H. & Garcia, E. A. 2009. Learning from imbalanced Tagliamonte, M. R., Varricchio, G., Carella, C.,
data. IEEE Transactions on Knowledge and Data Giugliano, D. & D'onofrio, F. 1998. Effect of
Engineering, 21, 1263-1284. metformin on food intake in obese subjects. European
Hu, G. & Agarwal, P. 2009. Human disease-drug network Journal of Clinical Investigation, 28, 441-446.
based on genomic expression profiles. PLoS ONE, 4, Pedersen, T., Pakhomov, S. V. S., Patwardhan, S. &
e6536. Chute, C. G. 2007. Measures of semantic similarity
Igel, L. I., Sinha, A., Saunders, K. H., Apovian, C. M., and relatedness in the biomedical domain. Journal of
Vojta, D. & Aronne, L. J. 2016. Metformin: an old Biomedical Informatics, 40, 288-299.
therapy that deserves a new indication for the Peirson, L., Douketis, J., Ciliska, D., Fitzpatrick-Lewis,
treatment of obesity. Current Atherosclerosis Reports, D., Ali, M. U. & Raina, P. 2014. Treatment for
18, 1-8. overweight and obesity in adult populations: a
Jain, A. K., Kaplan, R. A., Gadde, K. M., Wadden, T. A., systematic review and meta-analysis. CMAJ Open, 2,
Allison, D. B., Brewer, E. R., Leadbetter, R. A., E306-E317.
Richard, N., Haight, B. & Jamerson, B. D. 2002. Pleyer, L. & Greil, R. 2015. Digging deep into “dirty”
Bupropion SR vs. placebo for weight loss in obese drugs–modulation of the methylation machinery. Drug
patients with depressive symptoms. Obesity Research, Metabolism Reviews, 47, 252-279.
10, 1049-1056. Powell, G. E., Seifert, H. A., Reblin, T., Burstein, P. J.,
Jensen, P. B., Jensen, L. J. & Brunak, S. 2012. Mining Blowers, J., Menius, J. A., Painter, J. L., Thomas, M.,
electronic health records: towards better research Pierce, C. E., Rodriguez, H. W., Brownstein, J. S.,
applications and clinical care. Nature Reviews Freifeld, C. C., Bell, H. G. & Dasgupta, N. 2016.
Genetics, 13, 395-405. Social media listening for routine post-marketing
Keiser, M. J., Setola, V., Irwin, J. J., Laggner, C., Abbas, safety surveillance. Drug Safety, 39, 443-454.
A., Hufeisen, S. J., Jensen, N. H., Kuijer, M. B., Quinlan, J. R. 2014. C4.5: programs for machine learning,
Matos, R. C., Tran, T. B., Whaley, R., Glennon, R. A., Elsevier.
Hert, J., Thomas, K. L. H., Edwards, D. D., Shoichet, Ru, B., Harris, K. & Yao, L. A Content Analysis of
B. K. & Roth, B. L. 2009. Predicting new molecular Patient-Reported Medication Outcomes on Social
targets for known drugs. Nature, 462, 175-181. Media. In: Proceedings of IEEE 15th International
Khatri, P., Roedder, S., Kimura, N., De Vusser, K., Conference on Data Mining Workshops, 2015 Atlantic
Morgan, A. A., Gong, Y., Fischbein, M. P., Robbins, City, NJ, USA. IEEE, 472-479.
R. C., Naesens, M., Butte, A. J. & Sarwal, M. M. Sánchez, D., Batet, M., Isern, D. & Valls, A. 2012.
2013. A common rejection module (CRM) for acute Ontology-based semantic similarity: A new feature-
rejection across multiple organs identifies novel based approach. Expert Systems with Applications, 39,
therapeutics for organ transplantation. The Journal of 7718-7728.
Experimental Medicine, 210, 2205-2221. Sanseau, P., Agarwal, P., Barnes, M. R., Pastinen, T.,
Richards, J. B., Cardon, L. R. & Mooser, V. 2012. Use
117
HEALTHINF 2017 - 10th International Conference on Health Informatics
of genome-wide association studies for drug determinants of human genes targeted by successful
repositioning. Nature Biotechnology, 30, 317-320. drugs. Genome Research, 18, 206-213.
Shah, N. H. & Musen, M. A. UMLS-Query: a perl module Yao, L., Zhang, Y., Li, Y., Sanseau, P. & Agarwal, P.
for querying the UMLS. In: AMIA Annual Symposium, 2011. Electronic health records: Implications for drug
2008 Washington, DC, USA. 652-656. discovery. Drug Discovery Today, 16, 594-599.
Shandrow, K. L. 2016. The Hard Truth: What Viagra Was Yates, A. & Goharian, N. ADRTrace: detecting expected
Really Intended For [Online]. Entrepreneur.com. and unexpected adverse drug reactions from user
Available: reviews on social media sites. In: The 35th European
http://www.entrepreneur.com/article/254908 Conference on Information Retrieval, 2013 Moscow,
[Accessed 02/22/2016]. Russia. Springer-Verlag, 816-819.
Shim, J. S. & Liu, J. O. 2014. Recent advances in drug
repositioning for the discovery of new anticancer
drugs. International Journal of Biological Sciences,
10, 654-63.
Socher, R., Perelygin, A., Wu, J. Y., Chuang, J., Manning,
C. D., Ng, A. Y. & Potts, C. Recursive deep models
for semantic compositionality over a sentiment
treebank. In: Proceedings of the Conference on
Empirical Methods in Natural Language Processing,
2013 Seattle, WA, USA. Citeseer, 1631-1642.
Stoll, A. L. & Rueter, S. 1999. Treatment augmentation
with opiates in severe and refractory major depression.
American Journal of Psychiatry, 156, 2017.
Tenore, P. L. 2008. Psychotherapeutic benefits of opioid
agonist therapy. Journal of Addictive Diseases, 27, 49-
65.
Tetsunaga, T., Tetsunaga, T., Tanaka, M. & Ozaki, T.
2015. Efficacy of tramadol–acetaminophen tablets in
low back pain patients with depression. Journal of
Orthopaedic Science, 20, 281-286.
U.S. National Library of Medicine. 2016a. MEDLINE
Fact Sheet [Online]. Available:
https://www.nlm.nih.gov/pubs/factsheets/medline.html
[Accessed 09/29/2016].
U.S. National Library of Medicine. 2016b. SNOMED CT
[Online]. Available:
http://www.nlm.nih.gov/research/umls/Snomed/snome
d_main.html [Accessed 08/03/2015].
Wren, J. D., Bekeredjian, R., Stewart, J. A., Shohet, R. V.
& Garner, H. R. 2004. Knowledge discovery by
automated identification and ranking of implicit
relationships. Bioinformatics, 20, 389-398.
Wu, T.-F., Lin, C.-J. & Weng, R. C. 2004. Probability
estimates for multi-class classification by pairwise
coupling. Journal of Machine Learning Research, 5,
975-1005.
Xu, H., Aldrich, M. C., Chen, Q., Liu, H., Peterson, N. B.,
Dai, Q., Levy, M., Shah, A., Han, X., Ruan, X., Jiang,
M., Li, Y., Julien, J. S., Warner, J., Friedman, C.,
Roden, D. M. & Denny, J. C. 2014. Validating drug
repurposing signals using electronic health records: a
case study of metformin associated with reduced
cancer mortality. Journal of the American Medical
Informatics Association, 22, 179-191.
Yang, C. C., Yang, H., Jiang, L. & Zhang, M. Social
media mining for drug safety signal detection. In:
Proceedings of the 2012 International Workshop on
Smart Health and Wellbeing, 2012 Maui, HI, USA.
ACM, 33-40.
Yao, L. & Rzhetsky, A. 2008. Quantitative systems-level
118
Data-driven Web-based Intelligent Decision Support System for Infection
Management at Point-Of-Care: Case-Based Reasoning Benefits and
Limitations
Bernard Hernandez1 , Pau Herrero1 , Timothy M. Rawson2 , Luke S. P. Moore2 , Esmita Charani2 ,
Alison H. Holmes2 and Pantelis Georgiou1
1 Centre
for Bio-Inspired Technology, Imperial College London, U.K.
2 Health Protection Unit in Healthcare Associated Infections and AMR, Imperial College London, U.K.
b.hernandez-perez@imperial.ac.uk
Keywords: Antimicrobial Resistance, Infection Diseases, Antibiotics, Decision Support System, Case-Based Reasoning,
Machine Learning, User Interface, Point of Care.
Abstract: Antimicrobial Resistance (AMR) is a major patient safety issue. Attempts have been made to palliate its
growth. Misuse of antibiotics to treat human infections is a main concern and therefore prescription behaviour
needs to be studied and modified appropriately. A common approach relies on designing software tools to
improve data visualization, promote knowledge transfer and provide decision-making support. This paper
explains the design of a Decision Support System (DSS) for clinical environments to provide personalized,
accurate and effective diagnostics at point-of-care (POC), improving continuity, interpersonal communication,
education and knowledge transfer. Demographics, biochemical and susceptibility laboratory tests and individ-
ualized diagnostic/therapeutic advice are presented to clinicians in a handheld device. Case-Based Reasoning
(CBR) is used as main reasoning engine to decision support for infection management at POC. A web-based
CBR-inspired interface design focused on usability principles has also been developed. The proposed DSS is
perceived as useful for patient monitoring and outcome review at POC by expert clinicians. The DSS was rated
with a System Usability Scale (SUS) score of 68.5 which indicates good usability. Furthermore, three areas of
improvement were identified from the feedback provided by clinicians: thorough guidance requirements for
junior clinicians, reduction in time consumption and integration with prescription workflow.
119
Hernandez, B., Herrero, P., Rawson, T., Moore, L., Charani, E., Holmes, A. and Georgiou, P.
Data-driven Web-based Intelligent Decision Support System for Infection Management at Point-Of-Care: Case-Based Reasoning Benefits and Limitations.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 119-127
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
tion, a well designed DSS sustains the advanced al- sis and advisory tools usually rely in statistics, ma-
gorithms implemented in its core with a fully com- chine learning and artificial intelligent techniques to
prehensible representation to support confidence in provide a higher level of data extraction. For exam-
doctors. Since medical knowledge is voluminous, it ple, diagnose and therapy advisers (Paul et al., 2006)
has to be focused on data and decision making while or infection risk assessment (Mullett et al., 2004).
providing access to electronic health records (HER) Different approaches have been used to design
and personal health information (PHI). Many stud- intelligent DSS, each one with their own benefits
ies show that young clinicians engage better with the and drawbacks. Decision trees are popular for their
use of mobile applications, displaying great potential simplicity to understand and construct from logi-
to improve learning and augmenting traditional train- cal rules and have been applied in dengue fever di-
ing (Boulos et al., 2014). agnosis (Tanner et al., 2008) and antibiotic selec-
In this paper we postulated that an appropri- tion (William Miller, 2013). The amount of comput-
ately designed clinical information technology sys- ing time required for large datasets is still reasonable.
tem could improve reliability and consistency of col- However, they do not tend to work well if decision
lecting vital signs; their visualization, interpretation boundaries are smooth (Quinlan, 1986) and are not
and analysis; and the delivery of a more sophisti- optimal for uncorrelated variables. As a result of the
cated DSS. Therefore, health care professionals and greedy strategy applied, they also present high vari-
biomedical engineers from Imperial College of Lon- ance and are often unstable, tending to over-fit.
don have designed a prototype system accessible at Probability-based approaches are emerging due
the point-of-care (POC) with the specific objectives to its capacity to represent and handle uncertain-
of improving three main areas: personalization and ties (Pearl, 1988). Bayesian Networks (BN) are prob-
therefore outcomes of infection management; conti- abilistic networks that represent a set of variables
nuity through POC support for interpersonal commu- (nodes) and their dependencies (arcs) using a graph.
nication; and education during interactions between Such causal dependencies, influences or correlations
clinicians and infection specialists. are defined based on the experience of clinicians.
Hence, it can be associated with a rule-based sys-
tem, which uses data to refine the previously defined
2 BACKGROUND relationships. They have been widely exploited in
health-care (Lucas et al., 2004). Particularly, Causal
Critical care, infection management and antimicrobial Probabilistic Networks (CPN) have been used to de-
stewardship is predominantly multidisciplinary with velop DSS in diagnosis of cancer (Kahn et al., 1997),
involvement of infection specialists being crucial. In ventilator-associated pneumonia (Lucas et al., 2003)
practice, antimicrobial prescribing frequently occurs and sepsis (Tsoukalas et al., 2015). Bayesian Net-
out of hours, and when advice is dispensed by in- works offer a natural way of representing uncertain-
fection specialists, uptake can be variable. Current ties, however an insufficient understanding of their
patient management systems rarely integrate DSSs to formal meaning may give rise to modelling flaws.
assist with this, or if they do, this is very basic. There- In particular, Causal Probabilistic Networks are best
fore, there is an evident need for an intelligent clinical suited to tackle very specific situations as bloodstream
DSS. infection (Paul et al., 2006). Unfortunately, treatment
recommendation is poor since they usually prescribe
broad-spectrum antibiotics (Kofoed et al., 2009). Fur-
2.1 Decision Support Systems thermore, there is a lack of guidance to report and in-
terpret their results by non experts.
A clinical DSS can be defined as a computer program The Case-Based Reasoning (CBR) methodol-
that is designed to analyse data to help health care ogy (Aamodt and Plaza, 1994) has been used to tackle
professionals make clinical decisions. They are meant problems in antibiotic therapy (Heindl et al., 1997)
to increase quality of care, enhance health outcomes and molecular biology (Jurisica and Glasgow, 2004).
and reduce human errors while improving efficiency, The aim is to use previous experience in form of cases
cost-benefit ratio and patient satisfaction. Most ba- to understand and solve new problems.
sic systems include assessment, monitoring and in-
formative tools in the form of computerized alerts,
reminders and electronic clinical guidelines. For ex- 2.2 Case-Based Reasoning
ample, therapy and vital signs monitoring (McGregor
et al., 2006) or susceptibility test results visualiza- Case-based reasoning is a widely used approach to
tion (Flottorp et al., 2002). More advanced diagno- solve new problems based on previous experience in
120
Data-driven Web-based Intelligent Decision Support System for Infection Management at Point-Of-Care: Case-Based Reasoning Benefits
and Limitations
Current
The system architecture is shown in Figure 2 were
SE
Case
two parts are clearly differentiated: server and client
Case Base sides. The server side processes queries, interacts
with the permanent storage and serves web pages
Solved to the client side. The latter displays information
Case i
Case to users. The modules constituting the server side
are: a) CBR for history review and case compari-
General Knowledge son. b) Probabilistic Inference (PI) aims to provide
step-wise guidance fitting the decision pathway fol-
R
Learned
EV
Case
lowed by clinicians for infection management. c) Pa-
I
121
HEALTHINF 2017 - 10th International Conference on Health Informatics
Server Client
PI Dosing
ADM IN LAB.RESU LT S
Patient
P AT H CBR EPIC IMPOC Module API HIST ORY
M ICRO ST AT S
AMR Antibiogram
Trends
Figure 2: High-level diagram describing the main components of the DSS. The external databases that are currently being ac-
cessed are patient administration system (ADMIN), pathology laboratory tests (PATHO) and microbiology results (MICRO).
The server side has the following independent modules: Case-Based Reasoning (CBR), Probabilistic Inference (PI), Patient
module, Dosing module, antibiogram and AMR trends. All the information is accessed through an API and presented on a
handheld device to clinicians.
can be grouped in five different sets: metadata, de- formation to be presented in the interface. A single
scription, solution, justification and result. However, case is formed by several components, mostly regard-
only those in the description container are used to ing the type and source of the data, and has been di-
compute the similarity scores. Some examples of vided in different sections (tabs in Figure 3) for visu-
attributes used to define the case are: demograph- alization purposes. The Resume section is read-only
ics (age, gender or weight), existing diseases (aller- and displays the most relevant information (e.g. in-
gies, HIV or diabetes), respiratory system (ventilation fectious micro-organisms or organs infected) while
support or oxygen requirements), abdomen (abdomi- Description shows additional information and allows
nal examination, renal support or catheter), biochemi- the insertion/modification of parameters within the
cal markers (creatinine or bilirubin) and microbiology case. Solution contains the antibiotic therapy pre-
(infectious organisms). scribed (including frequency, via and doses) and a
section to collect feedback from users.
3.3 Client Side Six routinely requested biochemical markers were
selected as main indicators of infection and patient
The client side is a web-based application imple- status after reviewing the scientific literature and dis-
mented using HTML, CSS and Javascript which is cussion with clinicians and infectious disease experts.
accessible through the browser. It follows a respon- The temporal evolution of such biochemical markers
sive design approach to render a consistent interface is shown in Pathology (see Figure 3) as time-series
across different devices, from desktop computers to where coloured background indicates the normal ref-
mobile phones and tablets with different screen sizes. erence range. Additionally, it is possible to hide/show
An efficient DSS user interface should present all time-series to improve visualization.
the information relevant to clinicians neatly, combin- Susceptibility testing is used to determine which
ing different resources of patient-related information antimicrobials will inhibit the growth of micro-
(i.e. demographic, pathology and microbiology data). organisms causing a infection and is generally per-
Since some data might be missing or not available, it formed in vitro. The Microbiology section displays
is also desired to enable clinicians to manually input the result of all the susceptibility tests requested for
data or comments for further consideration. In addi- the patient. The outcomes of the tests are provided
tion, infections evolve with time and so do treatments. for individual pairs (infectious organism and antibi-
Thus, inspection of previous symptoms, treatments otic) and are categorised as resistant, intermediate and
and outcomes is desired. Since there is an straightfor- sensitive. They are also presented during antibiotic
ward relation between cases as interpreted in clinical therapy selection for further guidance.
environments and cases in the CBR methodology, a
case is considered as main unit of patient related in-
122
Data-driven Web-based Intelligent Decision Support System for Infection Management at Point-Of-Care: Case-Based Reasoning Benefits
and Limitations
Figure 3: EPIC IMPOC web-based decision support system overview. The main unit of information is the case and its
content is displayed among five different tabs (Resume, Description, Pathology, Sensitivity and Solution). The user interface
is divided in three main areas: patient selection, dashboard with current patient (top) and retrieved cases (bottom), history
review and a side bar to add/remove cases to/from such dashboard.
123
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: The original SUS statements (Brooke et al., 1996), average agreement and SUS contribution.
SUS statements Avg. rating SUS contribution
I think that I would like to use this system frequently. 2.8 1.8
I found the system unnecessarily complex. 1.4 3.6
I thought the system was easy to use. 2.0 1.0
I think that I would need the support of a technical person to be able to use this system. 1.6 3.4
I found that the various functions in this system were well integrated. 3.0 2.0
I thought that there was too much inconsistency in this system. 0.2 4.8
I would imagine that most people would learn to use this system very quickly. 2.8 1.8
I found the system very cumbersome to use. 2.2 2.8
I felt very confident using the system. 3.0 2.0
I needed to learn a lot of things before I could get going with this system. 0.8 4.2
of 10 statements to which participants indicate their ther parameters, not necessarily directly related
agreement from 1 to 5, where 5 indicates strongly with infections.
agree. Predefined rules for positive and negative state-
ments are used to obtain the SUS contributions. The From the preliminary trial performed by infection
SUS contribution for each statement ranges from 1 specialists and the feedback obtained from the sur-
to 4 where higher scores indicate better usability (see veys, it is possible to conclude that the CBR algorithm
Table 1) and their sum is multiplied by 2.5 to calcu- is able to mimic the prescription practices of users.
late the final SUS score. It ranges from 0 to 100 where However, that is not enough to promote change in an-
poor and great product usability are indicated for SUS tibiotic prescription practices. Initially, as a quick so-
scores under 50 and over 80 respectively. This survey lution infection specialists were keen in creating an
is technology agnostic, quick, provides a single score “ideal” case base; that is, a set of cases with opti-
and is non proprietary. A free-text box was added for mal antibiotic therapies according to infection guide-
additional comments and suggestions. lines and expert prescriptions. Such optimal therapies
would then be suggested by the decision support sys-
The SUS survey was completed by 10 different
tem to further users. Hence, the knowledge would be
participants (83% males) from 27 to 51 years old
transferred from infection specialists to other clinical
where technical training in the use of the system was
staff (e.g. nurses and clinicians).
not provided. The profile of those participants was in-
fection specialist (two), clinician (three), nurse (four) Unfortunately, this approach presents several
and other staff (one). The SUS contribution for each drawbacks. Creating a complete case base that covers
statement is presented in the right column in Table 1. the whole spectrum of possibilities is nearly impossi-
The final SUS score obtained is 68.5 which indicates ble and time consuming. In addition, infections are
good product usability with margin to improve. Ad- often acquired in hospitals by contagious as a con-
ditionally, a variety of comments were provided by sequence of treating more severe diseases which di-
participants and have been synthesized in the follow- minish the immune system (e.g. surgeries and can-
ing bullet points: cer). Therefore, future therapies prescribed by clin-
icians and recorded in the system might not agree
• There is a common concern among experienced with the infection guidelines reshaping the case base
clinicians and infection specialists in the use ju- and therefore altering CBR recommendations. A case
nior doctors would do of such large amount of base with strictly guideline oriented therapies on the
data displayed in the interface. The decision sup- long-term is unrealistic and limits the scope and us-
port system has potential to help training junior ability of the system.
doctors and improve their prescription practices, After discussion with a multi-professional team
but it needs to narrow the presented information including physicians, nurses, pharmacists and non-
providing specific guidance. medical researchers, an study to map the pathway
followed by clinicians to prescribe antibiotics thera-
• Clinicians consider the user interface intuitive and
pies was performed (Rawson et al., 2016a). The re-
helpful for patient long-term monitoring and man-
ported infection management pathway was defined as
agement, however it might sometimes be time
a stepwise Bayesian model of estimating probabili-
consuming. Additionally, it does not entirely fit
ties in which each step adds systematically informa-
with the work-flow followed to prescribe antibi-
tion to allow optimisation of decisions on diagnosis
otic therapies.
and management of infection. Initially, clinicians es-
• They suggested the possibility of recording fur- timate the risk of infection and attempt to localize its
124
Data-driven Web-based Intelligent Decision Support System for Infection Management at Point-Of-Care: Case-Based Reasoning Benefits
and Limitations
source by looking at patient’s physiological parame- the system is usable but not necessarily easy. Note
ters. Once clinicians construct a picture of the severity that some wording used by the original SUS was sug-
of the infection, whether or not to initiate antimicro- gested to be poorly understood by participants affect-
bial therapy is decided. In this step, local microbiol- ing the results (Bangor et al., 2008). As an exam-
ogy guidance provided within hospitals was the most ple, the sixth statement which contributed the most
commonly cited factor. Finally, they review and refine contains the wording “too much” which might be un-
the treatment accordingly. clear. Additionally, users may not have a good sense
This new approach enables to produce very spe- of the required complexity of such systems since there
cific step-by-step probability-like decision support. are no commonly known competing solutions and
This would improve the guidance provided to junior the wording “unnecessarily” in the second statement
clinicians and facilitates the validation of decision- might have led to a higher contribution of 3.6. There-
making for each individual step. Additionally, since fore, the final SUS score is possibly slightly less that
reviewing of previous cases is not necessary it would the one presented.
greatly reduce usability time. Since the methodology There is still much to be done to make these sys-
integrates with the infection management pathway, it tem work in routine clinical practice. Measuring ab-
will likely influence prescription practices to a higher solute usability using a single metric is very challeng-
degree than CBR. ing since many external factors influence the results
(e.g. technical training or accessible technology). The
feedback provided greatly helped to identify areas of
improvement and the results of the survey are a use-
5 DISCUSSION ful source for future comparison to asses the benefits
of including new components to tackle the identified
DSSs are being exploited in several areas such as weaknesses.
business or economics but their acceptance by clin-
ical staff is obstructing its use in hospitals and other
clinical environments (Kawamoto et al., 2005). De-
signing a DSS based on usability principles and sim- 6 CONCLUSIONS
ply providing the clinical information does not guar-
antee acceptance (Moxey et al., 2010). Other factors CBR methodology was incorporated in a DSS as
as accessibility, availability, easy of use, time require- decision-making engine providing similar antibiotic
ments and integration into the clinical workflow are therapies to those prescribed by expert clinicians in
important and need to be considered (Tsopra et al., the majority of cases in our preliminary trials. In
2014). Taking previous knowledge in consideration, addition, it was widely accepted for information re-
a DSS to support prescription of antibiotic therapies trieval and long-term patient monitoring and manage-
and patient monitoring at POC exploiting the CBR ment. Three main areas of improvement were identi-
methodology was implemented. fied from the feedback provided by expert clinicians:
In many circumstances, as complicated cases, specific guidance requirements for junior clinicians, a
providers prefer to consult their colleges or more need to reduce time consumption using the DSS and
specialised clinicians as infection specialists. This a better integration into clinical workflow.
consultation among different members of the clini- The reported infection management pathway was
cal staff was facilitated by the DSS. In addition, it defined as a multi-step Bayesian-like approach (Raw-
was believed to enhance decision making and homo- son et al., 2016a) which inherently tackles most of the
geneous collection of vital signs among clinicians re- weaknesses identified: specific guidance, time con-
sulting in better prescribing practices. Furthermore, straints and integration in the workflow. Therefore,
re-entering patient data to generate advices is a deter- it is more suitable to support and modify prescription
rent to use (Moxey et al., 2010) and integration into practices.
existing programs (e.g. electronic medical records) The combination of both approaches into one sin-
was a clear facilitator. gle decision support system is a very elegant solution
The usability measured through the SUS survey that could lead to an increase in acceptability among
was 68.5 which is about average and shows poten- clinicians. To validate its feasibility, infection risk and
tial margin for improvement. A similar strength of source of infection inference from biochemical mark-
agreement was shown by participants for the third and ers are considered as primary steps. The final integra-
eight statements which had an average rating of 2.0 tion of such inference in the user interface has poten-
and 2.2 respectively. The SUS contribution for each tial to reduce misuse of antibiotics and its evaluation
statement was 1.0 and 2.8 respectively, indicating that forms the basis for future work.
125
HEALTHINF 2017 - 10th International Conference on Health Informatics
126
Data-driven Web-based Intelligent Decision Support System for Infection Management at Point-Of-Care: Case-Based Reasoning Benefits
and Limitations
127
Healthcare-Oriented Characterisation of Human Movements
by Means of Impulse-Radar Sensors
and by Means of Accelerometric Sensors
Keywords: Healthcare, Impulse-Radar Sensor, Accelerometer, Measurement Data Processing, Uncertainty Estimation.
Abstract: This paper is devoted to the healthcare-oriented characterisation of the human movements by means of the
accelerometric and impulse-radar sensors – the sensors that may be employed in care services for
monitoring of elderly and disabled persons. Characterisation of the movements in terms of the so-called
self-selected walking velocity can be used by the medical and healthcare personnel to assess the overall
health status of a monitored person. The quality of the characterisation, based on the measurement data from
accelerometric and impulse-radar sensors, has been assessed in a series of real-world experiments which
involved the estimation of the instantaneous and mean walking velocity of a person moving according to
predefined patterns. Some indicators of uncertainty of the velocity estimation, determined with respect to
assumed predefined velocity values, have been used for comparison of the performance of both types of
sensors. The experiments have shown that impulse-radar sensors enable one to estimate the mean walking
velocity more accurately than the accelerometric sensors: the estimates obtained on the basis of data from
the latter sensors are affected by larger bias and are more widely spread around their mean values.
128
Mazurek, P., Wagner, J., Miekina,
˛ A., Morawski, R. and Jacobsen, F.
Healthcare-Oriented Characterisation of Human Movements by Means of Impulse-Radar Sensors and by Means of Accelerometric Sensors.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 128-138
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Healthcare-Oriented Characterisation of Human Movements by Means of Impulse-Radar Sensors and by Means of Accelerometric Sensors
those techniques may be less intrusive than vision- been acquired by means of the APDM Opal
based solutions (e.g. digital cameras), less accelerometric sensor (cf. http://www.apdm.com/
cumbersome than wearable solutions (e.g. wearable-sensors/) attached to the waist of a
accelerometers and gyroscopes), and less invasive monitored person, and by means of a pair of
with respect to the home environment than synchronised impulse-radar sensors – cf. (Morawski
environmental solutions (e.g. pressure sensors). et al., 2014) – whose location is shown in figure 1. A
This paper is devoted to the assessment of the monitored person has moved at the distance of ca.
uncertainty of the estimation of the walking velocity, 1–6.5 m from each of them.
on the basis of data acquired by means of impulse- The walking velocity has been assessed on the
radar sensors and by means of accelerometric basis of real-world data acquired when an
sensors. As suggested in the literature, e.g. (Fritz and experimenter has been walking at various constant
Lusardi, 2009), the walking velocity is highly velocities, ranging from 0.5 m/s to 1.0 m/s, forth and
informative for healthcare experts; for example: back along a straight line – R 20 times along the
the velocity lower than 0.6 m/s enables them to x-axis, between points (0,3) and (4,3), and R times
predict an increase in the risk of falls and along the y-axis, between points (2,1) and (2,5) (cf.
hospitalisation of a monitored person; figure 1). In order to assure a known constant
an improvement in walking velocity of at least walking velocity, a metronome has been used.
0.1 m/s is a useful predictor for well-being;
a decrease of the same amount is correlated with
deterioration of the health status or advancement
of disability.
The comparative study, reported in this paper, is
based on an extensive set of real-world experiments
which comprise:
simultaneous recording of measurement data
from both types of sensors, representative of the
gait characteristics of a person moving according
to predefined patterns;
statistical analysis of those data, aimed at
determination of certain indicators of uncertainty
of the velocity estimation.
Due to the operation principle of both types of
sensors, one may expect that the position of a
monitored person can be better estimated on the
basis of the data from impulse-radar sensors
(hereinafter called radar data for brevity), and its
acceleration – on the basis of data from the
accelerometric sensors (hereinafter called
accelerometric data for brevity). Therefore, despite Figure 1: Experimental setup; the crosses indicate the
the fact that both the position and the acceleration reference points, i.e. the points where marks have been
may also be of interest for the healthcare personnel, placed on the floor.
this study is confined to the uncertainty of the
estimation of the velocity, which requires similar 2.2 Data Preprocessing
degree of the measurement data preprocessing for
both types of sensors. 2.2.1 Radar Data
The measurement data from a pair of impulse-radar
sensors – after preliminary preprocessing, as
2 METHODOLOGY OF described in (MiĊkina et al., 2016a) – take on the
EXPERIMENTATION form of a sequence of numbers representative of the
x-y coordinates of a monitored person.
2.1 Data Acquisition A sequence of the estimates of the instantaneous
walking velocity may be obtained by numerical
The raw measurement data for experimentation have differentiation of the sequence of the position
estimates, e.g. by means of the central-difference
129
HEALTHINF 2017 - 10th International Conference on Health Informatics
method (Wagner et al., 2015), defined by the determined experimentally. The corrected velocity
formula: trajectories in the magnetic north and west directions
d d (denoted with vˆnN and vˆnW , respectively) have been
dˆn(1) { n 1 n 1 for n 1, , N 1 (1)
'tn used for computing the total velocity magnitude
according to the formula:
where ^dn ` is a sequence of data to be
vˆ vˆ
N 2 W 2
vˆn xˆ yˆ
(1) 2
n
(1) 2
n for n 1, , N (2) Prior to the evaluation of the uncertainty of the
estimation, some outlying sequences have been
where xˆn(1) and yˆ n(1) are estimates of the first removed to prevent the misinterpretation of the
derivatives, computed on the basis of the estimates results. The outlying sequences have been identified
of the x- and y-data sequences. as those whose mean value:
N
1
2.2.2 Accelerometric Data Pˆ ( r )
N
¦ vˆn 1
(r)
n (6)
130
Healthcare-Oriented Characterisation of Human Movements by Means of Impulse-Radar Sensors and by Means of Accelerometric Sensors
predefined value of that velocity, It is worth being noticed that the uncertainty of
the absolute root-mean-square discrepancy of the estimation, based on radar data, is direction
estimates with respect to the predefined value, dependent: for the movement along the x-axis and
the lower and upper bounds of the absolute predefined velocity values from 0.5 m/s to 0.7 m/s,
discrepancy between the estimates and the the estimated mean value of the velocity oscillates
predefined value. around the predefined value during the movement.
The above indicators have been calculated This cannot be observed for the movement along the
separately for each set of Rc estimates of mean y-axis in the same range of velocity values.
walking velocity, obtained in each experiment by Moreover, it may be seen that the standard deviation
averaging its N samples. of the velocity is greater for the movement along the
x-axis.
Those differences are caused by the fact, that the
calculation of the position of the moving person is
3 RESULTS AND DISCUSSION easier when the distance between the person and
each of the radars is equal (i.e. when each radar sees
In figures 2–5, the mean sequences of instantaneous
the same side of the human body).
velocity estimates of a moving person, obtained on
On the other hand, it may be noticed that the
the basis of the radar data and accelerometric data –
uncertainty of estimation, based on accelerometric
for both directions of movement (i.e. along x-axis
data, is direction independent.
and along y-axis) and for all predefined velocity
values – are presented.
a) b)
Predefined velocity = 0.5 m/s
2
Predefined value
Mean value
1.5
Mean value +/- 3std
0.5
-0.5
4 5 6 7 8 9 10 11 12
Time [s]
0.5
-0.5
3 4 5 6 7 8 9 10
Time [s]
Figure 2: Uncertainty indicators determined for estimates of the velocity of a moving person, obtained on the basis of the
radar data (a) and accelerometric data (b), for the movement along x-axis with the velocity values ranging from 0.5 m/s to
0.6 m/s. In all sub-figures: the thick solid line denotes the sequence of mean values, while the dotted lines – the sequences
of values that are three standard deviations away from the mean sequence.
131
HEALTHINF 2017 - 10th International Conference on Health Informatics
a) b)
0.5
-0.5
2 3 4 5 6 7 8
Time [s]
1 1
0.5 0.5
0 0
-0.5 -0.5
2 3 4 5 6 2 3 4 5 6
Time [s] Time [s]
Figure 3: Uncertainty indicators determined for estimates of the velocity of a moving person, obtained on the basis of the
radar data (a) and accelerometric data (b), for the movement along x-axis with the velocity values ranging from 0.7 m/s to
1.0 m/s. In all sub-figures: the thick solid line denotes the sequence of mean values, while the dotted lines – the sequences
of values that are three standard deviations away from the mean sequence.
132
Healthcare-Oriented Characterisation of Human Movements by Means of Impulse-Radar Sensors and by Means of Accelerometric Sensors
a) b)
Predefined velocity = 0.5 m/s
2
Predefined value
Mean value
1.5
Mean value +/- 3std
0.5
-0.5
4 5 6 7 8 9 10 11 12
Time [s]
0.5
-0.5
3 4 5 6 7 8 9 10
Time [s]
0.5
-0.5
3 4 5 6 7 8 9
Time [s]
0.5
-0.5
2 3 4 5 6 7 8
Time [s]
Figure 4: Uncertainty indicators determined for estimates of the velocity of a moving person, obtained on the basis of the
radar data (a) and accelerometric data (b), for the movement along y-axis with the velocity values ranging from 0.5 m/s to
0.8 m/s. In all sub-figures: the thick solid line denotes the sequence of mean values, while the dotted lines – the sequences
of values that are three standard deviations away from the mean sequence.
133
HEALTHINF 2017 - 10th International Conference on Health Informatics
a) b)
Predefined velocity = 0.9 m/s
2
Predefined value
Mean value
1.5
Mean value +/- 3std
0.5
-0.5
2 3 4 5 6 7
Time [s]
0.5
-0.5
2 3 4 5 6
Time [s]
Figure 5: Uncertainty indicators determined for estimates of the velocity of a moving person, obtained on the basis of the
radar data (a) and accelerometric data (b), for the movement along y-axis with the velocity values ranging from 0.9 m/s to
1.0 m/s. In all sub-figures: the thick solid line denotes the sequence of mean values, while the dotted lines – the sequences
of values that are three standard deviations away from the mean sequence.
In figure 6, the so-called box plots representing on the basis of the radar data, are far more accurate
the aggregated uncertainty of the estimation of the than those obtained on the basis of the
mean walking velocity, performed on the basis of accelerometric data. For the estimation of the
the radar data and accelerometric data, for each velocity based on the radar data the mean
investigated value of the walking velocity, are discrepancy, i.e. the difference between estimated
presented. Each box plot indicates: mean value and a predefined value of the velocity,
the median value; varies from –0.12 to 0.03 m/s, while it varies from
the interquartile range (IQR), i.e. range between –0.18 to 0.24 m/s for the estimation based on
the first and third quartile; accelerometric data. Moreover, it can be observed
the smallest value still within 1.5 IQR from the that the estimates obtained on the basis of the radar
first quartile, and the largest value still within 1.5 data are more concentrated around their mean values
IQR from the third quartile; – the root-mean-square discrepancy of the radar-
the values lying outside 1.5 IQR from the first data-based velocity estimates varies from 0.02 to
quartile and 1.5 IQR from the third quartile 0.12 m/s, while it varies from 0.08 to 0.27 m/s for
(marked with crosses). the accelerometric-data-based estimates.
In table 1 and table 2, the numerical results of all It can also be noticed that the estimates of the
experiments – performed for various walking mean walking velocity, obtained on the basis of the
velocities – are collected. radar data, tend to be underrated with respect to the
The results presented in tables 1 and 2 show that predefined walking velocity for the movements
the estimates of the mean walking velocity, obtained along the x-axis, and very accurate for the
134
Healthcare-Oriented Characterisation of Human Movements by Means of Impulse-Radar Sensors and by Means of Accelerometric Sensors
Figure 6: Box plots representing the uncertainty of the estimation of the walking velocity, based on the radar data (R-
estimates) and accelerometric data (A-estimates); a) x-axis movement, b) y-axis movement.
135
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Uncertainty of mean velocity estimation for the movement along x-axis.
Table 2: Uncertainty of mean velocity estimation for the movement along y-axis.
The experiments performed have demonstrated prevention and/or fall detection. The functions
that impulse-radar sensors enable one to estimate the related to fall prevention are implemented to
walking velocity more accurately than the overcome fall risk factors, implied by natural aging-
accelerometric sensors. The estimates obtained on related physical disabilities, and promptly indicate
the basis of data from the latter sensors are affected the increasing risk of falling; the functions related to
by larger bias and are more widely spread around fall detection are to reliably detect falls, when they
their mean values. occur, and minimise the potential injuries. Sensors
Since falls among elderly persons are the main used for fall prevention are expected to be accurate
cause of their admission and long-term stay in enough to enable the monitoring system to identify
hospitals (Abbate et al., 2010), the systems for changes in the monitored person’s health status on
monitoring of elderly and disabled persons are the basis of relatively slow and subtle changes in
expected to perform some functions related to fall his/her gait characteristics, e.g. changes of the mean
136
Healthcare-Oriented Characterisation of Human Movements by Means of Impulse-Radar Sensors and by Means of Accelerometric Sensors
walking velocity. Sensors used for fall detection and Assisted Living: Technologies and Applications.
should be selected and optimised with respect to Herts, UK: IET.
their sensitivity as to enable the monitoring system Baldewijns, G., Luca, S., Vanrumste, B. and
to detect short abrupt changes in person’s velocity or Croonenborghs, T., 2016b. Developing a system that
can automatically detect health changes using transfer
acceleration. times of older adults. BMC Medical Research
In light of the results presented in this paper, the Methodology, vol., pp. 16-23.
impulse-radar sensors seem to be promising means Bang, W.-C., Chang, W., Kang, K.-H., Choi, E.-S.,
for reliable fall prevention since they enable the Potanin, A. and Kim, D.-Y., 2003. Self-contained
through-the-wall monitoring of persons (as the Spatial Input Device for Wearable Computers. In
electromagnetic waves propagate through non-metal Proc. 7th IEEE International Symposium on Wearable
objects) and highly accurate estimation of their Computers (White Plains, NY, USA), pp. 26-34.
velocity; those sensors are, however, less Brodie, M. A., Lord, S. R., Coppens, M. J., Annegarn, J.
appropriate for fall detection because of the and Delbaere, K., 2015. Eight-Week Remote
Monitoring Using a Freely Worn Device Reveals
relatively low rate of data acquisition. On the other Unstable Gait Patterns in Older Fallers. IEEE
hand, the accelerometric sensors appear to be not Transactions on Biomedical Engineering, vol. 62, pp.
well-suited for the long-term monitoring of the 2588-2594.
person’s gait characteristics, but better satisfy the Bulling, A., Blanke, U. and Schiele, B., 2014. A tutorial
requirements related to fall detection, due to their on human activity recognition using body-worn
higher sensitivity, significantly higher rate of data inertial sensors. Computing Surveys, vol. 46, pp. 33:1-
acquisition, and suitability for outdoor use. 33.
One may thus conclude that both types of sensors Buracchio, T., Dodge, H. H., Howieson, D., Wasserman,
studied in this paper, viz. impulse-radar sensors and D. and Kaye, J., 2010. The trajectory of gait speed
preceding mild cognitive impairment. Archives of
accelerometric sensors, are in some way neurology, vol. 67, pp. 980-986.
complementary, and therefore the combined use of Cola, G., Vecchio, A. and Avvenuti, M., 2014. Improving
both of them may contribute to the increase in the the performance of fall detection systems through
reliability of the monitoring of elderly and disabled walk recognition. Journal of Ambient Intelligence and
persons. Humanized Computing, vol. 5, pp. 843-855.
Cuddihy, P. E., Yardibi, T., Legenzoff, Z. J., Liu, L.,
Phillips, C. E., Abbott, C., Galambos, C., Keller, J.,
Popescu, M. and Back, J., 2012. Radar walking speed
ACKNOWLEDGEMENTS measurements of seniors in their apartments:
Technology for fall prevention. In Proc. 34th Annual
This work has been initiated within the project International Conference of the IEEE Engineering in
PL12-0001 financially supported by EEA Grants – Medicine and Biology Society (San Diego, CA, USA),
Norway Grants (http://eeagrants.org/project-portal/ pp. 260-263.
project/PL12-0001), and finished within the Egerton, T., Thingstad, P. and Helbostad, J. L., 2014.
Comparison of programs for determining temporal-
statutory project supported by the Institute of
spatial gait variables from instrumented walkway data:
Radioelectronics and Multimedia Technology, PKmas versus GAITRite. BMC research notes, vol. 7,
Faculty of Electronics and Information Technology, pp. 1-7.
Warsaw University of Technology. Fritz, S. and Lusardi, M., 2009. White Paper: "Walking
Speed: the Sixth Vital Sign. Journal of Geriatric
Physical Therapy, vol. 32, pp. 2–5.
Hamm, J., Money, A. G., Atwal, A. and Paraskevopoulos,
REFERENCES I., 2016. Fall prevention intervention technologies: A
conceptual framework and survey of the state of the
Abbate, S., Avvenuti, M., Corsini, P., Light, J. and art. Journal of Biomedical Informatics, vol. 59, pp.
Vecchio, A. 2010. Monitoring of Human Movements 319–345.
for Fall Detection and Activities Recognition in Jian, Q., Yang, J., Yu, Y., Björkholm, P. and Mckelvey,
Elderly Care Using Wireless Sensor Network: a T., 2014. Detection of Breathing and Heartbeat by
Survey. In Merrett, G. V. & Yen Kheng Tan (eds.) Using a Simple UWB Radar System. In Proc. 8th
Wireless Sensor Networks: Application – Centric European Conference on Antennas and Propagation
Design. Intech. (The Hague, The Netherlands), pp. 3078-3081.
Baldewijns, G., Debard, G., Van Den Broeck, B., Mertens, Liu, L., Popescu, M., Ho, K. C., Skubic, M. and Rantz,
M., Karsmakers, P., Croonenborghs, T. and M., 2012. Doppler Radar Sensor Positioning in a Fall
Vanrumste, B. 2016a. Fall prevention and detection. In Detection System. 34th Annual International
Florez-Revuelta, F. & Chaaraoui, A. A. (eds.) Active
137
HEALTHINF 2017 - 10th International Conference on Health Informatics
138
Fear of Missing out, Social Media Engagement, Smartphone
Addiction and Distraction: Moderating Role of Self-Help Mobile
Apps-based Interventions in the Youth
Keywords: Basic Psychological Need Satisfaction, Fear of Missing out, Social Media Engagement, Smartphone
Addiction, Smartphone Distraction, Self-Help Intervention.
Abstract: Smartphones offer high mobility and internet connectivity at the same time which has led to a substantial
increase in the number of active social media users on the move, especially the ‘Millennials’. The excessive
use of smartphone has been linked with several issues including mental well-being. Recently, different
mobile applications have emerged to help users track their excessive use of smartphones and protect them
from potential risks to mental health. This paper uses self-determination theory to examine the moderating
role of such mobile applications (or self-help interventions) on inter-relationships between social media
engagement, smartphone addiction and smartphone distractions. Survey responses from 284 college
students reveal that mobile applications could prove to be quite effective self-help interventions that can
help the young people in self-regulating their smartphone use. These results have substantial implications
for designing effective mobile app-based interventions to save young people from potential risks to their
mental health, productivity, and safety in performing their daily tasks. Future research directions have also
been pointed out.
139
Swar, B. and Hameed, T.
Fear of Missing out, Social Media Engagement, Smartphone Addiction and Distraction: Moderating Role of Self-Help Mobile Apps-based Interventions in the Youth.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 139-146
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
applications come with features like tracking the Relatedness refers to the individual desire to feel
time spent on each of the mobile applications, connected and supported by others (Sørebø et al.,
turning off or restricting the (push-up) distracting 2009).
notifications from certain applications and also Przybylski et al. (2013) suggested that
restricting smartphone usage by locking or even individuals with low basic need satisfaction for
turning it off after a specified time period. Most of competence, autonomy and relatedness have higher
the applications also provide reports and charts on levels of Fear of Missing Out (FoMO). On this
the smartphone usage behavior. Using such pretext, the following hypothesis is proposed.
applications is referred to as self-help intervention H1: Basic psychological need satisfaction is
which helps the smartphone users control their positively associated with fear of missing out.
excessive smartphone use and therefore protects
them from its potential negative effects.
Research so far have identified and examined
2.2 Fear of Missing out (FoMO)
some negative effects of excessive social media and
FoMO phenomenon has been defined as a
smartphone use. However, there are no studies, to
“pervasive apprehension that others might be having
the best of our knowledge, that examine whether
rewarding experiences from which one is absent,
mobile applications-based self-help interventions
FoMO is characterized by the desire to stay
actually help in preventing excessive smartphone
continually connected with what others are doing”
use, smartphone addiction and smartphone
(Przybylski et al. 2013, p. 1841).
distractions. In this context, the objective of this
Research has explored the prevalence of FoMO
study is to (1) examine the moderating role of self-
and its relation to social media (JWT, 2012; Abel,
help mobile applications-based interventions in
Buff and Burr, 2016). Przybylski et al. (2013) is the
preventing excessive smartphone use, smartphone
first study that operationalizes the FoMO construct
addiction and smartphone distraction, and (2)
by collecting a diverse international sample of
examine the relationship of social media
participants. A recent study by Alt (2015) in
engagement on smartphone with smartphone
academic arena shows that there is a positive link
addiction and smartphone distraction. To investigate
between social media engagement and two
these research objectives, a research model has been
motivational factors: Extrinsic and amotivation for
proposed and tested using the data collected from a
learning are more likely to be mediated by FoMO.
large sample of university students from several
FoMO plays an important role in individuals
countries.
engaging in social media. Yin et al. (2015) indicate
that FoMO and enjoyment are positively related to
continuance intention of using social media.
2 THEORETICAL According to Przybylski et al., (2013) individual
BACKGROUND AND with high levels of FoMO relate to higher levels of
HYPOTHESIS DEVELOPMENT social media engagement.
The use of social media has been associated with
greater levels of emotional support from close
2.1 Basic Psychological Need friends (Putnam 2000 as cited in Alt 2015). People
Satisfaction with low basic need satisfaction generally perceive
social media as a platform to connect with others in
Self-determination theory (SDT), a macro-theory of order to develop social competence, and an
human motivation, development, and wellness (Deci opportunity to deepen social ties (Przybylski et al.,
and Ryan, 2008) helps to explain the basic 2013). This context leads to the proposal of the
psychological need satisfaction of human beings. following hypothesis.
According to SDT, effective self-regulation and
psychological health of human beings are based on H2: Fear of missing out is positively associated
satisfaction of their basic psychological needs for with social media engagement.
competence, autonomy and relatedness (Przybylski
et al., 2013). Competence refers to the individuals 2.3 Social Media Engagement
desire to feel effective in their interactions with the
environment (Roca and Gagné, 2008). Autonomy Social media refers to the websites and online tools
refers to the individual desire to self-initiate and that facilitate interactions between users by
self-regulate own behavior (Sørebø et al., 2009). providing them opportunities to share information,
140
Fear of Missing out, Social Media Engagement, Smartphone Addiction and Distraction: Moderating Role of Self-Help Mobile Apps-based
Interventions in the Youth
opinions, and interests (Khan, Swar and Lee, 2014). smartphone users by distracting them from their
Social media engagement simply refers to the extent primary tasks. Duncan, Hoekstra and Wilcox (2012)
of an individual immersing into social media have found a significant negative correlation
activities. People basically engage into social media between in-class phone use and final grades of the
by sharing personal or social information with close students. Similarly, Hawi and Samaha (2016) have
actors in social networks, such as family and friends reported that students who were at a high risk of
(Alt, 2015). smartphone addiction were less likely to achieve
Jeong et al. (2016) suggested that people who cumulative GPAs suitable for distinction or higher.
use smartphones for social media, games, and According to Gill, Kamath and Gill, (2012)
entertainment were more likely to be addicted to smartphones are known to be detrimental to
smartphones. The use of social networking mobile cognitive performance and the use of smartphones
applications is a significant predictor of mobile increases reaction time, reduces focus (attention),
addiction (Salehan and Negahban, 2013). These and lower performance of task needing mental
days, it has been much easier for individuals to concentration and decision making. Based on the
engage in social media activities due to ubiquitous observation the following hypothesis is proposed.
accessibility to the Internet through smartphones. H5: Smartphone addiction is positively
This phenomenon leads to the formulation of the
associated with smartphone distraction.
following hypothesis.
H3: Social media engagement is positively 2.5 Self-help Intervention
associated with smartphone addiction.
Social media engagement is also believed to play Installation and use of mobile applications that could
an important role in smartphone distraction. A user help the users in regulating their excessive
preoccupied with social media activities tends to be smartphone use and therefore help in preventing
distracted from other primary tasks. This smartphone addictions and smartphone distractions
phenomenon of distraction can be explained with the is referred to as self-help intervention in this study.
concept of multitasking. Research in cognitive There are a variety of such mobile applications
science shows that individuals performance available these days.
decreases while multitasking (Junco, 2012). The mobile applications come with a variety of
Studies in an academic setting have also shown features such as blocking the websites one would
the negative relationship between the use of social want to avoid and periodic, customize setting on
media and academic performance. For example, social media sites to give time-fixed updates
according to Rosen, Mark Carrier and Cheever, (Andreassen, 2015), tracking the time spent on
(2013) those who use Facebook and text applications specific mobile applications, turning off or
while studying had lower GPAs compared with the restricting the distracting (push-up) notifications
students who did not. This is clear evidence that from certain applications, and limiting the overall
excessive engagement in social media is associated smartphone usage time by locking or even turning
with smartphone distraction and it leads to the off the smartphone device.
proposal of the following hypothesis. Generally, self-motivated people use such mobile
applications and with a belief in their ability and
H4: Social media engagement is positively
intention to prevent excessive smartphone use. This
associated with smartphone distraction.
argument leads to the formulation of the following
hypothesis.
2.4 Smartphone Addiction
H6: Self-help intervention has a moderating
Smartphone addiction can be defined as the effect on the relationship between social media
excessive use of smartphones in a way that is engagement, smartphone addiction and smartphone
difficult to control and its influence extends to other distraction.
areas of life in a negative way (Park and Lee, 2012).
Smartphones are a significant source of
distraction for decision-based activities such as 3 RESEARCH MODEL
driving, classroom learning, and work-related tasks
(Gill, Kamath and Gill, 2012). In academic settings, To examine the relationship between the use of
studies have linked the excessive smartphone use social media through smartphone and its impact on
with the poor academic performance of the smartphone addiction and distraction, and to
141
HEALTHINF 2017 - 10th International Conference on Health Informatics
142
Fear of Missing out, Social Media Engagement, Smartphone Addiction and Distraction: Moderating Role of Self-Help Mobile Apps-based
Interventions in the Youth
143
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 6: Results of multi-group analysis with path The summary of the result is shown in Table 7.
coefficients. Empirical analysis of the research model provides
Paths Path P Value several key findings, which are discussed below.
coefficients The findings clearly show that self-help mobile
differences applications can actually help in regulating social
Basic Psychological Needs - media engagement, smartphone addictions and
0.119 0.873**
Fear of Missing Out (ȕ1) distractions. This finding is very crucial as
Fear of Missing Out - Social smartphone addictions and distractions have become
0.050 0.726**
Media Engagement (ȕ2) somewhat a new illness in today’s society. People
Social Media Engagement - needing help for their smartphone usage behavior
0.119 0.873**
Smartphone Addictions (ȕ3)
can use self-help mobile applications to protect
Social Media Engagement -
themselves from the negative effects of the
Smartphone Distractions 0.047 0.346**
(ȕ4) smartphones. In academic settings, educators can
Smartphone Addictions - recommend students needing help to use such self-
Smartphone Distractions 0.104 0.178* help mobile applications.
(ȕ5) This study also shows that people with low
Note: *p<0.05, **p<0.01 psychological needs have a high fear of missing out
which leads to higher levels of social media
engagement. The high levels of social media
engagement then lead to smartphone addictions and
6 DISCUSSION AND smartphone distractions. The findings are in line
CONCLUSION with the emerging recent research (e.g., Przybylski
et al., 2013; Alt, 2015). The findings contribute to
The primary objective of this study was to examine the existing literature by illustrating the mediating
the moderating role of self-help mobile applications role of social media engagement in explaining
in regulating social media engagement, smartphone smartphone addiction and smartphone distractions.
addictions and distractions. Additionally, it would Nevertheless, there are some limitations of this
examine the relationship between social media study and the others that can provide opportunities
engagement on smartphone and smartphone for future research direction. This study does not
addictions or smartphone distractions. To achieve take into considerations the types of (and underlying
the objective, this study established a path model techniques) of mobile applications used as self-help
and tested six hypotheses. interventions. These days such mobile applications
come with a variety of features and capabilities that
Table 7: Summary of results. may have several different types of impact. Future
Paths Hypotheses Results research may take into consideration the types of
Basic Psychological self-help mobile apps-based interventions and their
Needs - Fear of H1 Supported impact on smartphone use.
Missing Out This study only deals with the smartphone users
Fear of Missing Out - that are already using self-help mobile applications.
Social Media H2 Supported It can be assumed that this group of users are self-
Engagement motivated and are already less likely to get affected
Social Media by the negative effects of the smartphones. Future
Engagement - research could ask smartphone users to install such
H3 Supported
Smartphone
self-help mobile applications and then examine the
Addictions
Social Media
same effect after some period of time in a regulated
Engagement - environment.
H4 Supported This study has used the data from university
Smartphone
Distractions students with the majority of respondents ranging
Smartphone from 17 to 27 years old. This group of people are
Addictions -
H5 Supported
among the heaviest users of social media and
Smartphone smartphones. Therefore, caution is needed while
Distractions generalizing the results of this study. Different age
Moderating role of groups can show different results. Future research is
self-help mobile H6 Supported
also recommended for other age group and settings.
applications
144
Fear of Missing out, Social Media Engagement, Smartphone Addiction and Distraction: Moderating Role of Self-Help Mobile Apps-based
Interventions in the Youth
145
HEALTHINF 2017 - 10th International Conference on Health Informatics
146
A Classification of Healthcare Social Network Analysis Applications
Keywords: Network Dynamics, Structural Analysis, Social Network Analysis, Healthcare Organization, E-health,
Healthcare SNA Applications.
Abstract: As the web, social networks and the internet of things permeated our daily life; a new perspective for
understanding the complexity of our interconnectedness has become necessary. One approach that has
predominantly proven useful in discovering hidden relationships, connections and trends of complex
systems through mathematical and graphical techniques is Social Network Analysis (SNA). This approach
has become increasingly appeling for Healthcare in particular as many of this domain’s problems examine
systems with dynamic actors that interact with each other and exhibit emergent complex behaviors.
However, due to their multiplicity, the application of SNA methodologies proves to be a complex and
confusing endeavor. In an attempt to support the effort of applying SNA methodologies on Healthcare
research problems, this paper offers firstly a categorization of SNA methodologies (structural and dynamic
analysis), then inventories Healthcare SNA applications and classifies them into organizational and e-health
related problems. The resulting categorization helps identify the Healthcare research problems most
auspicious for SNA methodologies and should thus provide a guiding material of adequate SNA
methodologies for a given Healthcare research problem.
147
Benhiba, L., Loutfi, A. and Idrissi, M.
A Classification of Healthcare Social Network Analysis Applications.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 147-158
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
healthcare domains. The last section will conclude personal networks. The macro or Socio-centric view,
the paper with providing hints on future work. on the other hand, provides a bird's eye perspective
of the network and helps examine the structural
patterns of the interactions among nodes with the
2 SOCIAL NETWORK ANALYSIS aim to explain and potentially generalize an
outcome. Studying the structure of a network relies
METHODOLOGIES on a number of measures. Because of their ability to
give an indication on the topology of the network
SNA is an interdisciplinary descriptive, empirical (random, small world or scale free), the most studied
discipline that studies networks as a mathematical concepts in contemporary network research are:
representation of complex systems by expressing degree distribution, clustering and Assortativity.
them in terms of relationships among actors. SNA The degree of a node is the number of links it
has four features: 1) It is motivated by a structural has in the network and thus reflects the size of a
intuition based on ties linking social actors, 2) It is node's neighborhood. The average degree has been
grounded in systematic empirical data, 3) It draws used to gauge the cohesion (Kratzer, 2005) or
heavily on graphic imagery, and 4) It relies on the connectedness on the network level (Shrader, 1989).
use of mathematical and/or computational models The degree distribution is often plotted, using
(Freeman, 2004). The body of research has used histograms, to obtain insight into the overall
SNA methodologies in various domains to help structure of the network and detect potential heavy-
validate theories made about the structure or the tailed distributions.
behavior of a social construct or complex system. The clustering coefficient represents the
These methodologies can be categorized in several tendency of nodes to form tightly knit groups within
ways. No matter how limited and flawed the effort, the network. It is measured on the node level and on
doing so is useful because it guides the first steps the network level (Watts, 1998). The local
when attempting to answer a specific research Clustering coefficient of a node is used to quantify
question. the level of transitivity within the network, i.e. the
We propose a categorization based on the chance that a node u is connected to w, when u is
purpose of the SNA analysis. A review of seminal connected to v and v is connected to w (uvw form a
works on SNA {(Wasserman, 1994), (Albert, 2002), triangle). The Network Clustering coefficient on the
(Barabási, 2002), (Newman, 2003), (Watts, 2004), other hand is defined as the average of the local
(Christakis, 2011), (Scott, 2012), (Blonder, 2012), clustering coefficients of all the nodes.
(Barabási, 2016)} has rendered two distinct purposes Assortativity detects the level of homophily in a
of network analysis: network and measures the similarity of connections
ƒ Structural Analysis: describes in discrete time in the graph with respect to the node degree
snapshots the topology of the network, the roles (McPherson, 2001). Assortativity can hint to the
of particular nodes, communities and subgroups existence of a core-periphery structure where a set of
within the network etc. closely knit nodes constitute the core of a network
ƒ Dynamics Analysis: studies the changes of the and low degree nodes are left on the periphery.
network’s topology through time (its evolution Along these core concepts, many studies have
and growth, the removal and adding of nodes and focused on community detection where algorithms
edges, the change in link weight etc.) and are applied to uncover locally dense connected
examines the diffusion of processes within the subgraphs (barabasi, 2016). Community detection
network. allows a deeper understanding of the network’s
structure and hidden connectivity patterns.
2.1 Structural Analysis
2.2 Dynamics Analysis
Structural analysis aims to examine the topology of
the network in order to uncover the overall The study of network dynamics refers to two distinct
properties of the network and its constituents’ phenomena. We borrow the classification given by
characteristics. It offers two perspectives: a micro- (Blonder, 2012) in which they distinguish the
view and a macro-view. The micro or Ego-centric dynamics of the network from the dynamics on the
view focuses on a select actor (ego) and examines its network. The first examines the growth of the
neighbors (nodes that are connected to it), their network, the factors behind the creation or
neighbors and so forth. It studies the features of dissolution of new nodes and edges and the
148
A Classification of Healthcare Social Network Analysis Applications
evolution of link strength through time. The second susceptible-infected-susceptible (SIS) and
studies propagation phenomena and the transfer, susceptible-infected-recovered (SIR). The
throughout the network, of cascades such as models consider cascades to spread from
information, trust, opinion, behavior, money, goods adopters (infected) to susceptible nodes and
or pathogens etc. consider the possibility of retracting the cascade
for recovered nodes.
2.2.1 Dynamics of the Network ƒ Social Influence Models: These models assume
that the social influence between nodes affects
The study of the dynamics of networks stems from the diffusion of cascades (opinions or behaviors
the need to understand the rules of networks’ growth for instance). The most widely studied and used
in order to predict their evolution. Networks evolve social influence models are the Linear Threshold
by adding or removing nodes or links over time. (LT) (Granovetter, 1978) and the Independent
Research on the evolution of networks focuses on Cascade (IC) (Goldenberg, 2001).
the various dynamical processes that affect the ƒ Social Learning Models: In contrast with
change of the network’s structure. The most popular previous models which ignore the actions and
evolving networks’ models are Barabàsi and decision making of actors, the nodes in social
Albert’s Preferential attachment (Barabàsi, 1999) learning models are considered rational agents
and (McPherson, 2001)’s homophily model. who observe outcomes of prior behaviors and
ƒ In the preferential attachment model, nodes decide accordingly. The decision of a user to
present a bias to connect to popular nodes that forward information is modeled using game
have a large number of connections. These hubs theory concepts where the user maximizes some
gain more connectivity as the network grows, utility for himself (Jackson, 2008).
following a rich-gets-richer model (Bollobás, Studying the spread of cascades within a network
2003). offers theoretical and empirical tools to not only
ƒ Homophily represents the likeliness of nodes to quantify the propagation process, but to forecast it as
connect to nodes that resemble them and which well.
are generally the neighbors in the network.
Nodes' connections are thus based on a conscious
action with embedded bias (It's more likely for
example to connect to a friend of a friend or an
3 A CATEGORIZATION OF
individual with common interests than it is to a HEALTHCARE SNA
random person). APPLICATIONS
While the main goal of these models is to predict the
probability of link formation, enabling thus Link Healthcare’s purpose is to ensure the well-being of
recommendations, nodes and links dissolution is people by taking both proactive and active actions.
another aspect of network evolution that is Healthcare organizations take preventive actions like
increasingly drawing interest. The goal here is to sharing information about healthy life styles, the
predict links that are more likely to be dropped from vaccines in the market etc., providing psychological
the network and to understand how it would affect council, or conducting research for improving health
the structure of the network. services and the health life of people. They also take
reactive actions by administrating drugs, doing
2.2.2 Dynamics on the Network surgery helping people with chronic illness etc.
Healthcare research covers a lot of areas such as
In an attempt to understand the dynamic effect of clinical, biomedical, health systems and services and
network properties on diffusion, various studies social, cultural, environmental and population health
relied on mathematical models originally used in research. Healthcare research is undertaken to
fields such as epidemiology, sociology and establish the foundation for developing effective
economics. Louni et al. (Louni, 2014) classified the therapeutic interventions to expose to individuals
most popular information diffusion models into and communities, to support enhancing and
three categories: understanding illness and health and safeguard and
ƒ Contagion Models: these models build on the enhance the health of persons and populations
idea that a cascade flows in a network in the (Steinwachs, 2008). Due to the complexity of the
same way a contagious disease spreads through a healthcare system, a methodological approach is
population. The most widely used models for needed to analyze, monitor and ensure the
studying contagion are usceptible-infected (SI),
149
HEALTHINF 2017 - 10th International Conference on Health Informatics
effectiveness of its endeavors. SNA is thus complications occur), Efficient (make healthcare
introduced as a powerful new way to discover services available with minimum costs and without
valuable hidden connections, relationships, trends waste), Equitable (people should have the same
and insights. access to healthcare services).
To achieve these purposes, healthcare
3.1 Methods and Materials organizations need to collaborate to share
information about their operational and research
The purpose of this work is to establish a matching works, establish policies for more effective and safe
between SNA methodologies, described in section treatments and manage their waste by detecting
II, and healthcare application domains in order to fraud of healthcare providers.
uncover trends of SNA applications in the healthcare
field. To accomplish this, we classified SNA i. Health policy
applications in healthcare according to their The World Health Organization (WHO) defined
functional domain and finally assigned SNA health policy as “the decisions, plans, and actions
methodologies to each healthcare domain. that are undertaken to achieve specific health care
To identify the SNA applications in healthcare, goals within a society”. The specification of rules
we scanned three databases (Scopus, Science Direct that healthcare stakeholders should follow in terms
and IEEExplore Digital Library) for the last 10 of defining characters for differing groups, making a
years, using various research terms related to: (social reference for treatments and actions undertaken by
network analysis OR graph analytics) AND healthcare practitioners and sharing this information
(healthcare, e-health, health organization, behavioral with people, are the various things attained by a
OR epidemiology) in Title, keywords and abstract. health policy institution.
The search was restricted to English scientific The study proposed by (Millard, 2015) adresses
literatures that are in peer-reviewed venues and WHO's Essential Medicine List (EML). EML is a
duplicated works were eliminated. A paper is list of medicines that assists countries on selecting
selected when the algorithm and methodology of the treatments of each priority requirement. In this
social network analysis in e-health or healthcare article, SNA is used to inspect the social, political
organizations. In this paper, the 16 works listed in and economic areas for adding the encouragement
Table 1 will be considered. During the data for Misoprostol’s use for preventing and treating a
extraction process, we included information about postpartum hemorrhage, especially in low income
the title of the article, the year of publication, the countries, according to the WHO's EML in 2011. A
authors, the country, the application of healthcare study the chronology of WHO misoprostol
research, the data sources, the applied methodology applications and evolution of related social networks
and the type of the modeled graphs. are applied to evaluate the relation of health policy
and this social area.
3.2 Categories of Healthcare SNA In (Takahashi, 2016), a descriptive analysis of
Applications duplicative prescription practices is performed.
When patients take orders for the same state from
There are many areas of healthcare that can apply two or more sources, we talk about duplicative
SNA. In this paper, we focus on the areas that drew prescription practices. This practice is the origin of
the most attention: healthcare organization and e- medical waste. Some patients resell drugs for extra
health. cash and can also cause adverse effects. The
descriptive analysis was conducted by using the
3.2.1 Healthcare Organization measurement of SNA and describing the prevalence
(the rate of persons with an illness or characteristic)
A report of the Institute of Medicine suggested six of duplicative prescription through ages. The study
aspects for improvement of the healthcare system. It also calculated the density of the medical facilities
needs to be: Safe (healthcare services to patients and patients network for each class of drugs defined
should be secure and not cause any injuries), by their prevalence.
Effective (care services based on scientific evidence In (Bramhachari, 2016), the authors conducted a
for increasing healthy outcomes), Patient-centered qualitative ego-network analysis to understand
(present to the patient the care service that respect dominance of Rural Medical Practitioners (RMPs) in
their needs, values and preferences), Timely West Bengal, India. They inspected the genesis of
(provide care assistance early on before any RPMs’ social links with various actors in the health
150
A Classification of Healthcare Social Network Analysis Applications
system and showed the operators donating their specific characteristics: Gaza Strip (Caniato, 2015).
subsistence over the years, by using SNA. By They employ an SNA and stakeholder analysis to
identifying the ties in RMPs’ network that are explore and comprehend the effects of a range of
formal healthcare providers, the healthcare market logistical and socio-economic factors on the
and the community, we can comprehend the effectiveness of stakeholder networks in the region.
dynamics of the healthcare market. Caniato et al. applied a structural analysis of
Guo et al. use healthcare claims data of the interaction frequency and information exchanged
Medical Insurance Association of Anhui Province to among stakeholders that are public authorities,
look into details of referrals social network. They health providers, supporting actors and others.
design a referral social network where the nodes are The study performed by (Schoen, 2014) used
hospitals and ties are patient-transferred between SNA to confirm the suggestion that when we take
hospitals. The authors conduct a structural analysis funding to concentrate on multi-sector collaboration
to measure the degree and centrality to describe the in Social Innovation for Missouri (SIM) program, a
relationship between this variable and other patients public health program interventions to prevent
and hospital variables. Finally, they explore rules obesity and stop tobacco, develop various
between the variables of the referral social network partnership structures than other grantees. The
and variables of quality of the healthcare to help authors explore different variables as the level of
healthcare providers minimize cost and length of collaboration and frequency of contact by applying
stay in the hospital and increase the efficiency of SNA. They measure the network descriptors such as
medical resources (Guo, 2015). average degree, density, betweeness centralization
and degree centralization to evaluate the network of
ii. Healthcare organizational collaboration contacts and the collaboration of different
Healthcare organizations need to collaborate with stakeholders.
each other in order to improve the quality of care to Dianas et al. studied an excellence program in
the patients, in term of efficient research, cost low and middle-income countries provided by the
decrease, good management of resources etc. National Heart, Lung, and Blood Institute-
UnitedHealth to fund 11 centers of excellence
- Intra-organizational Collaboration (actors) (Dianis, 2016). In order to prove the effect of
Soulakis et al. made use of patients’ Electronic collaboration with a federal support, they used SNA.
Health Records (EHR) with heart failure to explore They created a network of the program’s
the collaboration between healthcare providers and stakeholders by considering links as collaborations
patients in The Northwestern Memorial Hospital on administrative support and research projects.
(NMH). The access to EHR provides a large amount They later compared the resulting network before
of data about interactions between providers and the development of the Centers of Excellence
patients (Soulakis, 2015). A structural SNA Program and after.
methodology is used to describe the collaboration Kawonga et al. presented a case study of HIV
between patients and providers through a bipartite monitoring and evaluation to examine and
network (the source node was a provider, the target understand the way that Disease Control
node was a patient and the edge represented the Program(DCP) and General Health Services(GHS)
patient record accessed by this provider), and a managers communicate when they make a health
provider collaboration network which is a network reform to make an administrative integration in
of the common access of patient records by South Africa (Kawonga, 2015). For this purpose,
providers (the node represent providers and the they described the entire network by using density,
edges are established when two providers have degree and betweenness centrality. They also used
access to more than 10 common patient records). density and a measure of homophily to analyze sub-
Data is extracted from the Enterprise Data groups networks. A block-model analysis was used
Warehouse (EDW) of NMH. The network is to identify the connections between management
afterwards visualized and clique formation is committees and manager groups.
analyzed. A graph database is used to process The paper presented by Khosla et al. introduced
queries and answer questions about care and a study of collaboration between HIV agencies in
provider-patient collaboration. Baltimore (Khosla, 2016). SNA and relation
- Inter-organizational Collaboration (institutions) coordination were used to analyze the quality of
Caniato et al. conducted a case study on coordination between HIV agencies when they
management of healthcare waste in a region with accessed resources like information, around seven
151
HEALTHINF 2017 - 10th International Conference on Health Informatics
152
A Classification of Healthcare Social Network Analysis Applications
esteem and depressive symptoms of early searching information behavior by older migrants
adolescences. Due the focus on health behaviors, with Culturally And Linguistically Diversity
health status and changes in network structure; the (CALD) (Goodall, 2014). They determined factors
authors measure the characteristics of social that leverage the use of ICT to locate information.
environment, health behavior, social interaction These factors can be education, migration, socio-
network and mental health to analyze them using economic status, ethnicity and English proficiency
bivariate associations. They use a stochastic actor- of older migrants. The study undertook by Goodall
based modeling (SABM) framework to join the et al. focused on the search of cancer-related
dynamic co-evolution of social ties and self-esteem information by the group. The authors used SNA
or depressive symptoms (Pachucki, 2015). and a constructivist grounded theory method to
Goodall et al. explored the importance of ICT for analyze the data captured in the interviews, and then
they studied the preferences and uses of traditional
information sources compared to modern ones (PC,
Internet and mobiles).
Reference of
Healthcare Methodological Dataset/Size of
paper and the The SNA application Algorithms/Metrics
categorization categorization the network
country
They establish a
chronology of WHO Chronological approach
misoprostol applications combined with SNA
and they examine the Healthcare 238 (evolution of social
(Millard, Dynamics of the
evolution of related organization: organizations network) : density,
2015), UK network
social networks and the Health policy and individuals geodesic distance,
nested subset network of diameter, centrality,
the WHO EML nesting, clique formation
misoprostol applications
Community detection:
spinglass, edge
betweenneess, label
propagation, optimal,
They analyze the 72 hospitals and walktrap.
healthcare claims data of 8856 patients in Simple linear regression:
Healthcare
(Guo, 2015), the Medical Insurance the claim data Los, Medical cost,
organization: Structural
China Association of Anhui from Medical Degree, closeness
Health policy
Province to design a Insurance centrality, betweenness
referral social network. Bureau centrality, eigenvector
centrality, rank of
Hospital.
Rules exploration:
Decision tree.
153
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: A methodological classification of each healthcare application represented in this paper (cont.).
51 managers in
They apply structural two provinces
SNA: density, degree,
and dynamic Healthcare during 2010-
(Kawonga, betweenness centrality
methodologies on the collaboration Dynamics of the 2011
2015), South and E-Index (measure of
communication network inter- network Dataset: HIV
Africa homophily)
of GHS and DCP organization data collation
Block modelling
managers and HIV data
use
154
A Classification of Healthcare Social Network Analysis Applications
Table 1: A methodological classification of each healthcare application represented in this paper (cont.).
(Bian, 2013), They apply structural Healthcare Dynamics of the The SNA: measures of
Arkansas, and dynamic research network Automated centrality, mean path
United States methodologies on the collaboration Research length, clustering
network to identify Information coefficient, characteristic
leaders and influencers Administrator path length, diversity
in a research (ARIA) and the Temporal evolution:
collaboration network Translational average number of new
Research edges, centrality leaders
Institute (TRI)
(Wu, 2015), They use the measure of Healthcare Structural 36557 papers SNA: centrality, K-plex
China centrality to conduct an research about psychiatry analysis, Core periphery
SNA on authors, collaboration from Science Hierarchical clustering
institutions and Ciation Index
countries collaborating Expanded (SCI-
on psychiatric research Expanded) in
web of
science
(Goodall, They use Grounded E-health: Structural Interview with Constructivist grounded
2014), theory and a Information 54 participants theory method (CGTM)
Australia qualitative SNA on the technology aged 63–94 SNA: egocentric network
egocentric network of access years
individuals and their
sources of information,
and compare the
resulting networks
(Pachucki, They measure the E-health: Dynamics on the 40 students of Measures of Social
2015) USA association between Behavioral network sixth-graders at environment, Health
social interactions and analysis a private K-8 behaviors ( physical
depressive symptoms school activity and food choice),
and self-esteem of early Social interaction
adolescences at a private networks, dependent
K-8 School in the State variables ( self-esteem
of California and depressive symptoms)
to make bivariate
associations and SNA (
size of personal networks,
transitivity and closeness
centrality)
155
HEALTHINF 2017 - 10th International Conference on Health Informatics
included research works studied healthcare and design. Anonymization, consent and privacy are
collaboration and focused on collaboration between among the issues that need further attention.
institutions. This might be due to the accessibility of
inter-collaboration data compared to intra- Number
collaboration data (insurance claims vs. EHRs). E- 8 of papers
health is a new area of SNA application and can thus
present new opportunities to researchers, although 7
6 Structural
the lack of data especially in low-income countries Dynamic
may be problematic. 5
Structural SNA methodologies are the most used, 4
whereas dynamic methodologies are mainly used in 3
problems related to healthcare organization (cf.
Table 2). The prevalence of structural analyses could 2
be due to the complexity of dynamic methodologies 1
compared to structural ones. Associations between 0
Health policy
collaboration
Information
technology
Behavior
SNA structural metrics and domain-specific metrics
Healthcare
analysis
are however rarely examined; which constitutes a
research question that deserves further attention.
There is also a pressing need to move beyond the
static view of the network, visualized in snapshots,
to a visualization that captures more accurately the
Figure 1: Number of papers of each healthcare application
dynamic processes that reshape the network (a and methodological classification (Dynamic, Structural).
movie-like visualization for instance). Another
research opportunity relates to the application of Table 2: The SNA methodology used in each healthcare
dynamics on the network methodologies such as domain.
propagation and diffusion models. While these
methodologies have been exclusively used in Healthcare Functional Methodological
behavioral analysis, they have the potential to categorization Sub-categorizing categorization
examine the propagation of information in social
networks and uncover hidden processes shaping Dynamics of the
Health policy
network, Structural
collaboration or policy making endeavors.
With respect to data collection, a third of the Healthcare
included studies gathers data from questionnaires. collaboration Structural
This raises data completion issues and inaccuracies intra-organization
arising from informant bias and stresses the Healthcare
organization Healthcare
pertinence of alternative data collection methods collaboration
Structural, Dynamics
relying on RFID technologies, accelerometers or of the network
inter-organization
EHRs etc. Online social networks (OSN) such as
Facebook, Twitter etc. are widely used nowadays Healthcare
Dynamics of the
and can help perform social behavioral analyses. We research
network, Structural
can comprehend e-health tools and design future IPC collaboration
to promote effective interaction behaviors in OSNs Information
by correlating interaction behaviors and a specific Structural
technology access
disease (Chomutare, 2014). However, many
E-heath Social influence
challenges could face such studies. When SNA Structural, Dynamics
methodologies are used on OSNs’ social data, it is and behavior
on the network
difficult to distinguish between the effects of analysis
Homophily and those of peer influence. Questions
relating to the sufficiency of collected data and its Furthermore, social media provides a large
representativeness of a given behavior to infer amount of data. The resulting networks are thus very
conclusions remain unanswered. There are also the large and new tools are needed to process them. Big
pressing issues of privacy and ethics regarding data data network analysis is increasingly drawing the
collection and which are consequences of the attention of researchers. However, due to the
inherent processes of the social graph's construction complexity of healthcare research problems, further
156
A Classification of Healthcare Social Network Analysis Applications
research is needed in order to produce domain- Rubinov, M., & Sporns, O., 2010. Complex network
specific tools. measures of brain connectivity: uses and
interpretations. Neuroimage, 52(3), 1059-1069.
Chen, Y. D., Tseng, C., King, C. C., Wu, T. S. J., & Chen,
H., 2007. Incorporating geographical contacts into
5 CONCLUSIONS social network analysis for contact tracing in
epidemiology: A study on Taiwan SARS data. In
The purpose of this paper was to propose a Intelligence and Security Informatics: Biosurveillance
classification of healthcare SNA applications based (pp. 23-36). Springer Berlin Heidelberg.
Abraham, A., Hassanien, A. E., & Snâaésel, V. (Eds.).,
on a review of papers that used structural and
2010. Computational social network analysis: trends,
dynamic SNA methodologies to answer healthcare- tools and research advances. Springer.
related research problems. We classified these Freeman, L. C., 2004. The development of social network
research works into two categories: One concerning analysis. Vancouver: Empirical Press.
healthcare organizations and pertaining to policy Wasserman, S., 1994. Social network analysis: Methods
making, communication, and collaboration and a and applications (Vol. 8). Cambridge university press.
patient-oriented category which concerns patients’ Albert, Réka, and Albert-László Barabási, 2002.
behaviors, social influence and healthcare "Statistical mechanics of complex networks." Reviews
information access. of modern physics 74.1 : 47.
A.-L. Barabási. Linked: The New Science of Networks.
The proposed classification of healthcare SNA
Perseus Books Group, 2002.
applications is preliminary and requires further Newman, Mark EJ, 2003. "The structure and function of
enrichment through the inclusion of other research complex networks." SIAM review 45.2 : 167-256.
works. The level of adequacy of a chosen SNA D. Watts. Six Degrees: The Science of a Connected Age.
methodology to a given Healthcare research problem Norton, 2004.
is yet to be examined. Experimental studies will N. Christakis and J. Fowler. Connected: The Surprising
have to be conducted to establish comparative Power of Our Social Networks and How They Shape
analyses between variations of a given methodology Our Lives. Back Bay Books, 2011. (Scott, 2012).
for a particular problem. For instance, different Scott, John. Social network analysis. Sage, 2012.
Blonder B, Wey T, Dornhaus A, James R, Sih A. 2012. Te
subsets of metrics can be used and compared for
mporal dynamics and network analysis. Meth Ecol
structural SNA methodologies, various propagation Evol. doi: 10.1111/j.2041-210X.2012.00236.x.
models can be simultaneously tried for dynamic Barabási, Albert-László. "Network science" Cambridge
SNA methodologies. University Press, Cambridge (August 5, 2016).
Kratzer, J., Leenders, R. T. A., & Van Engelen, J. M.,
2005. Informal contacts and performance in
innovation teams. International Journal of Manpower,
REFERENCES 26(6), 513-528.
Shrader, C. B., Dellva, W. L., & McElroy, J. C., 1989.
Bullmore, E., & Sporns, O., 2009. Complex brain Social networks and group performance – A partial
networks: graph theoretical analysis of structural and test of the Pearce and David hypotheses. International
functional systems. Nature Reviews Journal of Small Group Research, 5(2), 145-162.
Neuroscience,10(3), 186-198. Watts, Duncan J.; Strogatz, Steven H., June 1998.
Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., & "Collective dynamics of 'small-world' networks".
Christakis, N., 2008. Tastes, ties, and time: A new Nature 393 (6684): 440–442.
social network dataset using Facebook. com.Social McPherson, M., Smith-Lovin, L., & Cook, J. M., 2001.
networks, 30(4), 330-342. Birds of a feather: Homophily in social networks.
Krempel, L., & Plümper, T., 2003. Exploring the Annual review of sociology, 415-444.
dynamics of international trade by combining the Barabási, A. L., & Albert, R., 1999. Emergence of scaling
comparative advantages of multivariate statistics and in random networks.science, 286(5439), 509-512.
network visualizations. Journal of social structure, Bollobás, B., & Riordan, O., 2003. Mathematical results
4(1), 1-22. on scale-free random graphs. Handbook of graphs and
Klofstad, C. A., Sokhey, A. E., & McClurg, S. D., 2013. networks, 1, 34.
Disagreeing about disagreement: How conflict in Louni, Alireza, and K. P. Subbalakshmi, 2014. "Diffusion
social networks affects political behavior.American of information in social networks." Social Networking.
Journal of Political Science, 57(1), 120-134. Springer International Publishing. 1-22.
Paulo, D., Fischl, B., Markow, T., Martin, M., & Bollobás, B., & Riordan, O., 2003. Mathematical results
Shakarian, P., 2013. Social network intelligence on scale-free random graphs. Handbook of graphs and
analysis to combat street gang violence. arXiv preprint networks, 1, 34.
arXiv:1306.6834.
157
HEALTHINF 2017 - 10th International Conference on Health Informatics
Louni, Alireza, and K. P. Subbalakshmi, 2014. "Diffusion Wang, F., U. Srinivasan, S. Uddin, and S. Chawla. 2014.
of information in social networks." Social Networking. "Application of network analysis on healthcare." In
Springer International Publishing. 1-22. Advances in Social Networks Analysis and Mining
Granovetter, Mark, 1978. "Threshold models of collective (ASONAM), 596-603.
behavior." American journal of sociology: 1420-1443. Wu, Y., and Z. Duan, 2015. 'Social network analysis of
Goldenberg, J., Libai, B., Muller, E, 2001.: Talk of the international scientific collaboration on psychiatry
network: a complex systems look at the underlying process research', International Journal of Mental Health
of word-of-mouth. Mark. Lett. 12(3), 211–223. Systems.
Jackson,M.O, 2008.: Social and Economic Networks. Bian, J., M. Xie, U. Topaloglu, T. Hudson, and W. Hogan.
Princeton University Press. 2013. "Understanding biomedicai research
Steinwachs DM, Hughes RG, 2008. Patient Safety and collaborations through social network analysis: A case
Quality: An Evidence-Based Handbook for Nurses, study." In Bioinformatics and Biomedicine (BIBM),
Hughes RG, editor. 2013 IEEE International Conference, 9-16.
Millard, Colin, Petra Brhlikova, and Allyson Pollock. World health organization 2016. Health topics, e-health,
2015. 'Social networks and health policy: The case of url: http://www.who.int/topics/ehealth/en/
misoprostol and the WHO model essential medicine Chomutare, T., A. Xu, and M. S. Iyengar. 2014. "Social
list', Social Science & Medicine, 132: 190-96. Network Analysis to Delineate Interaction Patterns
Takahashi, Yoshimitsu, Tatsuro Ishizaki, Takeo That Predict Weight Loss Performance." In 2014 IEEE
Nakayama, and Ichiro Kawachi. 2016. 'Social network 27th International Symposium on Computer-Based
analysis of duplicative prescriptions: One-month Medical Systems, 271-76.
analysis of medical facilities in Japan', Health Policy, Pachucki M. C., Ozer E. J., Barrat A., Cattuto C., 2015.
120: 334-41. Mental health and social networks in early
Bramhachari, Rittika, and Sabyasachi Mandal. 2016. 'a adolescence: A dynamic study of objectively-
social network analysis of rural medical practitioners measured social interaction behaviors. Social Science
in the sundarbans, west bengal', BMJ Global Health, and Medecine 125, 40-50.
1: A41-A42. Goodall, K. T., L. A. Newman, and P. R. Ward. 2014.
Guo H., Wei F., Cheng S., Jiang F., 2015. Find Referral 'Improving access to health information for older
Social Networks, International Symposium on Security migrants by using grounded theory and social network
and Privacy in Social Networks and Big Data, 58-63. analysis to understand their information behaviour and
Soulakis, Nicholas D., Matthew B. Carson, Young Ji Lee, digital technology use', European Journal of Cancer
Daniel H. Schneider, Connor T. Skeehan, and Denise Care, 23: 728-38.
M. Scholtens. 2015. 'Visualizing collaborative
electronic health record usage for hospitalized patients
with heart failure', Journal of the American Medical
Informatics Association : JAMIA, 22: 299-311.
Caniato, M., T. Tudor, and M. Vaccari. 2015.
'Understanding the perceptions, roles and interactions
of stakeholder networks managing health-care waste:
A case study of the Gaza Strip', Waste Management,
35: 255-64.
Schoen, Martin W., Sarah Moreland-Russell, Kim Prewitt,
and Bobbi J. Carothers. 2014. 'Social network analysis
of public health programs to measure partnership',
Social Science & Medicine, 123: 90-95.
Dianis, Nancy L., Tracy L. Wolbach, and Maura
Spiegelman. 2016. 'The NHLBI–UnitedHealth Global
Health Centers of Excellence Program: Assessment of
Impact of Federal Funding Through a Social Network
Analysis', Global Heart, 11: 145-48.e1.
Kawonga, Mary, Duane Blaauw, and Sharon Fonn. 2015.
'Exploring the use of social network analysis to
measure communication between disease programme
and district managers at sub-national level in South
Africa', Social Science & Medicine, 135: 1-14.
Khosla, Nidhi, Jill Ann Marsteller, Yea Jen Hsu, and
David L. Elliott. 2016. 'Analysing collaboration
among HIV agencies through combining network
theory and relational coordination', Social Science &
Medicine, 150: 85-94.
158
Understanding Jump Landing as an Oscillating System: A Model-based
Approach of Balance and Strength Analyses
Sandra Hellmers1 , Sebastian Fudickar1 , Lena Dasenbrock2 , Andrea Heinks2 , Jürgen M. Bauer 3
and Andreas Hein1
1 Assistive
Systems and Medical Technologies, Carl von Ossietzky University Oldenburg, Oldenburg, Germany
2 Department
of Geriatric Medicine, Carl von Ossietzky University Oldenburg, Oldenburg, Germany
3 Chair of Geriatric Medicine, Heidelberg University, Agaplesion Bethanien Hospital Heidelberg, Heidelberg, Germany
{sandra.hellmers, sebastian.fudickar}@uni-oldenburg.de
Keywords: Force Platform, Counter Movement Jump, Vertical Jump, Balance, Strength, Geriatric Assessment, Jump
Landing, DPSI.
Abstract: Counter movement jumps (CMJ) are well-suited to measure the muscle power and balance. Since it has been
clarified that well accepted CMJ amplification-based balance measures (such as TTS or CoP) are significantly
influenced by algorithmic, and measurement settings and thus, measurement results have limited meaning-
fulness among force platforms, we introduce a new model-based approach measuring the postural stability.
In this, during the landing and recovery phases after vertical jumps, the lower extremities can be represented
by an oscillating system and the corresponding transfer function is described by a second-order delay (PT2)
element.
In an initial prospective study with 20 subjects aged over 70 years, we observed an inverse relationship be-
tween the calculated parameter w and the jump height and could also identify an influence of sex, and body
weight on the jump height. Furthermore, we also found a relation between the parameter w and the dynamic
postural stability index (DPSI), even though these results must be ensured statistically using a larger cohort,
due to the current limited number of subjects.
Nevertheless, we could confirm the general applicability of the Systems and Control Technology perspective
on describing human movements in a potentially more robust manner than current amplification based ap-
proaches. Further investigations on our model and the oscillating behavior in the phase of landing are needed
to improve our system and to interpret the calculated parameters in a technical and physiological point of view.
159
Hellmers, S., Fudickar, S., Dasenbrock, L., Heinks, A., Bauer, J. and Hein, A.
Understanding Jump Landing as an Oscillating System: A Model-based Approach of Balance and Strength Analyses.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 159-168
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Selection of assessment items in our geriatric study (Hellmers et al., 2016), their test duration, and classification
regarding the components of physical fitness (- none, + to +++ increasing significance). The test durations are based on
literature and estimated on own experiences (*) in a study with 250 participants. The values in brackets are the durations with
introduction and instructions or a test jump.
Geriatric Assessments Balance Strength Endurance Test Duration
de Morton Mobility Index ++ - - 9 min
-static balance ++ - -
-dynamic balance ++ - -
Short Physical Performance Battery ++ ++ - 15 min
-static balance ++ - -
-chair rise test - ++ -
Frailty Index - ++ - 10-17 min∗
-grip strength - ++ - 3-5 min
Stair Climb Power Test - ++ - 2-(5) min∗
6 Minute Walk Test - + ++ 6 min
Counter Movement Jump ++ ++ - 5-(6) min∗
2013) via the time to stability (TTS) during the land- 2.1 Biomechanical Characteristics
ing and stabilization phase and muscle performance
of the lower extremities (strength) via muscle power Counter movement jumps (CMJs) are vertical jumps
ahead of jumps (Buehring et al., 2015; Rittweger that are performed from standing, and according to
et al., 2004; Dietzel et al., 2015; Kalyani et al., 2014). (Palma et al., 2008) consist of the following phases
The assessment of patients’ functional status for (as shown in Figure 1): In the first phase (a) the par-
balance and muscle strength through a single test ticipant is standing. Phase (b) is characterized by the
item instead of several tests lowers costs and personal preparation (b) with a downward movement by the
efforts (supporting an increased assessment density) flexion of the knees and hips, followed by an imme-
and can reduce stress and potential fatigue for pa- diate and impulsive extension of the knees and hips
tients, which hold the risk that assessments results again to jump vertically up and take-off (c) and flight
lose significance (Siglinsky et al., 2015). Conse- (d). At the end of the jump, a stage of landing (e) with
quently, the CMJ is a well-suited assessment item to the absorption of the forces of the impact, and a stage
cover both muscle strength of the lower extremities of recovery (f) of the balance can be identified, fol-
and postural stability. lowed by a standing phase after compensation of the
However, since relying just on the force ampli- forces (a).
fication, current CMJ-based balance measures (such
as COP and TTS) have been shown to be signifi-
cantly prone to algorithmic and technical variations
thus have limited viability regarding the generaliza-
tion of classification and measurements.
Thus, we propose a robust approach to measure
postural stability based on the natural frequencies dur-
ing the landing and recovery phase of CMJs and eval-
uate its practicability for 20 subjects with an age of 71
to 82 years.
Figure 1: Counter movement jump and its separate phases:
standing (a), preparation (b), take-off (c), flight (d), landing
2 COUNTER MOVEMENT JUMP (e), and recovery (f). The marks indicate the participant’s
center of mass in each jump phase.
Within this section, the characteristics of CMJs are
discussed and are followed by a description of the 2.2 Common Technical Measurements
technically supported measurement of ground reac-
tion forces. via Force Platforms
160
Understanding Jump Landing as an Oscillating System: A Model-based Approach of Balance and Strength Analyses
cally technology supported via force platforms, con- the preparation and take-off phases e.g. of CMJs are,
tact mats or optical systems (Bui et al., 2015). Force as long as being considered relative to the body mass,
platforms measure the ground reaction force intensity significantly related to muscle strength (Nuzzo et al.,
and distribution. 2008; Markovic et al., 2014). The strength can be an-
Due to the specific force distribution characteris- alyzed by the take-off phase of the jump, and the bal-
tics, the phases of a CMJ can be identified by varia- ance was shown to be estimated based on the force-
tions of the ground force (if measured by ground force intensities and distributions during the landing and
reaction platforms or similar devices), as shown ex- recovery phase of jumps. For example, the time to
emplarily in Figure 2 and discussed in the following: stabilization (TTS) is the time it takes for an individ-
The transition from standing or rest (a) to preparation ual to return to a stable state following a jump or hop
(b) can be clearly recognized by changes in the ampli- landing, and it is a used factor for balance analyses.
tudes of the force, which was nearly constant during Thereby, a longer TTS indicates more difficulty con-
the standing phase. Take-off (c) is characterized by trolling the posture of landing and might indicate im-
the decrease of force affecting on the platform. Dur- paired neuromuscular control (Fransz et al., 2015).
ing the flight phase (d), the force amounts to zero. In
the moment of landing (e), the force increases to a
maximum. In the phase of recovery (f), the subject
tries to compensate the forces, in order to enter the
phase of standing or resting (a) again.
161
HEALTHINF 2017 - 10th International Conference on Health Informatics
A further important parameter for jump analyses (100 to 1000 Hz), 37% for filter settings (no filter, 40,
is the jump height. The jump height h can be esti- 15 or 10 Hz), 28-282% for trial lengths (20, 14, 10, 7,
mated by the following equation: 5 and 3 s), as well as calculation methods. Thereby
1 they clarified the difficulties to compare TTS results
h = (vt · t) − · g · t 2, (3) recorded among different systems based on the power
2 measure.
where vt is the vertical velocity of the center of mass While these analyses are performed based on sin-
of the jumper at take-off, t is the time to peak flight gle jump measurements for 25 healthy younger adults
and g the gravity. (20-53 years), its insights will generally apply due to
Besides measuring muscle strength, force plat- the indicated computational differences and the dras-
forms can be utilized to measure dynamic postu- tic effect sizes.
ral stability, which has been shown as related to Consequently, alternative measures are desired,
balance and ankle stabilities. Therefore, functional which are more robust regarding measurement-
deficits such as chronic functional ankle instability variations such as sample rates.
(FAI) (Hertel, 2002), can be indicated based on the Ideally, these measures should be equally appli-
recorded vertical, anteroposterior or mediolateral re- cable to rather mobile measurement devices such as
action forces, which enable the calculation of time inertial measurement units (IMU), which will be in-
to stabilization (TTS) and variations over time of the creasingly applied due to their lower price and the
center of pressure (COP), range of motion (ROM), higher grade of mobility (Choukou et al., 2014; Elvin
and the dynamic postural stability index (DPSI) as ac- et al., 2007; Milosevic and Farella, 2015).
cepted measures for postural stability and FAI. The
DPSI is at least as accurate and precise as TTS but
provides a comprehensive measurement of dynamic
postural stability that is sensitive to change in 3 direc- 4 SYSTEMS AND CONTROL
tions. TECHNOLOGY
DPSI provides a comprehensive measurement of
dynamic postural stability that is sensitive to change Considering the situation, that a system is stimulated
in all directions since combining three (vertical, an- by an action (input signal). Usually, the system re-
teroposterior and mediolateral) stability indexes and acts on this stimulation in any manner (output signal).
considers as well the subject’s weight for the vertical Now we want to describe this system to predict the
stability and thus has been shown to be a reliable mea- reaction of the system to an action. In the systems
sure (Wikstrom et al., 2005b; Meardon et al., 2016). and control technology the relation of an input and
While COP and ROM have shown mixed correlations an output function, and therefore, the system can be
to FAI stabilities, TTS is a well-accepted measure to described by a transfer function (see Figure 4).
quantify performance. Typically, the force is con-
sidered in order to measure the TTS, as a measure
of the ability to stabilize posture (which is applied
within numerous studies). TTS typically ranges from
0 to 7s. By investigating 20 TTS calculation meth-
ods (as identified via a structured literature review),
Fransz et al. (Fransz et al., 2015) have shown that all Figure 4: Relation between the output function Y (s), the
use threshold-based approaches based on the ground transfer function H(s) and F(s) the input function.
force and 90% can be described based on four aspects:
(1) the input signal, (2) signal processing, (3) the sta- The mathematical relation is given by:
ble state (threshold), and (4) the definition of when
the (processed) signal is considered stable. Y (s) = H(s)F(s), (4)
Wikstrom et al. identified a significant variabil-
where Y (s) is the output function, H(s) the transfer
ity among TTS measurements due to differences be-
function and F(s) the input function. If assuming,
tween the TTS calculation methods used in various
that the landing and recovery phase of a vertical jump
studies (Wikstrom et al., 2005a). By evaluating the in-
(Figure 2 (e)) is an oscillating system, the transfer
fluences of parameter variations, Fransz et al. (Fransz
function is described by a second-order delay element
et al., 2015) have indicated that the TTS measure does
(PT2-element).
produce non-standardized parameters if estimated via
ground forces reaction parameter. They indicated Y (s) a
variations of the TTS of up to 56% for sample rate H(s) = = (5)
F(s) cs2 + bs + 1
162
Understanding Jump Landing as an Oscillating System: A Model-based Approach of Balance and Strength Analyses
163
HEALTHINF 2017 - 10th International Conference on Health Informatics
164
Understanding Jump Landing as an Oscillating System: A Model-based Approach of Balance and Strength Analyses
165
HEALTHINF 2017 - 10th International Conference on Health Informatics
166
Understanding Jump Landing as an Oscillating System: A Model-based Approach of Balance and Strength Analyses
culoskeletal system (Blache and Monteil, 2013) or vertical jump from a squatting position. Multibody
even an anatomically realistic three-dimensional mus- System Dynamics, 36(1):37–65.
culoskeletal model (Farahani et al., 2016) could open Fransz, D. P., Huurnink, A., de Boode, V. A., Kingma, I.,
perspectives for more robust models. and van Dieën, J. H. (2015). Time to stabilization
in single leg drop jump landings: An examination of
calculation methods and assessment of differences in
sample rate, filter settings and trial length on outcome
ACKNOWLEDGEMENTS values. Gait & Posture, 41(1):63–69.
Fudickar, S., Karth, C., Mahr, P., and Schnor, B. (2012).
Fall-detection simulator for accelerometers with in-
The study is funded by the German Federal hardware preprocessing. In Proceedings of the 5th
Ministry of Education and Research (Project No. International Conference on Pervasive Technologies
01EL1422D). We would also like to thank Dr. Fabian Related to Assistive Environments, page 41. ACM.
Sobotka for his support. Granacher, U., Gollhofer, A., Hortobágyi, T., Kressig,
R. W., and Muehlbauer, T. (2013). The importance
of trunk muscle strength for balance, functional per-
formance, and fall prevention in seniors: A systematic
REFERENCES review. Sports Medicine, 43(7):627–641.
Hein, A., Winkelbach, S., Martens, B., Wilken, O., Eichel-
Blache, Y. and Monteil, K. (2013). Effect of arm swing berg, M., Spehr, J., Gietzelt, M., Wolf, K.-H.,
on effective energy during vertical jumping: experi- Büsching, F., Hülsken-Giesler, M., et al. (2010). Mon-
mental and simulation study. Scandinavian Journal of itoring systems for the support of home care. Infor-
Medicine & Science in Sports, 23(2):e121–e129. matics for Health and Social Care, 35(3-4):157–176.
Buehring, B., Krueger, D., Fidler, E., Gangnon, R., Heider- Hellmers, S., Fudickar, S., Büse, C., Dasenbrock, L.,
scheit, B., and Binkley, N. (2015). Reproducibility of Heinks, A., Bauer, J. M., and Hein, A. (2016). Tech-
jumping mechanography and traditional measures of nology supported geriatric assessment. In Ambient As-
physical and muscle function in older adults. Osteo- sisted Living. Springer. (in press).
porosis International, 26(2):819–825. Hertel, J. (2002). Functional anatomy, pathomechanics, and
Bui, H. T., Farinas, M.-I., Fortin, A.-M., Comtois, A.- pathophysiology of lateral ankle instability. Journal of
S., and Leone, M. (2015). Comparison and analysis Athletic Training, 37(4):364.
of three different methods to evaluate vertical jump Kalyani, R. R., Corriere, M., and Ferrucci, L. (2014). Age-
height. Clinical Physiology and Functional Imaging, related and disease-related muscle loss: the effect of
35(3):203–209. diabetes, obesity, and other diseases. The Lancet Dia-
Choukou, M.-A., Laffaye, G., and Taiar, R. (2014). Re- betes & Endocrinology, 2(10):819–829.
liability and validity of an accelerometric system for Markovic, S., Mirkov, D. M., Nedeljkovic, A., and Jaric,
assessing vertical jumping performance. Biology of S. (2014). Body size and countermovement depth
Sport, 31(1):55. confound relationship between muscle power output
Clegg, A., Young, J., Iliffe, S., Rikkert, M. O., and Rock- and jumping performance. Human Movement Science,
wood, K. (2013). Frailty in elderly people. The 33:203–210.
Lancet, 381(9868):752–762. Meardon, S., Klusendorf, A., and Kernozek, T. (2016). In-
Cruz-Jentoft, A. J., Baeyens, J. P., Bauer, J. M., Boirie, Y., fluence of injury on dynamic postural control in run-
Cederholm, T., Landi, F., Martin, F. C., Michel, J.-P., ners. International Journal of Sports Physical Ther-
Rolland, Y., Schneider, S. M., et al. (2010). Sarcope- apy, 11(3):366.
nia: European consensus on definition and diagnosis Milosevic, B. and Farella, E. (2015). Wearable inertial sen-
report of the european working group on sarcopenia sor for jump performance analysis. In Proceedings of
in older people. Age and Ageing, 39:412423. the 2015 Workshop on Wearable Systems and Appli-
Dietzel, R., Felsenberg, D., and Armbrecht, G. (2015). cations, pages 15–20.
Mechanography performance tests and their associa- Nuzzo, J. L., McBride, J. M., Cormie, P., and McCaulley,
tion with sarcopenia, falls and impairment in the ac- G. O. (2008). Relationship between countermovement
tivities of daily living-a pilot cross-sectional study in jump performance and multijoint isometric and dy-
293 older adults. Journal of Musculoskeletal and Neu- namic tests of strength. The Journal of Strength &
ronal Interactions, 15(3):249–256. Conditioning Research, 22(3):699–707.
Elsawy, B. and Higgins, K. E. (2011). The geriatric assess- Palma, S., Silva, H., Gamboa, H., and Mil-Homens, P.
ment. American Family Physician, 83(1):48–56. (2008). Standing jump loft time measurement-an ac-
Elvin, N. G., Elvin, A. A., and Arnoczky, S. P. (2007). celeration based method. In Biosignals (2), pages
Correlation between ground reaction force and tibial 393–396.
acceleration in vertical jumping. Journal of Applied Rittweger, J., Schiessl, H., Felsenberg, D., and Runge, M.
Biomechanics, 23(3):180. (2004). Reproducibility of the jumping mechanogra-
Farahani, S. D., Andersen, M. S., de Zee, M., and Ras- phy as a test of mechanical power output in physically
mussen, J. (2016). Optimization-based dynamic pre- competent adult and elderly subjects. Journal of the
diction of kinematic and kinetic patterns for a human American Geriatrics Society, 52(1):128–131.
167
HEALTHINF 2017 - 10th International Conference on Health Informatics
168
C-LACE: Computational Model to Predict 30-Day
Post-Hospitalization Mortality
Abstract: This paper describes a machine learning approach to creation of computational model for predicting 30-day
post hospital discharge mortality. The Computational Length of stay, Acuity, Comorbidities and Emergency
visits (C-LACE) is an attempt to improve accuracy of popular LACE model frequently used in hospital setting.
The model has been constructed and tested using MIMIC III data. The model accuracy (AUC) on testing data
is 0.74. A simplified, user-oriented version of the model (Minimum C-LACE) based on 20-most important
mortality indicators achieves practically identical accuracy to full C-LACE based on 308 variables. The focus
of this paper is on detailed analysis of the models and their performance. The model is also available in the
form of online calculator.
169
Wojtusiak, J., Elashkar, E. and Nia, R.
C-Lace: Computational Model to Predict 30-Day Post-Hospitalization Mortality.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 169-177
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
A recent study added an extension of the LACE patients. It is structured into 26 tables organized as a
(LACE+) which uses the same 4 items of LACE as relational database (Johnson et al, 2016).
well as age and items unique to Canadian From the MIMIC III data, we selected only
administrative databases (such as the Canadian admissions for patients at least 65 years old and alive
Institute for Health Information Case Mix Groupings at hospital discharge. This results in selection of
and number of hospital days awaiting alternate level 21,651 admissions. The distribution of selected
of care arrangements). LACE+ had shown more attributes in the data is presented in Tables 1a and 1b.
accuracy in predicting death within 30 days of The tables also show likelihood ratios (RL) associated
hospital discharge (c-statistic 0.77) than LACE index with each of the attributes for predicting mortality.
had shown (c-statistic 0.68) (Walraven et al, 2010). Within the data, the majority of patients were treated
However, both instruments didn’t show sufficient in Medical Intensive Care Units (MICU), followed by
accuracy, besides it is not always possible to obtain Cardiac Surgery Recovery Units (SCRU), Cardiac
data on the 4th item of LACE (”E”), as emergency Care Units (CCU), Surgical Intensive Care Units
room visits are not necessarily recorded in available (SICU) and Trauma Surgical Intensive Care Units
data. (TSICU). It can also be noted from the data that the
In the presented work we propose a computational majority of patients were hospitalized only once.
alternative to LACE index, called C-LACE, In the presented work, instead of loading to
constructed by application of machine learning relational database, the data has been analyzed within
methods to data containing information about length distributed computing infrastructure designed and
of stay, acuity of the admission, and comorbidities implemented as a part of the larger research project
present during hospitalization. We decided not to use conducted in GMU’s Machine Learning and
patients’ emergency visits due to possible problems Inference Laboratory. The data has been mapped to
with data availability when applying model. concepts within the Unified Medical Language
A number of other models based on machine System (UMLS) and integrated during analysis based
learning and computational methods have been on unique concept identifiers. The mapping process
proposed to predict patient mortality. For example, is a combination of manual labor-intensive
(Levy et al., 2015) proposed a Multimorbidity Index identification of appropriate concepts which requires
tuned to predict mortality among nursing home strong domain background of the person performing
patients. A number of methods have been created for the mapping, with automated search for concepts
prediction of mortality among specific disease groups between different terminologies in UMLS. The latter
such as pneumonia (Cooper et al., 1997), prostate can be done when original data stored in database are
cancer (Ngufor et al, 2014), or sepsis (Taylor et al., coded using one of standard terminologies, but the
2016). final results still need to be verified by human experts.
The main contributions of the presented work are In fact, the presented construction of the model served
construction of C-LACE model that can be used to as a testing application for the developed platform,
predict 30-day post-hospitalization mortality, and whose description is out of scope of this paper
more importantly detailed analysis of the model and (Wojtusiak et al., 2016).
its behavior on real and simulated data.
Table 1a: Distribution of values in the data.
CONSTRUCTION Age (mean, SD) 79.33 years (7.26) 76.93 years (7.16)
Length of Stay
Hospital 13.73 days (11.33) 10.52 days (9.15)
2.1 MIMIC III Data CCU (mean, SD)
CSRU (mean, SD)
121.22 days (115.56) 19.79% 72.45 days (86.18) 19.02% 1.05
262.05 days (322.26) 10.74% 92.67 days (132.29) 27.16% 0.32
MICU (mean, SD) 106.10 days (122.87) 57.89% 85.32 days (119.07) 36.14% 2.43
In order to construct and test the C-LACE model, we SICU (mean, SD) 143.88 days (222.66) 17.54% 111.51 days (170.28) 16.64% 1.07
publically available to researchers who satisfy certain Phys Referral/Normal Deli 6.95% 21.73% 0.27
Transfer From Hosp/Extram 18.04% 18.39% 0.98
conditions (Goldberg et al, 2000). The MIMIC III Transfer From Skilled Nur 1.75% 0.61% 2.89
data has been collected between 2001 and 2012 in the Transfer From Other Healt 0.49% 0.10% 4.75
Info Not Available 0.07% 0.00% 14.20
Beth Israel Deaconess Medical Center. It consists of
over 58,000 hospital admissions for more than 40,000
170
C-Lace: Computational Model to Predict 30-Day Post-Hospitalization Mortality
Table 1b: Distribution of values in the data, cont. dates of discharge and death.
The data has been transformed into a single
Died in 30 days Not died in 30 days
Comorbidities
N = 1425 N = 20226
LR analytic file (or technically corresponding data
Cardiac dysrhythmias 42.25% 36.73% 1.26
structures) in order to be used by machine learning
Acute and unspecified renal failure 37.05% 21.12% 2.20 software.
Essential hypertension 39.16% 52.57% 0.58 A number of supervised machine learning
Respiratory failure; insufficiency; arrest (adult) 33.40% 17.88% 2.30
Congestive heart failure; nonhypertensive 22.60% 16.28% 1.50
methods have been explored in order to arrive at most
Pneumonia (except that caused by TB or STD) 25.40% 12.66% 2.35 accurate and useful set of models. Among the tested
Urinary tract infections 24.70% 16.20% 1.70 methods were logistic regression, random forest,
COPD 24.84% 17.75% 1.53
Diabetes mellitus without complication 25.47% 24.55% 1.05
naïve Bayes, and support vector machines.
Deficiency and other anemia 29.19% 22.87% 1.39 Comparison of the methods is presented in section
Fluid and electrolyte disorders 27.93% 20.52% 1.50 3.1, and actual descriptions of the methods is outside
Disorders of lipid metabolism 26.95% 39.20% 0.57
Coronary atherosclerosis and other heart disease 18.67% 23.09% 0.76
of the scope of this paper and can be found in the
literature.
171
HEALTHINF 2017 - 10th International Conference on Health Informatics
172
C-Lace: Computational Model to Predict 30-Day Post-Hospitalization Mortality
4 MODEL ANALYSIS
Figure 2: Accuracy of models for different selection of In addition to standard testing of the created model
attributes given as ROC. presented in the previous section, this section
discusses a more detailed analysis of the created
Additional analysis indicates that in fact predicted Minimum C-LACE model. The goal is to understand
probabilities from both models are very close. When the model’s behavior and its sensitivity to changes in
applied to training data Mean Squared Error (MSE) input attributes.
between probabilities of 30-day mortality calculated The first set of experiments was to investigate
between both models was 0.000439 as illustrated in how probabilities of 30-day mortality depend on
scatterplot in Figure 3. changes in single variables. This is particularly
important for continuous variables for which model
should be “smooth” and not produce sudden changes
in output probabilities. This property can be
investigated be applying the model to large simulated
data and comparing output to distribution of values in
real dataset.
First created simulated dataset was completely
random, that is, each input attribute was assigned
uniformly a random value from list of allowed values
for that attribute with exception for one attribute
being controlled. For example, generation of
simulated data to test age attribute followed the
Figure 3: Comparison of probabilities of C-LACE and procedure:
Minimum C-LACE on training data.
for a = min(age) to max(age):
Similarly, when compared on testing data the Generate 1,000 random examples:
MSE between the two models was 0.00335 as shown age = a
in Figure 4. While there is a slight difference in the for each attribute x other than age:
predicted probabilities, the data are clearly clustered x = random(domain(x))
into two groups that correspond to low and high risks After simulated dataset is generated, C-LACE
of mortality. Assignment to these groups is virtually model is applied to predict mortality probabilities.
identical regardless of models used. These probabilities can then be investigated to check
model’s behavior based on changes in age.
173
HEALTHINF 2017 - 10th International Conference on Health Informatics
174
C-Lace: Computational Model to Predict 30-Day Post-Hospitalization Mortality
confirms the hypothesis that the constructed C-LACE Secondary model was learned from data to predict
model is stable. when C-LACE is likely to misclassify positive
mortality examples. Specifically, it was built from
4.1 Analysis of Errors data labeled as correct classification/misclassification
of testing data used to evaluate C-LACE. The
An interesting and important question concerns secondary model has been learned using logistic
finding cases for which the model makes mistakes. If regression. Following the standard procedure the
successful, such analysis may allow for predicting misclassification data was split into training (80%)
when C-LACE is more likely to make a mistake, and and testing (20%). When tested, the model showed
thus preventing it. very high promise of predicting when C-LACE is
As shown in Figures 8 and 9, there is basically no likely to make mistakes. It achieved AUC 0.867 on
pattern on when the model makes mistakes based on misclassification training and AUC 0.858 on
distribution of age and length of hospital stay. In both misclassification testing data.
figures, green dots representing patients who died The final set of performed tests investigated
should be clustered towards the top, and red ones optimal classification threshold based on precision
representing alive patients towards the bottom. The and recall. Using C-LACE it is possible to achieve
distribution errors in the model (how far green dots any value or recall, precision in general stays very
are from the top) is practically uniform with respect low as shown in Figure 10. The figure indicates that
to age. While the distribution of hospital length of selection of classification threshold for C-LACE
stay is clearly positively skewed, there seems to be no around 0.1 may be the most reasonable. More detailed
pattern in when errors are made (Figure 9). cost-benefit analysis of false positives and false
negatives of the model is needed to arrive at final
threshold applicable for final use.
5 ONLINE CALCULATOR
In order for other researchers to test the developed
mortality prediction models, an online calculator
which includes Minimum and Full C-LACE models
was created. The minimum model is available
through a web form that can be used by entering data,
as well as Application Programing Interface (API) for
automated use. The full model is available only
through an API, since it is unlikely for anyone to
Figure 9: Predicted probabilities of 30-day mortality for answer 308 questions on a web form. At this stage,
training data in relation to hospital length of stay. Color of the online calculator is intended only for research
dots represents true class. purposes and not for clinical use, since additional
175
HEALTHINF 2017 - 10th International Conference on Health Informatics
validation is needed. The online calculator is assessment. Analysis has indicated that it may be
available at the website http://hi.gmu.edu/cgi- possible to automatically assess classification errors
bin/calculatros/c-lace/c-lace.cgi. from the model, though additional work is needed in
this area.
The current continuation of research proceeds in
two main directions:
- Possible improvement of the model accuracy by
using additional clinical variables. There is
significant work that remains to be done in the area
of incorporating detailed clinical information and
patient notes with specific focus on temporal aspect
of the data. In the presented Minimum C-LACE
model, no clinical attributes were included, which
Figure 11: Design of the simple form used to enter patient may be result of oversimplification of how the
and hospitalization information. values were coded (see Section 2.2).
- Analysis of how the model should be presented to
Simple online form (Figure 11) is used to enter end-users so they understand predicted
patient and hospitalization characteristics. The entry probabilities and model limitations. The latter is
is split into sections related to length of stay in particularly important to make the presented online
hospital and specific ICUs, age, admission location calculator useful.
and selected conditions most predictive of 30-day
mortality. After submitting the form, user is provided
with estimated probability of 30-day mortality. ACKNOWLEDGEMENTS
Because of the way the data was analyzed, the
calculator is intended to be used at the time of hospital This project has been supported by the LMI-
discharge. Academic partnership program grant. The authors
It is important to note that within the scope of this thank Donna Norfleet, Chris Bistline, Brent Auble
project it was impossible to completely test the and all those who participated in our monthly
calculator and in particular assess its impact on meetings for their support and feedback that helped
patient care. Thus, the site contains a disclaimer that improve the project.
the calculator is intended to be used only for research The authors thank anonymous reviewers whose
purposes. feedback helped improve the paper, particularly by
pointing to relevant previously published literature.
6 CONCLUSIONS
REFERENCES
This paper presented construction and analysis of C-
LACE method for predicting probability of 30-day AHRQ (2016) https://www.hcup-us.ahrq.gov/tools
post-hospitalization mortality. The presented solution software/ccs/ccs.jsp
based on application of Random Forest algorithm Au, AG, McAlister, FA, Bakal, JA, et al. 2012. Predicting
gives accuracy comparable to other methods the Risk of Unplanned Readmission or Death within 30
available in the literature and superior to accuracy of Days of Discharge After a Heart Failure
the original LACE index. It shows that Minimum C- Hospitalization. American Heart Journal. 164(3):365-
LACE, a 20-attributes version of the presented 372.
Breiman, L., 2001. Random forests. Machine learning,
method, achieves the same results as one that uses
45(1), 5-32.
308 attributes. Cooper, Gregory F., et al., 1997. An evaluation of machine-
Detailed analysis of the constructed model shows learning methods for predicting pneumonia mortality.
that the model is not sensitive to changes in values of Artificial intelligence in medicine 9.2. 107-138.
key variables and, in fact, smoothens the data (the Davis, RB, Iezzoni LI, Phillips RS, Reiley P, et al. 1995.
most visible for length of stay). While the accuracy of Predicting in-hospital mortality: the importance of
the model precludes its use completely functional status information. Med Care.33:906-921.
independently, it is a reasonable improvement over Goldberger AL, et al., 2000. PhysioBank, PhysioToolkit,
popular LACE method. The model can be used to and PhysioNet: Components of a New Research
Resource for Complex Physiologic
inform clinicians when performing patient risk
176
C-Lace: Computational Model to Predict 30-Day Post-Hospitalization Mortality
Signals. Circulation 101(23):e215-e220 [Circulation Taylor, R. Andrew, et al. 2016. Prediction of InǦ hospital
Electronic Mortality in Emergency Department Patients with
Pages; http://circ.ahajournals.org/content/101/23/e215. Sepsis: A Local Big Data–Driven, Machine Learning
full Approach. Academic Emergency Medicine.
Gu, W., Vieira, A. R., Hoekstra, R. M., Griffin, P. M., & Van Walraven, C., Dhalla, IA, Bell, C., et al., 2010.
Cole, D. , 2015. Use of random forest to estimate Derivation and validation of an index to predict early
population attributable fractions from a case-control death or unplanned readmission after discharge from
study of Salmonella enterica serotype Enteritidis hospital to the community. CMAJ 2010 Apr 6; 182(6):
infections. Epidemiology and Infection, 1-9. 551–557. doi: 10.1503/cmaj.091117. PMCID:
Ho KM, Dobb GJ, Knuiman M, et al. 2006. A comparison PMC2845681
of admission and worst 24-hour Acute Physiology and Van Walraven C, Wong J, Forster AJ. 2012. LACE+
Chronic Health Evaluation II scores index: extension of a validated index to predict early
in predicting hospital mortality: a retrospective cohort death or urgent readmission after hospital discharge
study. Crit Care; 10:R4. using administrative data. Open Med. 2012 Jul
Iezzoni LI. Risk Adjustment for Measuring Health 19;6(3):e80-90. PMCID: PMC3659212
Outcomes Ann Arbor. 1994. Mich: Health Vasilevskis EE, Kuzniewicz MW, Cason BA, Lane
Administration Press. RK, Dean ML, Clay T, Rennie DJ, Vittinghoff
Inouye, S.K., Peduzzi, P., Robison, J., Hughes, J., Horwitz, E, Dudley RA. 2009. Mortality probability model III
R., Concato, J, MPH, 1998. Importance of Functional and simplified acute physiology score II: assessing their
Measures in Predicting Mortality Among Older value in predicting length of stay and comparison to
Hospitalized Patients. JAMA. 1998;279(15):1187- APACHE IV. Chest. 136(1):89-101. doi:
1193. doi:10.1001/jama.279.15.1187. 10.1378/chest.08-2591.
Johnson AEW, Pollard TJ, Shen L, Lehman L, Feng M, Verduijn, M., Sacchi, L., Peek, N., Bellazzi, R., de Jonge,
Ghassemi M, Moody B, Szolovits P, Celi LA, and Mark E. and de Mol, B.A., 2007. Temporal abstraction for
RG. 2016. MIMIC-III, a freely accessible critical care feature extraction: A comparative case study in
database. Scientific Data. 10.1038/sdata.2016.35. prediction from intensive care monitoring data.
Kuzniewicz MW1, Vasilevskis EE, Lane R, Dean Artificial intelligence in medicine, 41(1), pp.1-12.
ML, Trivedi NG, Rennie DJ, Clay T, Kotler Wojtusiak, J., Elashkar, E., Mogharab, R., 2016. Integrating
PL, Dudley RA. 2008. Variation in ICU risk-adjusted Complex Health Data for Analytics. The Machine
mortality: impact of methods of assessment and Learning and Inference Laboratory, electronic
potential confounders. Chest. 2008;133(6):1319-27. circulation. MLI 16-1.
doi: 10.1378/chest.07-3061.
Levy, C., Kheirbek, R,, Alemi, F., Wojtusiak, J., Sutton, B,,
Williams, A.R. and Williams, A., 2015. Predictors of
six-month mortality among nursing home residents:
diagnoses may be more predictive than functional
disability. Journal of Palliative Medicine, 18(2), 100-6.
Moreno, RP, Metnitz, P.G., Almeida, E, et al., 2005. SAPS
3--From evaluation of the patient to evaluation of the
intensive care unit. Part 2: Development of a prognostic
model for hospital mortality at ICU admission.
Intensive Care Med; 31:1345.
Moskovitch, R. and Shahar, Y., 2015. Classification-driven
temporal discretization of multivariate time series. Data
Mining and Knowledge Discovery, 29(4), pp.871-913.
Ngufor, C., Wojtusiak, J., Hooker, A., Oz, T. and Hadley,
J., 2014. Extreme Logistic Regression: A Large Scale
Learning Algorithm with Application to Prostate
Cancer Mortality Prediction. Proceedings of the 27th
International Florida Artificial Intelligence Research
Society Conference.
Rocker, G., Cook, D., Sjokvist, V., Weaver, B., Finfer, S.,
McDonald, E., Marshall, J., Kirby, A., Levy, M., at al.,
2004. Clinician Predictions of Intensive Care Unit
Mortality, Crit Care Med. 2004;32 (5)1
Rose, Sherri, 2013. "Mortality risk score prediction in an
elderly population using machine learning." American
journal of epidemiology 177.5. 443-452.
177
Predicting Outcome of Ischemic Stroke Patients using Bootstrap
Aggregating with M5 Model Trees
Keywords: Ischemic Stroke, mRS Score, M5 Model Tree, Bootstrap Aggregating, Predicting Stroke Outcome.
Abstract: The objective of our study is to predict the clinical outcome of ischemic stroke patients after 90 days of
stroke using the modified Rankin Scale (mRS) score. After experimentation with various regression
techniques, we discovered that using M5 model trees to predict the score and then using bootstrap
aggregating as a meta-learning technique produces the best prediction results. The same regression when
followed by classification also performs better than regular multi-class classification. In this paper, we
present the methodology used, and compare the results with other standard predictive techniques. We also
analyze the results to provide insights on the factors that affect stroke outcomes.
178
Kabir, A., Ruiz, C., Alvarez, S. and Moonis, M.
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 178-187
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees
1.2 Modified Rankin Scale ratio of 1.57 in a logistic regression model predicting
mRS-90 2. This means that the patients who are
The modified Rankin Scale (mRS) measure is the administered statins have 1.57 times the probability
most widely used clinical outcome measure for of attaining mRS-90 2 than those who are not
stroke. It was first introduced by Dr. John Rankin treated with statins. (Marini et al., 2005) studied the
(Rankin, 1957) and later modified to its current form effects of atrial fibrillation in stroke outcome. In
by a group of researchers during the late 1980s (Van (Yong and Kaste, 2008), hyperglycemia is
Swieten et al., 1988). The mRS score is an integer associated with poor outcome, while in (Nogueira et
between 0 and 6 signifying the various degrees of al., 2009) successful revascularization is associated
impairment caused by stroke, with 0 being the least with good outcome. (Henninger et al., 2012)
amount of impairment and 6 being death. Table 1 reported that leukoaraiosis is a factor in poor 90-day
presents a summary description of the different mRS outcome of stroke. These are only a handful of the
scores. The mRS score can be calculated at various studies using mRS-90 prediction as a means of
stages of stroke. In this study, the mRS scores are discovering effects of factors in stroke outcome. All
recorded in three different stages. The first, mRS of the above studies dichotomized the mRS score to
before admission, presents the degree of disability two levels – one consisting of mRS-90 2 and the
the patient had before the onset of stroke. The next is other of mRS > 2.
mRS at discharge, which gives the mRS score at the In contrast, there have not been many studies that
time the patient is discharged from the hospital after focused solely on predicting the stroke outcome and
initial treatment of stroke. The last one is mRS at 90 employing machine learning models to assist in the
days after stroke (mRS-90), the score this study prediction task. (Gialanella et al., 2013) aimed to
attempts to predict. predict stroke outcome using linear regression, but
used the functional independence measure (FIM)
Table 1: Different mRS scores and their description which is a scale that measures stroke recovery in
(Banks and Marotta, 2007). terms of activities of daily living (Keith et al., 1987).
A similar effort was made by (Brown et al., 2015),
Score Description
again focusing on FIM. Neither of these papers
0 No symptoms considered regression techniques other than linear
1 No significant disability regression. To the best of our knowledge, there is no
study that has methodically explored regression
2 Slight disability
analysis methods to predict the mRS-90 score as a
3 Moderate disability: requires assistance measure of stroke outcome.
4 Moderately severe disability
5 Severe disability: patient bedridden 1.4 Plan of the Paper
6 Death
In Section 2 of this paper, we present the
methodology of our research. That section deals
1.3 Related Work with the steps that are taken to prepare and
preprocess the data, and also describes in full details
The mRS-90 score has been used as a measure of our prediction techniques. Section 3 presents a
stroke outcome in numerous studies. Most of these comparison of different prediction methods, and
studies focus on a particular treatment or condition, analyzes the results to gain more insights about the
the efficacy of which is examined by how it affects models discovered. Section 4 concludes with a
the mRS-90 score. In most cases, the mRS-90 score summary of findings and directions for future work.
has been dichotomized to convert the task of
prediction to that of binary classification. The
classification task is performed usually by
multivariate logistic regression which allows the
2 METHODOLOGY
authors to comment on the influence of one or more
variables on stroke outcome based on the odds ratios 2.1 Data Collection and Preparation
computed from the logistic regression model. For
example, (Moonis et al., 2005) reported that using Our study is conducted on retrospective data
statins for treatment of ischemic stroke improved obtained from medical records of 439 ischemic
stroke outcome since the statins obtained an odds stroke patients admitted at the University of
Massachusetts Medical School, Worcester, MA,
179
HEALTHINF 2017 - 10th International Conference on Health Informatics
USA between 2012 and 2015. Information relevant technique called bootstrap aggregating where the
for stroke outcome prediction is extracted into a base learner is a model tree generated using the M5
dataset. Patients who died within 90 days of stroke, algorithm. The machine learning tool Weka (Hall et
therefore having a mRS score of 6, are excluded al., 2009) is used for the experiments.
from this analysis. The reason for this exclusion is
that patient death can occur for a combination of Table 2: Summary statistics of the attributes of the stroke
several reasons apart from stroke, such as advanced dataset. The total number of patients is 439. For
age or other comorbid conditions. Therefore, for continuous attributes, the mean and standard deviation are
stroke outcome prediction, we decide to work only shown in a Mean ± Std. Dev. format. For categorical
attributes the percentages of different values are given. For
with the patients who survived the stroke after 90
binary attributes, only the percentages of TRUE values are
days. Prominent works on this area such as the shown. For mRS scores at different stages, we summarize
Copenhagen Stroke Study (Nakayama et al., 1994) the overall mean and standard deviation along with the
have also excluded dead patients in some of their distribution of individual scores.
models.
The process of selecting relevant predictive Attribute Distribution of values
Small vessel: 12.3%,
attributes is a combination of domain expertise and
Large vessel: 23.7%,
empirical knowledge of machine learning procedu- Stroke subtype Cardioembolic: 31.4%
res. In the first step, one of the authors of this paper, Cryptogenic: 23.7%,
a clinical neurologist and expert on stroke, has Others: 8.9%
helped select a large set of attributes for extraction Male: 57.4%,
Gender
from the patients’ medical records. We then inspect Female: 42.6%
each attribute to see whether they are conducive for Age
67.2 ± 14.6
machine learning. Attributes with a large amount of Range: 19 - 97
missing values, or with almost all instances having 7.2 ± 7.1
NIHSS score at admission
the same value are removed. In the end, the chosen Range: 0 - 32
set of attributes include demographic information Hypertension 74.7%
Hyperlipidemia 58.8%
(such as age and gender), medical history (such as
Diabetes 29.8%
diabetes and hypertension), habits history (such as
Smoking 29.4%
smoking and drinking), subtype of stroke (such as
Alcohol problem 14.6%
large vessel and cardioembolic) (Adams et al., Previous history of stroke 19.4%
1993), prescribed medication (such as anticoagu- Atrial Fibrilation 27.7%
lants), and mRS scores at different stages (before Carotid Artery Disease 21.0%
admission, at discharge and at 90 days). A measure Congestive Heart Failure 8.7%
of stroke severity determined by the National Peripheral Artery Disease 6.4%
Institutes of Health Stroke Scale (NIHSS) score Hemorrhagic conversion 11.2%
(Brott et al., 1989) is also included. Table 2 presents tPA 20.5%
summary statistics of all the attributes of the stroke Statins 47.4%
dataset used in this study. Antihypertensives 62.9%
For the multivalued attribute stroke subtype, five Antidiabetics 20.5%
binary attributes for the five possible values are Antiplatelets 45.3%
created, with each attribute value specifying whether Anticoagulants 10.3%
(1) or not (0) the patient has that particular subtype Perfusion 8.7%
of stroke. This is done since there is no ordinal Neurointervention 18.7%
relationship among the different stroke types; so 0.41 ± 0.86
0: 74.0%, 1: 15.0%
giving them numeric scores would make the model mRS before admission
2: 5.9%, 3: 2.1%
incorrect. 4: 1.4%, 5: 0.5%
1.60 ± 1.63
2.2 Regression 0: 35.3%, 1: 13.7%
mRS at discharge
2: 15.3%, 3: 9.8%
In statistics and machine learning, regression is the 4: 11.6%, 5: 5.0%
process of analyzing how a numeric dependent 1.28 ± 1.46
variable changes with regards to changes in one or 0: 46.9%, 1: 17.5%
mRS at 90 days
more independent variables. In this study the 2: 14.4%, 3: 11.6%
regression task is performed by a meta-learning 4: 6.2%, 5: 3.4%
180
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees
181
HEALTHINF 2017 - 10th International Conference on Health Informatics
ͳ
ܴ ܧܵܯൌ ඩ ሺȁݖ െ ݖෝȁሻ
ప
ଶ (3)
݊
ୀଵ
2.3 Classification
The different levels of mRS scores can be viewed as
different categories and hence predicting the mRS
score can be viewed as a multi-class classification
problem. We consider three classifiers in this study.
Figure 2: Summary of the process of bagging. From the Two of them are widely used classification
training set, k bootstraps are created. Each bootstrap B1, algorithms: logistic regression (McCullagh, 1980)
…, Bk is used to build predictor versions V1, …, Vk which
and C4.5 decision tree (Quinlan, 1993). The choice
make separate predictions P1, …, Pk. The final prediction
Pf is a combination (average for regression, majority of logistic regression is motivated by the fact that it
voting for classification) of all the predictions. is the standard classification method used in clinical
trial studies. As for decision tree, it gives a good
2.2.3 Evaluation Criteria diagrammatic representation of the prediction
process as well as proving to be empirically
To evaluate the performance of the regression successful in classification tasks.
models, we examine the degree of similarity The other classification method in this study is
between the actual values of the target attribute, and actually one that uses the results of the regression
the predicted values returned by the models. To method involving bagging and model trees. Once a
assess how well the models will generalize to an numeric prediction is obtained from the regression
independent dataset, 10-fold cross validation is used method, we round it to the nearest integer and assign
(Kohavi, 1995). The degree of similarity between the instance to the class corresponding to that
the actual and predicted values is checked via three integer. We denote this approach here as
criteria: the Pearson correlation coefficient, mean classification via regression.
absolute error and root mean squared error. The evaluation criterion for the classification
The Pearson correlation coefficient, R, is a algorithms used in this study is accuracy – the
measure of the linear dependence between X = percentage of cases where the actual and the
{X1,…,Xn} and Z = {Z1,…,Zn}. It gives a value predicted classes are the same. For the prediction of
between -1 and +1 where -1 stands for total negative mRS-90 score, however, we may consider a
correlation, 0 for no correlation and +1 for total predicted score which is close enough to the actual
positive correlation. It can be defined as follows score to be fairly accurate as well. We therefore
(Rodgers and Nicewander, 1988): define “near-accuracy” to be the percentage of cases
where the prediction is either fully correct or is
σሺܺ െ ܺതሻ ሺܼ െ ܼҧሻ incorrect by a margin of just one score, and use it as
ܴ ൌ (1)
ඥσሺܺ െ ܺതሻଶ σሺܼ െ ܼҧሻଶ an additional evaluation metric.
182
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees
attributes are all the other attributes described in frequency distribution of the error magnitude
Table 2. We construct an M5 model tree and increases, the difference between MAE and RMSE
compare its results with linear regression, the most also increases (Willmott and Matsuura, 2005). It
commonly used method for regression analysis. We therefore makes sense that a variance-reducing
then apply bootstrap aggregating (bagging) using procedure like bagging should reduce RMSE when
M5 model trees and separately linear regression applied to model trees, as observed in Table 3. Note
models as respective base predictors. For also that bagging does not have the same kind of
comparison purposes, we construct also the simple effect in improving the performance of linear
regression model whose prediction is always the regression.
average of the values of the dependent variable in To see if the improvement is statistically
the training set. significant, we perform paired t-tests in terms of
Parameter optimization is done for both model correlation coefficient on each pair of the four
tree and bagging. For M5 model trees, we methods considered. The difference between means
experiment with the minimum number of instances for each pair are examined at a p-value of 0.05. The
to allow in a leaf. It is found that having a minimum results of the tests are presented in Table 4, showing
of 10 instances in the leaf produces the best that the bagging method with M5 model trees
performing tree. Increasing this number creates performs significantly better than the other four
shorter trees that underfit the data while reducing methods on the stroke dataset.
this number creates larger trees that are prone to
overfitting. For bagging, we experiment with Table 4: Results of statistical significance analysis on
different number of iterations for bootstrapping correlation coefficient with p-value of 0.05. Each cell
(number of bags) and different bootstrap sizes. Our represents the result of the paired t-test between a pair of
conclusion is that 10 iterations with each bootstrap algorithms. If the algorithm in the row is significantly
better than the one in the column, a ‘>>’ is shown. If it is
containing the same number of instances as the
significantly worse, a ‘<<’ is shown. A ‘<->’ indicates that
training set produces the best results. there is no statistically significant difference.
Table 3 compares the results of these five
methods in terms of correlation coefficient (R), Avg Lin M5 Bagging Bagging
mean absolute error (MAE) and root mean squared Pred Reg tree Lin M5
error (RMSE). We can observe from the table that Reg trees
bagging used in tandem with M5 model trees
Avg Pred - << << << <<
performs much better than all the other techniques.
An interesting observation is that M5 model tree Lin Reg >> - <-> <-> <<
(without bagging) shows an impressive improve-
ment over linear regression in terms of mean M5 tree >> <-> - <-> <<
absolute error, but performs only slightly better in Bagging
terms of root mean squared error. Large errors have Lin >> <-> <-> - <<
a relatively greater influence when the errors are Reg
squared. So as the variance associated with the
Bagging
M5 >> >> >> >> -
Table 3: Comparison of different regression methods on trees
stroke data in terms of R, MAE and RMSE. For R, higher
values indicate better model fit, whereas for the MAE and
RMSE metrics lower values are better. 3.1.1 Observations from the M5 Model Tree
183
HEALTHINF 2017 - 10th International Conference on Health Informatics
+ 0.4281 * Diabetes
- 0.0137 * Tobacco
- 0.0057 * Antiplatelets
+ 0.0951 * mRS at discharge
- 0.3414
LM 4 (here the value of mRS at discharge is 4 or 5)
mRS 90 days =
- 0.0119 * Subtype - Large vessel
- 0.0837 * Subtype - Small vessel
- 0.0882 * Subtype - Cardio
- 0.0832 * Subtype - Crypto
- 0.0827 * Subtype - other
+ 0.1919 * NIHSS at admission
Figure 3: The M5 model tree built on the stroke dataset + 0.0438 * MRS before admission
with minimum 10 instances in each leaf. Each leaf is a + 0.2979 * Age
linear model predicting the target attribute mRS-90. The + 0.0567 * Diabetes
numbers under the leaves indicate how many instances are - 0.0351 * Tobacco
covered under that particular linear model. - 0.0057 * Antiplatelets
- 0.4463 * Neurointervention
LM 1 (here the value of mRS at discharge is 0) + 1.4419 * mRS discharge
mRS 90 days = - 3.0914
- 0.1309 * Subtype - Large Vessel
- 0.1472 * Subtype - Small Vessel From the model tree of Figure 3, it is clear that mRS
- 0.1552 * Subtype - Cardio at discharge plays the major role in deciding the
- 0.0532 * Subtype - Crypto mRS score at 90 days. The tree simply first decides
- 0.1454 * Subtype - other what the mRS discharge score is, and then builds
+ 0.064 * NIHSS at admission
linear models to predict mRS-90 for the patients
+ 0.0189 * MRS before admission
+ 0.0996 * Age with that score. By following the decision branches
+ 0.0155 * Diabetes of the tree, we can see that the linear models LM 1
- 0.0472 * Antiplatelets and LM 2 corresponds to mRS discharge scores of 0
+ 0.0534 * mRS at discharge and 1 respectively. Similarly LM 3 is associated
+ 0.1285 with mRS discharge scores of 2 and 3, and LM 4
LM 2 (here the value of mRS at discharge is 1) with scores of 4 and 5.
mRS 90 days = Looking at LM 1, we find that the y-intercept is a
0.0446 * Subtype - Large vessel very small value and there is no other attribute that
- 0.0837 * Subtype - Small vessel has a large coefficient that could change the
- 0.4857 * Subtype - Cardio prediction substantially. This means that the
- 0.6028 * Subtype - Crypto prediction for almost all patients reaching this point
- 0.0827 * Subtype - other of the tree will be close to 0. At LM 2, since the
+ 0.3298 * NIHSS at admission mRS discharge score is 1 with a coefficient of
+ 0.084 * MRS before admission
0.1265 and the y-intercept is 0.3596, the baseline
+ 0.4344 * Age
+ 0.0959 * Diabetes prediction for this leaf (if all other conditions are not
- 0.0137 * Tobacco present) is 0.4861. Older age, higher NIHSS at
+ 0.2618 * Antihypertensives admission and presence of antihypertensives
- 0.0057 * Antiplatelets contribute towards increasing the mRS-90 score. On
+ 0.1265 * mRS at discharge the other hand, cardioembolic and cryptogenic
+ 0.3596 strokes contribute significantly towards lowering the
LM 3 (here the value of mRS at discharge is 2 or 3) mRS-90 score. At LM 3, if the mRS discharge score
mRS 90 days = is 2, then the baseline prediction is 2*0.0951 –
0.3911 * Subtype - Large vessel 0.3414 = - 0.1512. If the mRS discharge = 3, it is
- 0.0837 * Subtype - Small vessel 3*0.0951 – 0.3414 = - 0.0561. However, there are
- 0.0882 * Subtype - Cardio some attributes in this model that may have a major
- 0.0832 * Subtype - Crypto impact on the final prediction, notably age, NIHSS
- 0.807 * Subtype - other at admission, diabetes, large vessel stroke subtype
+ 1.5475 * NIHSS at admission
and mRS before admission. Higher values for some
+ 0.3333 * MRS before admission
+ 1.5486 * Age
or all of the above attributes will result in increased
184
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees
mRS-90 score. For LM 4, the baseline prediction is regression, but not significantly better than the C4.5
either 2.6762 (for mRS discharge = 4) or 4.1181 (for decision tree at a level of p = 0.05.
mRS discharge = 5). If a patient reaches this leaf, the
output is likely to be quite high, since only Table 5: Comparison of logistic regression, C4.5 and
neurointervention has a major effect of lowering the classification via regression (bagging with M5 model
mRS-90 score. trees) on the stroke dataset in terms of accuracy and near-
accuracy.
3.2 Classification Models to Predict Method Accuracy Near-
mRS-90 accuracy
We now consider the mRS-90 attribute as discrete Majority class 46.9% 64.4%
(i.e., consisting of individual classes 0, 1, …, 5) Logistic Regression 54.2% 83.6%
instead of a continuous numeric attribute, and
construct classification models to predict this C4.5 (with pruning) 56.7% 86.8%
discrete attribute. We explore two main approaches Classification via regression 59.7% 90.0%
to constructing classification models: One is to apply
traditional multi-class classification techniques;
Table 6: Confusion matrix for the method of supervised
another one is to use regression followed by
classification via regression using bagging with M5 model
classification (i.e., classification via regression). For trees. The rows show the actual mRS scores while the
this experiment we choose two well-known and columns show the ones predicted by the model. The
empirically successful classification algorithms, diagonals (in bold) are the correct predictions. The cells
namely logistic regression and C4.5 decision tree. adjacent to the diagonals (in bold and italic) are near-
For classification via regression we use the bagging correct predictions missing the actual score by 1.
with M5 model tree method discussed in section 3.1,
and convert the predicted mRS-90 numeric value to Predicted
Actual
a discrete class by rounding this value to the nearest 0 1 2 3 4 5
integer between 0 and 5.
0 159 36 11 0 0 0
As a first evaluation metric, we use classification
accuracy (the percentage of correct predictions). But 1 10 40 19 8 0 0
since there are six different classes with subtle 2 2 15 31 14 1 0
variations between two adjacent mRS scores, we
3 0 8 19 21 3 0
also consider the case when the classifier makes an
error, but by only one mRS score. We define the 4 0 3 5 8 10 1
metric “near-accuracy” to refer to the percentage of 5 0 3 1 2 8 1
cases in which the classifier either makes an
accurate prediction or makes a wrong prediction Table 7: Results of statistical significance analysis on
which is either one more or one less than the correct classification accuracy with p-value of 0.05. Each cell
mRS score. represents the result of the paired t-test between a pair of
Table 5 shows a comparison of the performance algorithms. If the algorithm in the row is significantly
of classification via regression with those of multi- better than the one in the column, a ‘>>’ is shown. If it is
class classification using Logistic regression and significantly worse, a ‘<<’ is shown. A ‘<->’ indicates that
C4.5 decision trees. For comparison purposes, we there is no statistically significant difference.
include also that majority class classifier which
Majority Logistic C4.5 Classif via
classifies any test instance with the mRS-90 value
class Regression tree regression
that appears most frequently in the training set.
For C4.5 decision trees, the result of the best Majority
class
- << << <<
model after experimentation with pruning is shown.
The classification via regression method performs Logistic
better in terms of both accuracy and near-accuracy. Regression
>> - <-> <<
Table 6 shows the confusion matrix obtained by this
method. Paired t-tests are performed on the C4.5 tree >> <-> - <->
classification accuracy for the three algorithms. The Classif via
results, given in Table 7, show that classification via regression
>> >> <-> -
regression performs significantly better than logistic
185
HEALTHINF 2017 - 10th International Conference on Health Informatics
186
Predicting Outcome of Ischemic Stroke Patients using Bootstrap Aggregating with M5 Model Trees
Implications for stroke clinical trials a literature 1994. The influence of age on stroke outcome. The
review and synthesis. Stroke, 38, 1091-1096. Copenhagen Stroke Study. Stroke, 25, 808-813.
Breiman, L. 1996. Bagging predictors. Machine learning, Nogueira, R. G., Liebeskind, D. S., Sung, G., Duckwiler,
24, 123-140. G., Smith, W. S. & Multi MERCI Writing Committee
Breiman, L., Friedman, J., Stone, C. J. & Olshen, R. A. 2009. Predictors of good clinical outcomes, mortality,
1984. Classification and regression trees, CRC press. and successful revascularization in patients with acute
Brott, T., Adams, H., Olinger, C. P., Marler, J. R., Barsan, ischemic stroke undergoing thrombectomy pooled
W. G., Biller, J., Spilker, J., Holleran, R., Eberle, R. & analysis of the Mechanical Embolus Removal in
Hertzberg, V. 1989. Measurements of acute cerebral Cerebral Ischemia (MERCI) and Multi MERCI Trials.
infarction: a clinical examination scale. Stroke, 20, Stroke, 40, 3777-3783.
864-870. Quinlan, J. R. 1992. Learning with continuous classes. 5th
Brown, A. W., Therneau, T. M., Schultz, B. A., Niewczyk, Australian joint conference on artificial intelligence.
P. M. & Granger, C. V. 2015. Measure of functional Singapore.
independence dominates discharge outcome prediction Quinlan, J. R. 1993. C4. 5 Programs for Machine
after inpatient rehabilitation for stroke. Stroke, 46, Learning, San Francisco, Morgan Kauffmann.
1038-1044. Raffeld, M. R., Debette, S. & Woo, D. 2016. International
Etemad-Shahidi, A. & Mahjoobi, J. 2009. Comparison Stroke Genetics Consortium Update. Stroke, 47, 1144-
between M5ƍ model tree and neural networks for 1145.
prediction of significant wave height in Lake Superior. Rankin, J. 1957. Cerebral vascular accidents in patients
Ocean Engineering, 36, 1175-1181. over the age of 60. II. Prognosis. Scottish medical
Gialanella, B., Santoro, R. & Ferlucci, C. 2013. Predicting journal, 2, 200.
outcome after stroke: the role of basic activities of Rodgers, J. L. & Nicewander, W. A. 1988. Thirteen ways
daily living predicting outcome after stroke. European to look at the correlation coefficient. The American
journal of physical and rehabilitation medicine, 49, Statistician, 42, 59-66.
629-637. Tan, P.-N., Steinbach, M. & Kumar, V. 2005. Introduction
Hall, M., Frank, E., Holmes, G., Pfahringer, B., to data mining, Boston, Addison-Wesley.
Reutemann, P. & Witten, I. H. 2009. The WEKA data Van Swieten, J., Koudstaal, P., Visser, M., Schouten, H. &
mining software: an update. ACM SIGKDD Van Gijn, J. 1988. Interobserver agreement for the
explorations newsletter, 11, 10-18. assessment of handicap in stroke patients. Stroke, 19,
Henninger, N., Lin, E., Baker, S. P., Wakhloo, A. K., 604-607.
Takhtani, D. & Moonis, M. 2012. Leukoaraiosis Wang, Y. & Witten, I. H. 1996. Induction of model trees
predicts poor 90-day outcome after acute large for predicting continuous classes. European
cerebral artery occlusion. Cerebrovascular Diseases, Conference on Machine Learning. University of
33, 525-531. Economics, Prague.
Keith, R., Granger, C., Hamilton, B. & Sherwin, F. 1987. Willmott, C. J. & Matsuura, K. 2005. Advantages of the
The functional independence measure. Adv Clin mean absolute error (MAE) over the root mean square
Rehabil, 1, 6-18. error (RMSE) in assessing average model
Kohavi, R. 1995. A study of cross-validation and performance. Climate research, 30, 79-82.
bootstrap for accuracy estimation and model selection. Yong, M. & Kaste, M. 2008. Dynamic of hyperglycemia
IJCAI. as a predictor of stroke outcome in the ECASS-II trial.
Marini, C., De Santis, F., Sacco, S., Russo, T., Olivieri, L., Stroke, 39, 2749-2755.
Totaro, R. & Carolei, A. 2005. Contribution of atrial
fibrillation to incidence and outcome of ischemic
stroke results from a population-based study. Stroke,
36, 1115-1119.
McCullagh, P. 1980. Regression models for ordinal data.
Journal of the royal statistical society. Series B
(Methodological), 109-142.
Moonis, M., Kane, K., Schwiderski, U., Sandage, B. W. &
Fisher, M. 2005. HMG-CoA reductase inhibitors
improve acute ischemic stroke outcome. Stroke, 36,
1298-1300.
Moore, D. S. 2007. The basic practice of statistics, New
York, WH Freeman
Mozaffarian, D., Benjamin, E. J., Go, A. S., Arnett, D. K.,
Blaha, M. J., Cushman, M., Das, S. R., de Ferranti, S.,
Després, J.-P. & Fullerton, H. J. 2016. Heart Disease
and Stroke Statistics-2016 Update: A Report From the
American Heart Association. Circulation, 133, 447.
Nakayama, H., Jørgensen, H., Raaschou, H. & Olsen, T.
187
S HORT PAPERS
Sign-Lingo
Feasibility of a Serious Game for Involving Parents in the Language Development
of Their Deaf or Hearing Impaired Child
Keywords: Feasibility Study, Serious Game, Sign Language, Kinect, Language Development.
Abstract: Family involvement plays a critical factor in the language development of a deaf or hearing impaired child.
Hearing parents often have major difficulties in communicating with their child when it is deaf or hearing
impaired. These difficulties often lead to issues in the language development of the child. In this research
we investigate the feasibility of a serious game for involving parents in the language development of their
deaf or hearing impaired child by using sign language together in a fun and engaging way. From the
feasibility analysis we find that such a serious game is feasible and could help deaf and hearing impaired
children to improve their language development.
191
Schalk, I. and Spruit, M.
Sign-Lingo - Feasibility of a Serious Game for Involving Parents in the Language Development of Their Deaf or Hearing Impaired Child.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 191-198
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
In this study the initial approach was to explore The majority of deaf and hearing impaired
the field of Sign language and Serious games. From children are born to hearing parents who do not
a literature study it became clear there is a problem know how to use Sign language to communicate. As
in the language development of deaf and hearing a result, many of these children do not have full
impaired children. A feasibility study of a Serious access to language during the early years of life most
game in which Sign language is used by deaf and critical to language acquisition. Marschark (2001)
hearing impaired children to improve their language states that having parents who can sign well and who
development was then conducted. Among the read regularly with their deaf or hearing impaired
studied literature are research journals, papers and child are extremely important factors in the child’s
books about Sign language, Serious games and development of literacy skills. This statement might
studies about deaf and hearing impaired children. explain the findings of Allen (1994) who found that
In the feasibility study several models have been only 15 percent of white deaf children who
developed using the modeling tool ArchiMate graduated from high school in the United States read
(Beauvoir, 2016). above the sixth-grade level.
Akamatsu, Musselman and Zweibel (2000)
found that fewer than half of the children who use
3 CONCEPTUAL FEASIBILITY Sign language in school also sign when they are with
their families, and only a small fraction of those
children are able to carry on normal everyday
3.1 Problem Exploration conversations with their parents. Marschark (2001)
states that deaf children of hearing parents have
In their work Kyle and Woll (1988) describe that the
fewer signed or spoken labels for things around
development of language can only occur when a
them than hearing children of hearing parents, or
child is provided with input it can perceive, and
deaf children of deaf parents. Special efforts,
when the adult and the child are joint partners in
therefore, need to be made to expand the
creating communication. The importance of parent
vocabularies of deaf children of hearing parents
involvement in language learning is supported by the
through print, sign and speech.
research of Moeller (2000) in which she shows that
It is clear there is a problem in the language
family involvement plays a critical factor in the
development of deaf and hearing impaired children
language development of deaf and hearing impaired
with hearing parents. There is evidence that the
children, especially those with hearing parents.
involvement of parents plays a crucial factor in the
192
Sign-Lingo - Feasibility of a Serious Game for Involving Parents in the Language Development of Their Deaf or Hearing Impaired Child
language development of their deaf or hearing Alphabet which can be consulted by the player. This
impaired child but that this involvement is makes it easier for both the parent and child to
insufficient due to the parents’ lack in ability to continue playing even when they do not know how
communicate with their deaf or hearing impaired to make a sign.
child. For every player the number of practice games
played, practice games won and the current level are
3.2 Concept Modeling stored. The current level is an indication of the
current language level of the child. These statistics
In the previous section it has become clear there is a can be used to track the progress and target problem
problem in the language development of deaf and areas in the language development of the child.
hearing impaired children with hearing parents. In
this section a conceptual model is presented of the 3.3 Process Modeling
proposed system. This model visualizes the main
concepts of the system. The model is shown in Goldin-Meadow and Mayberry (2001) explain that
Figure 1. to teach children to read, the first step is to make
As can be seen in the model, the system contains sure they have a language - any language. In case of
nine concepts. These concepts are highlighted in a deaf or hearing impaired child this will be a Sign
blue rectangles inside the model. Within the model language. After a language has been obtained a child
we can also find red circles which represent the needs to learn the concept of mapping between the
attributes of concepts. language it knows and print. In their research
Each player has a profile in which general Padden and Ramsey (2000) identified a teaching
information of the player is stored. This information method that they call “chaining”. This method
contains the name of the player and its favorite encourages children to see the relation between print
and Sign language. Chaining consists out of four
color.
steps in which the final step is optional:
A player has the option to play practice-mode or
exam-mode. In both game modes the player needs to
guess words by using Sign language.
Practice-mode is meant to be played together by
both the parent and child. The goal of this game
mode is to facilitate family involvement in the
language development of the child. In this game
mode the player who guesses the word first wins the
game.
In their work Michael and Chen (2006) mention
the importance to measure the progress of the player
in a Serious game. The exam-mode is meant be
played by the child. The goal of this game mode is
for the child to demonstrate its acquired vocabulary
knowledge. In this game mode the child needs to
guess multiple words correctly to advance to the
next level. The difficulty of the words given in the
game modes are based on this level.
Tennant and Brown (1998) explain it helps to
fingerspell with a partner when contextual clues are
used. Therefore, when starting a game mode, the
player can select a theme. Examples of themes are
animals, sports or family. Based on the theme the
game presents words that are related to the selected
theme.
From their pilot study Lee et al. (2005) found
that the flow within a game is very important to keep
the child interested in playing. In the Sign-Lingo
game we have therefore included a sign book. This Figure 2: Chaining method.
book contains examples of all the signs of the
193
HEALTHINF 2017 - 10th International Conference on Health Informatics
Figure 3: Stakeholder’s relationships of Sign-Lingo. In the previous section the key players in the
relevant market were identified. In this section the
194
Sign-Lingo - Feasibility of a Serious Game for Involving Parents in the Language Development of Their Deaf or Hearing Impaired Child
user roles are identified, and the attitudes towards out to families who could benefit from the Sign-
the newly proposed system are explored. Lingo system there are several options to consider.
Through the literature review several methods One option is to promote the system through digital
were identified which are used to help children learn channels such as application platforms like the
to develop their language. It also became clear Microsoft Store. Another option is to promote the
parent involvement plays a crucial role in the system through other channels such as elementary
language development of a child. schools for the deaf and hard hearing.
Figure 4 presents the organizational model of the All partners have different objectives regarding
Sign-Lingo system. The large rectangles represent Sign-Lingo. For example in case of the Microsoft
the architectural layers on top of which the Sign- Store the partner’s interests are clearly commercial.
Lingo system is designed. The yellow rectangles In the case of elementary schools the interest is
represent all the stakeholders and their roles. educational. The system will most likely need to
From the model it becomes clear the Sign-Lingo have some relationship with the school’s curriculum
system is developed using the Microsoft Kinect in order for the school to be willing to promote it.
SDK. The system is used by the parent and child Two different development strategies were
who both have the role of user. It also becomes clear created. These strategies can be run independently
from the model that the developer needs to from each other. Below follows an overview of the
implement hand gesture recognition rules into the two strategies.
system. In addition to that, these hand gesture 1. Digital-channel strategy; the software is
recognition rules are tested by a Sign language promoted on application platforms such as
expert to validate whether the Sign language the Microsoft Store. In exchange for this
recognition part of the system performs as expected. promotion Microsoft wants a percentage of
Finally, teachers of elementary schools have the role the selling price for every sold product. In
as a promoter. Their task is to introduce the system addition to that a website is made for the
to families with deaf or hearing impaired children. Sign-Lingo system which explains how the
system works and where the system can also
be bought (e.g. Abdat, Spruit and Bos,
5 ECONOMIC FEASIBILITY 2011).
2. Physical-channel strategy; the software is
promoted through elementary schools.
5.1 Development Strategy
These schools are contacted initially through
In the previous section the market in which the Sign-
Lingo system operates was investigated. To reach
195
HEALTHINF 2017 - 10th International Conference on Health Informatics
196
Sign-Lingo - Feasibility of a Serious Game for Involving Parents in the Language Development of Their Deaf or Hearing Impaired Child
197
HEALTHINF 2017 - 10th International Conference on Health Informatics
help these children to improve their language Heeringa, W., Nerbonne, J., Bezooijen, R. van, & Spruit,
development. The chaining method which is used to M. (2007). [Geography and inhabitant numbers as
help a child to improve its language is well suited to clarifying factors of variation in the Dutch dialect
region]. Tijdschrift voor Nederlandse taal- en
be incorporated in this Serious game.
letterkunde, 123(1), Kwantitatieve benaderingen in de
In future research the proposed system could be taal- en letterkunde, 70–82.
implemented and then tested in a case study with a Kyle, J. G., Woll, B., & Pullen, G. (1988). Sign language:
sample group. In this case study the language level The study of deaf people and their language.
of deaf and hearing impaired children who use the Cambridge University Press.
system could be compared with the language level Lee, S., Henderson, V., Brashear, H., Starner, T.,
of deaf and hearing impaired children who do not Hamilton, S., & Hamilton, H. (2005). User-centered
use the system to see what the effect of the game is development of a gesture-based American Sign
on the language level of a child. Language game. In Proceedings of instructional
technology and education of the deaf symposium.
Finally, we aim to incorporate the lessons NTID, Rochester, NY.
learned into follow-up research on the feasibility of Marschark, M. (2001). Language Development in
Serious games for medication adherence in children Children Who are Deaf: A Research Synthesis.
and quality of care in long-term care (e.g. Spruit, FORUM publications.
Vroon and Batenburg, 2014). Meulendijk, M., Drenth-van Maanen, A., Jansen, P.,
Brinkkemper,, S., Numans, M. and Spruit, M. (2013).
Introducing the CORETEST feasibility analysis in
medical informatics: a case study of a decision-
REFERENCES supportive knowledge system in the Dutch primary
care sector. In Miranda, I., Cruz-Cunha, M., &
Aarnoutse, F., Renes, C., Batenburg, R., & Spruit, M. Gonçalves, P. (Eds.), Handbook of Research on ICTs
(2016). STRIPA: The potential usefulness of a medical for Healthcare and Social Services: Developments and
app. In Gasmelseid,T. (Ed.), Advancing Applications, pp. 1066–1087, IGI Global.
Pharmaceutical Processes and Tools for Improved Michael, D. and Chen, S. (2006). Serious games. Boston,
Health Outcomes (pp. 114–135). IGI Global. MA: Thomson Course Technology PTR.
Abdat, N., Spruit, M., & Bos, M. (2011). Software as a Moeller, M. P. (2000). Early intervention and language
Service and the Pricing Strategy for Vendors. In development in children who are deaf and hard of
Strader,T. (Ed.), Digital Product Management, hearing. Pediatrics, 106(3), e43-e43.
Technology and Practice: Interdisciplinary NIDCD (2016). Quick Statistics [NIDCD Health
Perspectives, Advances in E-Business Research Information]. Retrieved 7 February 2016, from
(AEBR) Book Series (pp. 154–192). IGI Global. http://www.nidcd.nih.gov/health/statistics/pages/quick.
Akamatsu, C. T., Musselman, C., & Zwiebel, A. (2000). aspx.
Nature versus nurture in the development of cognition Padden, C., & Ramsey, C. (2000). American Sign
in deaf people. The deaf child in the family and at Language and reading ability in deaf
school: Essays in honor of Kathryn P. Meadow- children. Language acquisition by eye, 1, 65-89.
Orlans, 255-273. Sarma܈ik, G., Serbetcioglu, B., & Kut, A. (2009)
Allen, T. E. (1994). Who are the deaf and hard-of-hearing Computer Aided Education and Training Tool for
students leaving high school and entering Hearing Impaired Children: AURIS.
postsecondary education. A Comprehensive Sørensen, B. H., & Meyer, B. (2007). Serious Games in
Evaluation of the Postsecondary Educational language learning and teaching–a theoretical
Opportunities for Students who are Deaf or Hard of perspective. In Proceedings of the 3rd international
Hearing, funded by the US Office of Special Education conference of the digital games research
and Rehabilitative Services. Gallaudet University. association (pp. 559-566).
Beauvoir, P. (2016). Archi | Free ArchiMate Modelling Spruit, M., Vroon, R., & Batenburg, R. (2014). Towards
Tool. [online] Archimatetool.com. Available at: healthcare business intelligence in long-term care: an
http://www.archimatetool.com/ [Accessed 29 Nov. explorative case study in the Netherlands. Computers
2016]. in Human Behavior, 30, 698–707.
Escudeiro, P., Escudeiro, N., Reis, R., Baltazar, A. B., Tennant, R. A., & Brown, M. G. (1998). The American
Rodrigues, P., Lopes, J., ... & Bidarra, J. (2015). A sign language handshape dictionary. Gallaudet
kinect game in the VirtualSign project: training and University Press.
learning with gestures. In ARTECH 2015: 7th Vleugel, A., Spruit, M., & Daal, A. van (2010). Historical
International Conference on Digital Arts. Artech data analysis through data mining from an outsourcing
International. perspective: the three-phases method. International
Fisher, J., Ellis, K., Willoughby, L., & Barca, J. (2014). Journal of Business Intelligence Research, 1(3), 42–
Taking a User Centred Design Approach for Designing a 65.
System to Teach Sign Language. ACIS. Wilson, C. (2013). Portable Game Based Instruction of
Goldin-Meadow, S. and Mayberry, R. (2001). How Do American Sign Language.
Profoundly Deaf Children Learn to Read? Learning
Disabilities Research and Practice, 16(4), pp.222-229.
198
Time Synchronization in Emergency Response Time Measurement
jordan.srour@lau.edu.lb, nabil.badr@alumni.grenoble-em.com
Keywords: Emergency Medical Dispatch Systems, Computer Aided Dispatch, Emergency Response Times, Time Data,
Time Synchronization.
Abstract: Emergency response time reporting requires data provided by multiple systems. Whenever more than one
system produces a time stamp, issues of time synchronization across systems manifest. As emergency response
time targets are often short (8 minutes or less) and critical to public perceptions of service, errors in reporting
these times are unacceptable. This article seeks to quantify the probability and magnitude of such errors
through an empirical study of one emergency medical dispatch system.
199
Srour, F. and Badr, N.
Time Synchronization in Emergency Response Time Measurement.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 199-204
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
system by using a regional computer-aided dispatch As response time is ultimately the difference between
(CAD) system and a fixed definition of response time two time stamps, being able to make that subtrac-
as the time from agency dispatch until arrival on scene tion accurately and correctly is important. This cal-
(EMS World, 2015). This implies that the two requi- culation is generally performed outside of the ICT or
site time stamps recorded by the CAD are considered EMD system. Nevertheless, the analytics tools that
completely accurate. While there is some basis for take possession of the data in order to produce the re-
this assumption of accuracy as reported in a 1997 arti- sponse time performance indicators should use state
cle on measuring response intervals in a 911 dispatch of the art time calculation protocols such as those rec-
system, current time format standards have changed ommended with the lubridate package of the soft-
since that time (Campbell et al., 1997). ware R (R Core Team, 2016; Grolemund and Wick-
The International Organization for Standardiza- ham, 2011).
tion’s standard ISO 8601 specifies a complete set of Regardless of the time stamp format used, the re-
date and time formats (ISO, 2004). This standard sulting response time calculation will only be as ac-
is based on the Gregorian calendar and is flexible in curate as the time stamps themselves. Even when
that it allows one to represent time as both calendar initially set accurately, real clocks will differ after
dates and as ordinal dates. The standard also speci- some amount of time due to clock drift or skew,
fies a representation protocol for time zones – again caused by clocks counting time at slightly different
with flexibility as one can specify local time, univer- rates. Thus, clock skew in a distributed system must
sal time, or an offset from universal time. Finally, realize the same global time. Clock or time syn-
ISO 8601 allows for the representation of time inter- chronization is a central topic in computer science
vals as well. Of course, any standard as flexible as the and engineering that aims to coordinate otherwise in-
ISO 8601 can also lead to complexity when used in dependent clocks (Cristian, 1989) especially in dis-
specific settings. To that end, the Internet Engineer- tributed systems (Lamport, 1978). The oldest proto-
ing Task Force approved RFC 3339 which simplifies col for time synchronization in a network is the Net-
time stamp notation for Internet use limiting the for- work Time Protocol (NTP) which has been under con-
mat to yyyy-mm-ddThh:mm:ssZ or +/-hh:mm, where tinual development and updating since 1979 (Mills
y stands for year, m for month, d for day, T is a char- et al., 2010). The NTP works based on a hierarchical,
acter separating date from time, h stands for hour, m peer-to-peer structure of computers and servers orga-
for minutes, and s for seconds; the Z is for universal nized into strata with the top level strata containing
(or Zulu) time or one can specify an offset from uni- a set of high-precision reference clocks. In contrast,
versal time (Klyne and Newman, 2002). The World the Institute for Electrical and Electronics Engineers
Wide Web Consortium adopts a similar standard for also specifies a time synchronization protocol for net-
web-based time and date stamps (W3C, 1997). worked measurement and control systems. Specifi-
cally, the Precision Time Protocol, encapsulated in
With regards to EMD, the critical elements to the
standard, IEEE 1588, operates using a master-slave
time stamp standards noted above are the clear use
framework with corrections for both clock offsets and
of the yyyy-mm-dd protocol for dates. If one ICT
network delays (IEEE, 2008). To ensure the integrity
within a system uses the American style yyyy-dd-mm
of time stamps within EMD systems, synchronizing
format while another uses the yyyy-mm-dd protocol,
all computers to the same clocks using the same syn-
then 12 days out of the year would yield reasonable
chronization protocols is a must.
but incorrect time intervals and an additional 11 days
The remainder of this paper uses a prototype EMD
worth of data out of every month would yield illogi-
system to understand the extent of time synchroniza-
cally long intervals. Furthermore, specifying the time
tion related data corruption on response time data
zone is also important in emergency medical services
when only limited synchronization protocols are im-
as changes between daylight savings time and stan-
plemented.
dard time will influence the calculation of time inter-
vals that span such clock changes. If the components
of an EMD system are located in different time zones
(eg. a remote server is used to capture and time stamp 3 CASE STUDY SYSTEM
records), then having the ability to bring all times into
one zone for time calculations is critical. To achieve time synchronization over the network,
Due to the relative nature of time intervals (eg. a our case used the NTP. As a time source, the Global
year may be 365 or 366 days depending on a leap Positioning System (GPS) is used for central clock
year), the ability to accurately perform time related synchronization. Although GPS time signals are ac-
arithmetic is more complex than one might expect. curate, clock skew still introduces time stamp issues
200
Time Synchronization in Emergency Response Time Measurement
201
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Time Synchronization and Flow of Time Stamps in Case Study System.
Component Time Reference Time Stamp
NTP Server Time Source (GPS) tS1
Database Server NTP Server tS2
Application Server NTP Server tS3
Workstation Session Time Stamp Application Server t set to tS3; reset at login
Database Key Record Time Stamp Database Server tR1 = tS2 at initiation of the call; ie.
when the user creates the record
Time Stamp of Remaining Records Workstation Time tRn = t* based on workstation’s cur-
Related to the Initial Key Record rent time
nization errors were identified on the basis of nega- Table 2: Percent of records with negative time intervals by
tive time progressions when moving logically through time stamp type.
the data. For example, if the time stamp associated Time Interval Percent of Records
with the mission being scheduled was before the time with Negative Time
stamp associated with the creation of the record, then Created to Scheduled 89.04
the difference between these two time stamps would Scheduled to Departure 1.81
yield negative time. Negative time intervals were con- Departure to Arrival at 0.77
sidered to be a function of time synchronization is- Case
sues. Had these errors been ignored then the average Time on Scene 0.57
response time would be incorrectly reduced. Alter- Time to Destination 0.48
natively, if the negative intervals were accommodated Time at Destination 0.39
in absolute terms, the impact on the average response
Time from Mission 1.05
time would likely show an inconsistent bias.
Complete to Unit
Of the 24,391 records, the vast majority of nega- Available
tive time intervals (21,716 records) occurred relative Time from Unit Avail- 0.56
to the mission scheduled and created on records; the able to At Station
scheduled to departure interval had only 442 time syn-
chronization errors; and the departure to arrival on
scene interval had 187 time synchronization errors. tervals, respectively.
The percent of negative time interval records appor-
tioned by time interval type can be seen in Table 2.
While a time synchronization error rate of nearly 90% 5 CONCLUSIONS
for the first interval of the response time period may
seem shocking, it is logical as the created on time The issue of proper handling of time related data is
stamp is generated by the call center server while the significant in the management of an information sys-
remaining time stamps are generated on the worksta- tem. The issue becomes even more significant when
tion terminals. It is these ICT component links that the time data is intended for use in time critical set-
are most prone to time synchronization issues. tings such as EMD services. This paper serves to
Having identified the intervals with time synchro- highlight the potential magnitude of time synchro-
nization issues, we turn to the magnitude of those nization errors within a prototype EMD system.
errors. Table 3 provides a summary of the mean, A straight forward solution to this issue has not
standard deviation, minimum, maximum, and first yet been devised. Some initiatives have tackled algo-
through third quartiles for the time synchronization rithms that may reduce clock skew (Gusella and Zatti,
errors in seconds. The data exhibits an extreme range 1989). Other methods impose requirements of mini-
within all time intervals. The maximum value within mal delays on the network and are not suitable for dis-
the created to scheduled interval reflects an error of tributed VPN based environments (Rentel and Kunz,
24 hours. This is likely due to poor synchronization 2005). “Skewless” clock synchronization is still a fa-
between computers at the moment of the change from vored research subject, but unfortunately without any
standard time to daylight savings time. Despite the real field implementations in the context of distributed
extreme tail within the distribution of time synchro- networks (Mallada et al., 2015). To date, the usage
nization errors, 75% of all errors are less than 106, 70, of internet based time synchronization has prevailed
and 70 seconds for the created to scheduled, sched- (Sherman and Levine, 2016). Ultimately the daunt-
uled to departure, and departure to arrival at case in- ing task of keeping track of the cause-effect relations
202
Time Synchronization in Emergency Response Time Measurement
Table 4: Summary of errors found in study – their sources and recommended solutions.
Source of Error Error Recommendation
Human Inconsistent time formats Time formats should be decided on
prior to implementation and used
consistently in both time stamping
and data extraction scripts.
Human Time rounding Rounding of seconds should never
be done in a time critical environ-
ment.
Human Adherence to time synchronization Establish work checklists that en-
protocols sure regular checking and synchro-
nization of clocks.
Design Large intervals between synchro- Time synchronization should be in-
nization lead to significant clock voked every five minutes as opposed
drift to every 24 hours.
Design VPNs over long distances can intro- Components of an EMD system
duce clock drift as a result of latency should be co-located on a fast local
network.
System Misuse of time formats Ensure that all computers are set
to produce time stamps follow-
ing standard protocols: yyyy-mm-
ddThh:mm:ss+/-hh:mm
System Mishandling of time changes due to Ensure that the offset from universal
inter-location differences, daylight time is properly set and maintained
savings time regulations, and leap across all system components.
years
among different data manipulations continues to oc- Furthermore, the results are based on a system for
cupy engineers and scientists who seek to develop a which limited time synchronization was performed in
way to increase the accuracy of time tracking in dis- order to yield a worst case analysis scenario. Future
tributed systems (Bravo et al., 2015). work includes studying the same system after the rec-
At a minimum, a set of primary recommendations ommendations noted in Table 4 have been adopted.
for EMD systems emerge from this research. A sum- Subsequent studies should also seek to sample from
mary of the time related errors encountered in this multiple dispatch systems in operation with different
research and the corresponding recommendations are configurations in order to determine a realistic range
listed in Table 4. These recommendations are critical of potential time related errors.
as many response time targets are on the order of sec-
onds, but time synchronization related problems can
yield errors that are on the order of minutes. ACKNOWLEDGEMENTS
This study is not without limitations. The time
synchronization errors studied in this paper were The authors gratefully acknowledge the Lebanese
found by identifying time intervals with “negative” Red Cross for their interpretation of and comments
time. Thus, the errors reported here potentially re- on the findings in this paper.
flect only half of the errors actually present in the data.
Unfortunately, it is impossible to identify time inter-
val related errors when the intervals reflect a logical
progression within time.
203
HEALTHINF 2017 - 10th International Conference on Health Informatics
REFERENCES Pons, P. T., Haukoos, J. S., Bludworth, W., Cribley, T., Pons,
K. A., and Markovchick, V. J. (2005). Paramedic re-
Blackwell, T. H., Kline, J. A., Willis, J. J., and Hicks, G. M. sponse time: does it affect patient survival? Academic
(2009). Lack of association between prehospital re- Emergency Medicine, 12(7):594–600.
sponse times and patient outcomes. Prehospital Emer- Pons, P. T. and Markovchick, V. J. (2002). Eight minutes
gency Care, 13(4):444–450. or less: does the ambulance response time guideline
Bravo, M., Diegues, N., Zeng, J., Romano, P., and Ro- impact trauma patient outcome? The Journal of emer-
drigues, L. E. (2015). On the use of clocks to en- gency medicine, 23(1):43–48.
force consistency in the cloud. IEEE Data Eng. Bull., R Core Team (2016). R: A Language and Environment for
38(1):18–31. Statistical Computing. R Foundation for Statistical
Campbell, J. P., Gridley, T. S., and Muelleman, R. L. (1997). Computing, Vienna, Austria.
Measuring response intervals in a system with a 911 Rentel, C. H. and Kunz, T. (2005). A clock-sampling mu-
primary and an emergency medical services secondary tual network time-synchronization algorithm for wire-
public safety answering point. Annals of Emergency less ad hoc networks. In IEEE Wireless Communi-
Medicine, 29(4):492 – 496. cations and Networking Conference, 2005, volume 1,
Clark County, IN, USA (2014). pages 638–644. IEEE.
Public safety plan ordinance. Sherman, J. A. and Levine, J. (2016). Usage analysis of
http://www.clarkhealth.net/pdf/public safety plan the nist internet time service. Journal of Research of
ordinance adopted 1-2014.pdf. the National Institute of Standards and Technology,
Cristian, F. (1989). Probabilistic clock synchronization. 121:33.
Distributed Computing, 3(3):146–158. The Capital Region of Denmark
EMS World (2015). Should response (2016). Ambulance response times.
time be a performance indicator? https://www.regionh.dk/english/Healthcare-
http://www.emsworld.com/article/12071652/response- Services/Emergency-Medical-Services/Copenhagen-
time-expert-opinions. Emergency-medical-services/Pages/Ambulance-
Grolemund, G. and Wickham, H. (2011). Dates and times response-times.aspx.
made easy with lubridate. Journal of Statistical Soft- W3C (1997). Date and time formats. Standard, World Wide
ware, 40(3):1–25. Web Consortium.
Gusella, R. and Zatti, S. (1989). The accuracy of the clock Wankhade, P. (2011). Performance measurement and the
synchronization achieved by tempo in berkeley unix uk emergency ambulance service: Unintended con-
4.3bsd. IEEE Trans. Softw. Eng., 15(7):847–853. sequences of the ambulance response time targets.
IEEE (2008). 1588-2008 - ieee standard for a precision International Journal of Public Sector Management,
clock synchronization protocol for networked mea- 24(5):384–402.
surement and control systems. Standard ieee 1588, Wilde, E. T. (2013). Do emergency medical system re-
Institute for Electrical and Electronics Engineers. sponse times matter for health outcomes? Health eco-
ISO (2004). Data elements and interchange formats – in- nomics, 22(7):790–806.
formation interchange – representation of dates and
times. Standard ISO 8601:2004(E) 01.140.03, In-
ternational Organization for Standardization, Geneva,
Switzerland.
Klyne, G. and Newman, C. (2002). Date and time on the
internet: Timestamps. Standard rfc 3339, Internet En-
gineering Taskforce.
Lamport, L. (1978). Time, clocks, and the ordering
of events in a distributed system. Commun. ACM,
21(7):558–565.
Mallada, E., Meng, X., Hack, M., Zhang, L., and Tang,
A. (2015). Skewless network clock synchronization
without discontinuity: Convergence and performance.
IEEE/ACM Transactions on Networking, 23(5):1619–
1633.
Manitoba Canada (2016). Statisti-
cal and response time information.
http://www.gov.mb.ca/health/ems/stats.html.
Mills, D., Martin, J., Burbank, J., and Kasch, W. (2010).
Network time protocol version 4: Protocal and algo-
rithms specification. Standard rfc 5905, Internet En-
gineering Taskforce.
New South Wales Government (2016). Response
times. http://www.ambulance.nsw.gov.au/Our-
Performance/response-times.html.
204
ICT and Ageing in Lebanese Public Hospitals
A Resource based View Perspective on Capabilities
Abstract: This paper looks into the Lebanese healthcare system and its readiness to care for a growing elderly population
and how ICT is used and how it is perceived by the stakeholders. The paper presents concerns on ageing
population in Lebanon. It first addresses the status of hospital infrastructure in the country, and then discusses
some interviews regarding ICT plans with six general managers of large public hospitals in different regions
of Lebanon.
205
Badr, N., Chedrawi, C. and Arida, J.
ICT and Ageing in Lebanese Public Hospitals - A Resource based View Perspective on Capabilities.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 205-212
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
of Lebanese public hospital organizations. communication (Cimino et al, 2002), however might
Furthermore, rather than financial performance, have impacted aspects of physician - patient
healthcare capabilities towards the aging are communication (Makoul et al, 2001). Poissant et al
considered. (2005) found that the use of bedside terminals and
Literature on RBV links firm capability and central station desktops saved nurses around 25% of
performance to its ability to use its tangible and their overall time spent documenting during a shift.
intangible resources (Eisenhardt and Martin, 2000). That was encouraging. However, the authors found
Originally developed in private sector firms conflicting evidence supporting undesirable
(Wernerfelt, 1984), RBV theory argues that firms outcomes: bedside or point-of-care systems increased
with different resource profiles and capabilities documentation time of physicians by 17.5%. Early
exhibit different performance levels. Thus, the empirical data on cost reductions was not very
effective use of these resources yields ‘core consistent (Hillestad, et al, 2005). This could have
competences’. Core competences are key internal been be due to the variability of the health IT systems
resources, which, when effectively developed and in their features and implementations (Chaudhry, et
exploited into dynamic capabilities (Teece et al, al, 2006). Later on, as technology advances were
1997), allow organizations to perform. These introduced, the benefits of computerized physician
resources in healthcare could be human, such as order entry systems CPOE were reported (Khajouei
nursing staff for example, financial and infrastructure et al, 2011). More recent studies show measurable
such as number of beds, etc. and information benefits emerging from the adoption of health
technology. Further, the “level of resource information technology; these benefits range from
constraint” in a public hospital setting may mimic efficiency and effectiveness of care (McCarthy,
“market volatility” in the private sector. 2009), provider and patient satisfaction, preventive
care for chronic diseases (Wildevuur and Simonse,
2.1 ICT for Health in an Ageing 2015) and patient safety (Buntin et al, 2011)
Society especially in developing countries where health
resources are scarce (Marful et al, 2015).
New advances in technology make it possible to
integrate previously disparate facility systems to form 2.2 Obstacles to Public Healthcare ICT
an “intelligent” hospital infrastructure (Blumenthal in Developing Countries
and Glaser, 2007). A plethora of applications
generically referred to as ‘telemedicine’ (e.g. video Since the turn of the century, public authorities have
chat, mobile devices, and internet connected medical been encouraging healthcare organizations to adopt
monitors) is expected to extend the provider - patient new techniques and systems in order to deliver
relationship boundary to remote areas positively services of high quality and low cost (Naranjo-Gil,
impacting healthcare for the ageing in developing 2009), especially where adoption of innovations tends
countries (Lucas, 2008). Assistive technologies have to be slow and fragmented (Fagerberg et al., 2005). In
been proposed to overcome elderly problems such as the public healthcare context, legislation and donor
fall risk, chronic disease, dementia, social isolation, support are fundamental to the rise of propensity and
and poor medication management, etc. ICT is one of ability to adopt ICT into Healthcare even in its basic
these technologies along with robotics and capacities (Oak, 2007). In developing countries,
gamification (Khosravi and Ghapanchi, 2015). studies underscore the possibility of impact on the
In general, there is evidence of benefit to society cost of care as hindering the adoption of ICT into
healthcare and patient care from access to healthcare practice (Panir, 2011), extending beyond
Information and Communication Technologies (ICT) initial implementation over the full life-cycle of
infrastructure, such as communication and systems operating and maintaining these systems (Cohen et al,
for data interchange (Anwar et al, 2011), or online 2015). Cost of acquisition and maintenance and the
health information tools (Bolle, et al, 2015) with a lack of ICT skills have been known to present a
keen emphasis on integrated care for the ageing significant barrier to implementation of ICT into
(Merino et al, 2015). Progress in the field of health hospitals of developing countries. Lack of skilled
information systems is rather directly correlated with resources (Bing-Jonsson, et al, 2015) and the
more quality and efficiency of care, where ‘‘with deficiency in ICT infrastructure hinder the
more efficiency of care’’ may in future mean that care capabilities of developing countries to acquire and
will remain affordable (Haux, 2006). Patient access to develop electronic medical records for instance
electronic medical records improved patient (Anwar et al, 2011). Physicians may perceive a loss
206
ICT and Ageing in Lebanese Public Hospitals - A Resource based View Perspective on Capabilities
of professional autonomy (Esmaeilzadeh et al., 2015) Lebanon continue to rely on their relatives for
and English literacy and education levels could curb healthcare. The transition from large extended
the intention to use (Hasanain et al., 2015). The families to small nuclear ones, accompanied with
increasing familiarity of a new generations of high rates of emigration among young Lebanese, an
healthcare practitioners is likely to lessen adoption increased entry of women into the labor force have
issues (Hennington and Janz, 2007). Thus, created a relative shortage in family members
organizational barriers to ICT adoption in healthcare available for the provision of care (Sibai and Kronfol
have been recognized in the form of structure, 2011). Concerns are growing about providing the
policies, incentives and decision processes (Lluch, elderly with a better quality of life (Silbermann et al.,
2011). 2015).
Table 1: Public hospitals capacity overview in relationship with the elderly in each region. Source: CAS, 2007 (The National
Survey of Household Living Conditions), and MOPH 2011.
Mount North South
Region Beirut Bekaa Nabatieh Total
Lebanon Lebanon Lebanon
Number of public
2 5 6 5 7 3 28
hospitals
Number of beds
595 430 470 365 455 235 2,550
in public Hospitals
Elderly population (% of 36,156 50,311 145,558 26,033 (7 77,281 42,131 377,4
population in region) (10%) (13%) (39%) %) (21%) (11%) 70
207
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 2: Summary of empirical data (last column indicates hospital’s stated readiness to face the needs of an aging
population).
Hospital Patients 65+ Occupancy ratios Major ailments treated Ready?
H1 50 % 90 + % Heart failure Yes
H2 55 % 85 + % Heart failure, chronic disease (Diabetes, etc.) No
H3 70 % 90 + % Heart failure and obesity No
H4 65 % 80 + % Heart failure Yes
H5 70 % 80 + % Heart failure No
H6 50 % 90 + % Prostate issues, broken hips, obesity, chronic diseases No
208
ICT and Ageing in Lebanese Public Hospitals - A Resource based View Perspective on Capabilities
4.2 ICT’s Role in the Enablement of H3, H4, & H5); and (3) improve interdepartmental
Care for the Ageing collaboration / Emergency services (H6).
For all 6 hospitals surveyed, the adoption of the
The general manager of H6 gives a pertinent information system is of top importance. “The
summary on the perceived role of ICT in Lebanese adoption of the information system is prominent
Public hospitals: “Today there is a greater need than practice for today’s hospital, in the use of equipment,
ever to leverage technology to improve health, quality archive, and for more efficient medical results” states
of life, and social connectivity for older adults, and the GM of H1 at the first stages of the interview. All
assist in clinical care and monitoring of more hospitals have described their adoption of the Health
impaired older adults. A variety of technology IS system in advanced stage (Table 3). This is quite
solutions (such as Web-based applications, remote an achievement considering that all these public
sensing technologies, electronic health records and hospitals stated that they rely on self-funded
other devices) support patient engagement. The initiatives. Nurses and doctors document patient’s
impact of ICT is indirect and is contingent on the vital signs in the system, physician prescription
redesign of practices and structures also outside history are tracked by the system, and PACS systems
health care. Improvements will only be realized if all are connected to the online medical history. (PACS is
parties involved can coordinate their efforts to take the acronym for picture archive and communication
advantage of new technology.” system, a computer network for digitized radiologic
Elderly care is demanding, hospitals must have images and reports).
the resources to act quickly and effectively with a Ultimately, addressing medical research
solid decision support system in order to minimize advancement benefits, the GM of H1 stressed that
errors and offer quality of care for the elderly (Smith “better access to data that can be studied and help to
et al, 2006). In addition to a trained and experienced get better solutions to face the ageing society”. ICT
staff in the needs of the ageing, “a solid database to has become necessary to manage routine function up
follow up each case is required in order to find the close, and monitor vital signs measurements and
appropriate solution” (H2). The GM of H4 indicated control the administration and recording of
that they have installed “24/7 monitoring systems of medications (type, dose & time). Agreeing, three
health and activities, intelligent devices and other hospitals (H3, H4, H5) pointed out that “ICT in
appliances, internet enabled services, predictive the form of an integrated information database aims
behaviour models, and so on” in order to provide a at disease management to help improve the
better quality of care for their elderly patients”. Such awareness and preventive care in the elderly patient
innovations in stationary and mobile solutions would population”. Furthermore, the case summaries
allow practitioners to stay in continuous contact, emphasized the role of the hospital senior
whether at the patient’s bedside, in examination management in encouraging adoption. “It was my
rooms, or in emergency treatment centers, to responsibility to oversee the implementation of the
effectively develop and deliver patient assessments, new system and to follow it up step by step with the
and make more informed care decisions based on different actors in order to achieve the results
collaborative treatment plans. This findings aligns needed.” Adds the GM of H3.
with the works of Lucas (2008) and Anwar et al. The Lebanese government did not engage with
(2011). any of the 6 hospitals in the decision to adopt their
It is expected that such ICT technologies would HIS, such decision was taken by the board of
(1) Reduce the time of treatments (H1); (2) provide directors of each hospital independently.
better access to data for enhanced decision making,
preventive care and disease management (H1, H2,
Table 3: Level of HIS use in the hospital (Y= in use at the moment; Y*=Incomplete, but in process).
Level of Use (based on the HIMMS Model for EMR adoption maturity) H1 H2 H3 H4 H5 H6
Nurses / doctors enter patient’s vital signs in the system Y Y Y Y Y Y
Physician prescription history tracked by the system Y Y Y Y* Y Y
PACS systems connected to online medical history Y Y* Y Y Y Y
Online medical history Y Y Y* Y Y Y
Automated pharmacy, laboratory, and radiology Y* Y Y Y* Y Y*
209
HEALTHINF 2017 - 10th International Conference on Health Informatics
210
ICT and Ageing in Lebanese Public Hospitals - A Resource based View Perspective on Capabilities
211
HEALTHINF 2017 - 10th International Conference on Health Informatics
Haux, R., Health information systems, past, present, future. February 15, 2011. Journal of Health Informatics in
Int J Med Inform, 2006, 75, 268—281. Developing Countries.
Hennington, A. and Janz, B. D., 2007 "Information Systems Quivy R., Van Campenhoudt L., 1995, Manuel de
and Healthcare XVI: Physician Adoption of Electronic rechercheen sciences sociales, Dunod.
Medical Records: Applying the UTAUT Model in a Qureshi, N. A., Kundi, G. M., Qureshi, Q. A., Akhtar, R.,
Healthcare Context," Comm. of the AIS: Vol. 19, 5. Hussain, L., 2015. An investigation Into the Adoption
Hillestad, R. et al, 2005 Health Information Technology: and Use Issues of E-Health in Public Sector Hospitals
Can HIT Lower Costs and Improve Quality? Santa of Developing Countries. Mediterranean Journal of
Monica, CA: RAND Corporation, 2005. Medical Sciences, 2, 1.
HIMSS EMR Adoption Model - HIMSS Analytics. Rosenberg Hansen J, Ferlie E., 2014 Applying strategic
Khajouei, R., Wierenga, P. C., Hasman, A., & Jaspers, M. management theories in public sector organizations:
W. (2011). Clinicians satisfaction with CPOE ease of Developing a Typology. Public Management Review
use and effect on clinicians' workflow, efficiency and 2014. Sep17.
medication safety. Int J Med Inform, 80(5), 297-309. Saxena, P., 2008. Ageing and age-structural transition in the
Khosravi, P., and Ghapanchi, A. H., 2015. Investigating the Arab countries: Regional variations, socioeconomic
effectiveness of technologies applied to assist seniors: consequences and social security. Genus, 64, 37–74.
A systematic literature review. Int J Med Inform. Shahin, A., Moudani, W., Chakik, F., Khalil, M., 2014,
Kronfol, N., 2006, “Rebuilding of the Lebanese health care April. Data mining in healthcare information systems:
system: health sector reforms”, Eastern Mediterranean Case studies in Northern Lebanon. In e-Technologies
Healh Journal, vol 12, pp 459-73. and Networks for Development, ICeND, 2014 Third
Lluch, M., 2011. Healthcare professionals’ organisational International Conference on , pp. 151-155 . IEEE.
barriers to health information technologies. A literature Sibai AM, Rizk A, Kronfol NM. , 2014. Ageing in the Arab
review. Int J Med Inform, 80, 12, 849-862. region: Trends, implications and policy options.
Lucas, H., 2008. Information and communications UNFPA, ESCWA, and CSA 2014.
technology for future health systems in developing Sibai, A. M., Yount, K. M., Tohme, R., Yamout, R.,
countries. Social Science and Medicine, 66, 10, 2122- Kronfol, 2011: The older persons: from veneration to
2132. Vulnerability? In S. Jabbour et al., eds Public health in
Maamari, B., & Chaanine, J., 2013. Job satisfaction of the the Arab Word, Cambridge, Cambridge University
modern information-system-using nurse in Lebanon. Press.
Journal of Tech. Management in China, 8, 2, 120-136. Silbermann, M., Fink, R. M., Min, S. J., Mancuso, M. P.,
Makoul G, Curry RH, Tang PC. The use of electronic Brant, J., Hajjar, R., Strode, D., 2015. Evaluating
medical records: communication patterns in outpatient palliative care needs in Middle Eastern countries.
encounters. J Am Med Inform Assoc. 2001; 8, 6:610-5. Journal of palliative medicine, 18, 1, 18-25.
Marful, W. A., and Winter, A., 2015. When Information Chaudhry, B., Wang, J., Wu, S., Maglione, M., Mojica, W.,
Technology meets Healthcare in West Africa: A Roth, E., Shekelle, P. G. (2006). Systematic review:
Literature Review. Journal of Health Informatics in impact of health information technology on quality,
Africa, 2, 2. efficiency, and costs of medical care. Annals of internal
McCarthy, G. (2009). Deliver tangible ROI. Three medicine, 144(10), 742-752.
healthcare organizations see reduced costs, enhanced Smith, D. H., Perrin, N., Feldstein, A., Yang, X., Kuang,
efficiency and increased compliance with CPOE D., Simon, S. R., Soumerai, S. B., 2006. The impact of
systems. Health Manag Technol, 30(6), 26, 28-29. prescribing safety alerts for elderly persons in an
Merino, M., Marqués, M., Egurbide, M., Romo, M., electronic medical record: an interrupted time series
Rodríguez, I., García, M., de Manuel, E., 2015. evaluation. Archives of Internal Medicine, 166, 10,
Deploying Integrated Care Models for Frail Elderly 1098-1104.
Patients. International Journal of Integrated Care, 15, 5. Teece D, Pisano G, Shuen A., 1997 Dynamic Capabilities
Mugdha R Oak, 2007. A review on barriers to and Strategic Management. Strategic Management
implementing health informatics in developing Journal. 1997; 18:509–33.
countries, Journal of Health Informatics in developing Waked, M., Khayat, G., Salameh, P., 2011. Chronic
countries, vol 1, No. 1, 2007. obstructive pulmonary disease prevalence in Lebanon:
Naranjo-Gil, D., 2009. The influence of environmental and a cross-sectional descriptive study. Clinical
organizational factors on innovation adoptions: Epidemiology, 3, 1315–323.
Consequences for performance in public sector Wernerfelt, B., 1984, A resource-based view of the firm.
organizations. Technovation, 29, 12, 810-818. Strategic Managements Journal, 5: 171–180.
Nicolian, N., Welch, C., Read, M., Roberts, M., Wildevuur, S. E., and Simonse, L. W., 2015. Information
Portsmouth, U. K., 2015. Critical organizational and Communication Technology–Enabled Person-
challenges in delivering business value from IT: in Centered Care for the “Big Five” Chronic Conditions:
search of hybrid IT value models. Electronic Journal Scoping Review. Journal of medical Internet research,
Information Systems Evaluation Volume, 18, 2. 17(3).
Panir, J.H., 2011 Role of ICTs in the Health Sector in
Developing Countries: A Critical Review of Literature.
212
Sink or Swim: Connected Health Software
Grasping the Innovation Opportunities by Mitigating Risk
Ita Richardson1, Ahmed AbuBaker1, Patrick O’Connor2, Jerry O’Mahony2 and Pádraig O’Leary3
1
Lero the Irish Software Research Centre, University of Limerick, Limerick, Ireland
2
ADA-Security Ltd., Rockchapel, Co Cork, Ireland
3
Emergent Research Ltd., Hillcrest, Dromhale, Killarney, Co Kerry, Ireland
ita.richardson@lero.ie, patrick@ada-security.com, jerry@cctv-ireland.net, padraigoleary@gmail.com
Abstract: Connected Health innovation can be an opportunity for companies to develop and grow, if they take
opportunity to develop solutions for healthcare. In this paper, we discuss a case study where a very small
company in Ireland developed a connected health solution, but in doing this, discovered a number of risks
which they faced. Working with a research from the University of Limerick (author 1), they developed
mitigation strategies to avoid these risks, and subsequently developed an updated version of their initial
connected health solution. This software, Global-MN, has been implemented by a charity in India, Varanasi
Children’s Hospital. We present information about both the initial and updated product, illustrating how
overcoming the risks has resulted in the company redesigning their product for a global market. Data entered
via this software is now providing Varanasi Children’s Hospital with information and analysis, which, in turn,
is allowing them to provide a better service and improve the nourishment of children in India.
213
Richardson, I., AbuBaker, A., O’Connor, P., O’Mahony, J. and O’Leary, P.
Sink or Swim: Connected Health Software - Grasping the Innovation Opportunities by Mitigating Risk.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 213-221
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
214
Sink or Swim: Connected Health Software - Grasping the Innovation Opportunities by Mitigating Risk
with many ratified medical devices available for use, home, while the queues and load for the medics in this
by the older person in the home. rural practice has been alleviated. The General
Home monitoring, then, brings with it another Practitioner can view their patient’s data as a line
need – that of transmitting biometric data such as graph e.g. blood pressure over a period of time.
blood pressure measurement and blood sugar levels Therefore, a trend is illustrated and support making
to the patient’s health professional. General Practice medical interventions in a convenient fashion.
has the potential to change – at times, there may not
be a need for the patient, in this case the older person, 4.2 Local-Health: Potential Business
to travel to the practice to have these measurements Risks
taken on a sporadic basis. Alternatively, they can take
their own measures and transmit these to medical As time progressed, the company directors
care. Consequently, ADA-Security directors, in recognised a number of potential business risks which
conjunction with another company, developed Local- arose with Local-Health system:
Health, a prototype for initial testing, with a view to x Aimed towards individuals and small healthcare
supplying the connected health market. practices;
x Market for Local-Health is national;
4.1 Local-Health: Biometric x ADA-Security expertise is in hardware;
Measurement System x System developed on a known platform;
x Regulation required for the system.
Local-Health (described in Richardson et al., 2016b) Aimed towards individuals and small
allows individuals to text their biometrics from their healthcare practices: Once patients have mobile-
mobile phone to the local General Practice. The phone text available they can submit readings, and
information is coded for reading by the bespoke they are not required to buy Local-Health software.
software where the text is received. Software cost, therefore, is totally borne by the
healthcare practice. The expectation is that this will
BP – 70-120 become a high-volume, low-cost product. Due to
high software development costs, the business model
Figure 2: Blood pressure reading text message. is not very cost-efficient.
Market for Local-Health is national: Due to
As an example, in Figure 2, the text message the nature of its hardware products, which includes
shows a Blood Pressure (BP) reading of 70/120, physical installation of security and social systems,
which was taken by the patient using a home blood the company has dealt mainly locally and nationally.
pressure monitor. The receiving system recognises The market needs to become international.
the mobile number from whom the text came, and the However, going global with a low-cost product can
data is collected within the General Practice. be an expensive undertaking.
The data is compared against an expected reading Company expertise is in hardware: Those
for the particular patient. If the actual reading is working in the company have a background and
abnormal, an alert is sent to that user, asking them to experience in hardware installation and hardware
follow the suggested preventative advice, for example attributes. The nature of the new product requires
to seek medical advice. An alert can also be sent to software engineering expertise. This has not been
individual users if they have not sent their results at readily available, and development to-date has been
the time expected. The General Practitioner can sub-contracted. However, without in-house
monitor each patient’s readings on a regular basis, expertise, other business requirements take priority.
receive alerts if someone’s readings go out of control, System developed on a known platform:
and conduct up a follow-up if they deem it to be Local-Health was to be used by older persons within
needed. the local community and it was considered best to
Through modifying their healthcare process, the develop the product as a mobile-phone text-based
implementation of this simple connected health system integrating with healthcare practice software.
solution has introduced technology for use within the While this works effectively, there is no income due
General Practice,. The patient no longer has to attend to selling product to individual patients.
the practice on a regular basis, for example, weekly, Regulation required for the system: Within
and yet the Doctor and Nurse can effectively monitor their hardware business in the security industry, ADA
the patient. The consequence of this is that the patient regularly implement regulations. Under European
can be monitored without having to leave their own Council (2007) directive, a medical device means
215
HEALTHINF 2017 - 10th International Conference on Health Informatics
(amongst other things) “software… intended by the offer large populations, therefore much greater sales
manufacturer to be used for human beings for the potential.
purpose of diagnosis”, and “software … is a medical According to World Food Programme (WFP)
device”. As Local-Health is dealing with the “there are around 800 million people in the world who
transmission, collection and diagnosis involving are malnourished” (WFP, 2016). This includes 200
patient data and HCPs, it is a medical device. million children under the age of five suffering from
Regulations need to be integrated into the software undernutrition (USAID, 2016). A quarter of the
which is time-consuming and expensive, thus world’s malnourished children live in India (WFP,
pushing up the cost of production. 2016), and there are 473,000 malnourished children
in Kenya (UNICEF, 2016). Charities and Non-
Government Organisations (NGOs) provide health
5 MAKING THE TRANSITION check-ups to diagnose malnourished children and
nutrition programmes to resolve the problem.
Reflecting on the S-Curve (Figure 1), the Transition The development of a system, Global-MN, to
required for ADA-Security to move from their main support nourishment programs globally has the
businesses of security and home care systems to potential to provide a large market to ADA-Security’s
Local-Health is substantial, and the company needs to software solution.
find a way to overcome the problems identified. They Develop solution for an organisation: Local-
had put many resources into the development of Health was developed for individual use, but, selling
Local-Health to both fulfil a social need and be to an organisation would be more profitable.
profitable. This was an opportunity for them to move Therefore, charities in developing countries were an
across to yet another ‘S’ curve which is vital for the opportunity that should be explored further, and the
survival of any small company - it is the innovative development of Global-MN was undertaken. This is
companies who survive. The leap from security an innovative mobile health software application that
systems to homecare systems was achievable for the can store, track and monitor details of malnourished
company. The leap from their current offerings to the children.
Local-Health software system was difficult. NGOs hire Community Health Workers and
So how could the company get over this chasm? health clinics to reach children, test and diagnose
How could they mitigate the risks they had identified? them, enrol them into nutrition programmes, and
Considering their options, the directors with the first schedule further visits to monitor their progress. The
author of this paper made strategic decisions to test process normally includes taking the child’s
change the direction of the product, allowing the height, weight, middle-upper arm circumference
company to develop a new innovation, while also (MUAC) and age. To ensure user input to the
presenting opportunities to consider other markets product, at development stage, ADA-Security teamed
with which they could be involved. The following with an Indian based charity, Varanasi Children’s
modifications were made to mitigate the difficulties Hospital, whose work with these children has been
identified above: hampered by the following problems:
x Seek global market opportunities x The manual process currently used to document
children’s readings is time consuming, thus
x Develop solution for an organisation
decreasing productivity of Community Health
x Acquire software engineering skills Workers;
x Investigate non-regulated possibilities
x Retrieval of paper files when a child returns to
x Investigate mobile solutions the nutrition clinic is cumbersome and difficult;
x Paper-based process does not support efficient
Seek global market opportunities: Global
monitoring of children’s progress;
opportunities present much larger markets than local,
x Community Health Workers are unable to
and companies have the ability to expand beyond
identify previously registered children
their local area. For ADA-Security, the installation of
As a result, Varanasi were not able to reach and help
hardware systems provided the natural consideration
as many children as they would like. Additionally,
of national solutions. However, moving to a
there are difficulties in developing reasonable
software-based product provides the potential to
statistics to show how effective the work of the
exploit global expanding markets. In particular, the
charity is. Varanasi were unable track how well
company recognised that developing countries can
individual children are progressing, nor could they
see the success they are having in the field. Having
216
Sink or Swim: Connected Health Software - Grasping the Innovation Opportunities by Mitigating Risk
matched this situation with Local-Health, a decision data could be transmitted. In rural Ireland, given that
was made within ADA-Security that Global-MN, there is often limited and sporadic internet access, the
would initially support the nutrition program within solution for Local-Health was to text data via mobile
Varanasi Children’s Hospital. phone. In rural India, internet access is relatively
The identified end users are Community Health stable, and cheaper than using a mobile phone.
Workers, as Global-MN software will be downloaded Therefore, Global-MH used the internet as its
into their phones, allowing them to register and platform. Entering data in this manner means that
perform screenings on malnourished children. The once a child is registered with Varanasi Children’s
second end user group are charity and NGO Hospital, their information is immediately available
management who ensure that their nourishment to the central office. The effectiveness of the
programme is effective. Also, to obtain investment program can be monitored on a regular basis.
from donors, they must demonstrate the effectiveness Children who are not progressing as expected can
of their program. Therefore, Global-MN will follow have their food source changed early on in the
a Business to Business (B2B) commerce model rather program, and interventions by the central office can
than Business to Consumer (B2C) commerce model. happen quickly. Therefore, infant mortality rates are
In the first instance, ADA-Security has developed affected positively in the long-term.
the product for Varanasi Children’s Hospital, with
plans to expand in the future to other charities 5.1 Global-MN: A Software Solution
internationally.
Acquire software engineering skills: This Global-MN system is a web-based system with data
software-based innovation has potential to open stored on a secure system in Ireland. This research
doors to a global market. While, through their project was carried out as one action research cycle,
business and initial software development, they were allowing the researchers to understand the difference
in a position to identify the innovation, ADA- that the implementation of the software made in the
Security directors have recognised that they need to field and how the processes could be changed to make
acquire software engineering skills and make this a difference. The charity director was trained in
product a priority. The skills will ensure that the system use by author 3. He then travelled to India
product they develop is marketable, secure and where he trained the Community Health Workers.
profitable. Therefore, to bring software engineering They enter data to the system using software running
to the development process, ADA-Security have on a smart phone. This data can be aggregated and
partnered with Emergent Research Ltd. (author 5), a analysed for Varanasi Children’s Hospital allowing
high performance start-up software company management to make informed decisions regarding
headquartered locally. their malnourishment program..
Investigate non-regulated possibilities: While
Global-MN must be secure and private, it is not a
product that needs to be regulated. It is used to input, 6 Global-MN: MANAGING
track and analyse food-related information – for
example, information regarding children who are MALNOURISHMENT
malnourished and amounts of food. Therefore, it is
not a Medical Device and there are no regulations that Using Global-MN, Community Health Workers add
need to be considered during its development. children’s identification data and a photograph to the
Investigate mobile solutions: Local-Health was system in the rural villages and collect measures to
developed as a text-based system for the reasons determine malnourishment: MUAC, weight, height
stated earlier. However, within the global market for and age. Malnourished children are started on a
organisations within which Global-MN is being special food program. They return to the clinic every
targeted, a text-based system would have many two weeks where their signs are re-measured, further
limitations, and a mobile internet-based product is the food provided, and updates added to the Global-MN
better option. We have undertaken research which system. Figure 3 shows relevant screen shots from
demonstrates that there is internet coverage the system. Once data is uploaded, management are
throughout both India and Kenya, countries where provided with data analysis, allowing them to observe
malnourishment programs with children are being progress of children who are on the food program.
undertaken, demonstrating sales’ potential.
Additionally, the company needed to understand the
cheapest and most convenient method by which the
217
HEALTHINF 2017 - 10th International Conference on Health Informatics
218
Sink or Swim: Connected Health Software - Grasping the Innovation Opportunities by Mitigating Risk
219
HEALTHINF 2017 - 10th International Conference on Health Informatics
and ADA-Security are benefitting from the development to ensure that they can continue to
implementation and analysis of this case study. innovate and grow.
7 CONCLUSION ACKNOWLEDGEMENTS
In Ireland and globally, it is recognised that This work was supported by Science Foundation
healthcare is a serious problem that needs fixing - Ireland (SFI) Industry Fellowship Grant Number
“healthcare is the greatest immediate threat to the 14/IF/2530. We would like to thank Pat McMahon,
country” [USA]” (Chase, 2016). Many innovators Varanasi Children’s Hospital for invaluable
see connected health in a variety of forms as a means discussion.
to solving that problem. Innovators must decide the
best way to mitigate risks that arise, ensuring that the
return on investment is as expected. For the small to REFERENCES
medium sized enterprise, and certainly for the very
small enterprise, taking risks has a far-reaching effect. Chase, Dave, Why 98% of Digital Health Startups are
Within ADA-Security, the directors recognised Zombies and What They Can Do About it,
and mitigated the risks being faced by the company. http://www.forbes.com/sites/davechase/2016/05/18/w
Understanding that their business could grow hy-98-of-digital-health-startups-are-zombies-and-
significantly they sought global market opportunities, what-they-can-do-about-it/#1f0ed5bf68f3, Forbes,
identifying that there was a need for data analysis and 22th September, 2016.
tracking in programs in developing countries. Their Bolton, B., and Thompson, J., (2013) Entrepreneurs Talent,
product needed to shift from supporting small to Temperament and Opportunity, Routledge 3rd Ed.
Drejer, A.(2002) ‘Situations for innovation management:
supporting large and from solutions for individuals to
towards a contingency model’, European Journal of
solutions for organisation. There are many NGOs Innovation Management, 5(1), 4-17.
working with malnourished children in developing European Union Council, 2007, EU directive 2007/47/EC.
countries, and, supported by a business plan, ADA- Irish Farmers Association, Supporting Farms and
Security are now marketing internationally. They Businesses in the Irish Countryside, 2015.
recognised that they needed to extend their skill set. https://www.ifa.ie/wp-
Rather than take on new employees, they have content/uploads/2015/08/150805-IFA-Countyside-
partnered with Emergent Research to provide Policy-Document-Final.pdf
software skills. A further risk was entering the Forfás (2007) “Towards developing a policy for
Entrepreneurship in Ireland”, Dublin.
Medical Device software market which is heavily
Foster, R.J., (1986) Innovation: The Attackers Advantage.
regulated. While being cognisant of regulation, they New York: Summit Books.
are developing software without having to obtain Richardson I. (2015). Connected Health: People,
European Union or similar certification. In bringing Technology and Processes, Lero-TR-2015-03, Lero
in an established software partner, there are Technical Report Series. University of Limerick.
documented software development processes in Richardson, Ita, O’Mahony, Jerry, Howarth, Paul,
place. From a technical perspective, the greatest O’Connor, Patrick, Glenny, Liam (2016b), Connected
change was that of the platform upon which the Health: From Rural Ireland to Rural India, Software
product would run - Global-MN is very different to Quality in Healthcare Systems, co-located with IEEE
International Conference on Software Engineering,
Local-Health.
Austin Texas, May 2016, pp 39-42.
Throughout their 25 year history, ADA security Richardson, Ita, Costin, Yvonne, O’Connor, Patrick,
have been an innovative company, expanding their O’Mahony, Jerry, Glenny, Liam (2016a) Connected
product base, growing and providing employment in Health Innovation within SMEs: Understanding the
the local community. They recognised an Marketplace, 4th International Conference on
opportunity for innovation, and, in exploiting this, Innovation and Entrepreneurship, Toronto, Canada, 28-
have considered how to overcome the initial risks. In 29th April, 2016, pp 63-71.
conclusion, Global-MN has given ADA-Security a Rogers, M. (2004), ‘Networks, firm size and innovation’,
further innovation opportunity. Considering the five Small Business Economics, 22, 141-153
Silveira, G.(2001), ‘Innovation Diffusion: research agenda
risks and developing mitigation strategies has
for developing economies’, Technovation, 21, 767-773.
allowed them to leap the larger chasm between S-
curves. As they move forward on their innovative
journey, they can take the learnings from Global-MN
220
Sink or Swim: Connected Health Software - Grasping the Innovation Opportunities by Mitigating Risk
221
Abstract Information Model for Geriatric Patient Treatment
Actors and Relations in Daily Geriatric Care
Abstract: The authors propose an abstract information for geriatric care, the geriatric information model (GIM). They
adopt an information model from cancer care and introduce characteristics for geriatric care (patient popula-
tion, multidisciplinary and multi-professional approach, cross-sectoral approach). Actors (patients, physicians,
therapists, organisations), information objects, and information relations are defined. The GIM is validated by
mapping four typical knowledge processes (multi-professional geriatric team session, interdisciplinary clini-
cal case conferences, tumor boards, transition management) onto the model. The GIM is stated as useful for
understanding information flows and relations in geriatric care. All processes for validation can be mapped
onto GIM. In future work the GIM should be tested with more knowledge process and could also be used for
identifying gaps in the IT support of geriatric care. A study on high and low information quality in geriatric
care is also proposed.
222
Rölker-Denker, L. and Hein, A.
Abstract Information Model for Geriatric Patient Treatment - Actors and Relations in Daily Geriatric Care.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 222-229
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Abstract Information Model for Geriatric Patient Treatment - Actors and Relations in Daily Geriatric Care
• Clinician: treating a specific patient; At the same time, it must be noted that much of the
• Other clinicians: other clinicians from the same information available to both clinicians and patients
discipline (higher or lower rank), associated dis- is biased, incorrect, or otherwise not useful. LQ in-
cipline or health organisation in contact with the formation is shared frequently among patients.
clinician in charge. • Patient’s LQ information: information shared al-
ong the patient and its family and friends, and al-
2.2 Relations ong the patient and other patients;
• Clinician’s LQ context information: Low quality
Patients and clinicians exist in a universe of informa- information is shared even among clinicians.
tion. Snyder et al differentiate between high-quality
(HQ) information and low-quality (LQ) information,
with only a portion representing HQ information. HQ
information relations are:
3 CHARACTERISTICS FOR
GERIATRIC PATIENT
• Clinician’s HQ treatment information: Combi-
nation of clinician’s medical knowledge (gained TREATMENT IN GERMANY
from education and experience) and acquired me-
dical information (laboratory, medical imaging, The following statements mainly focus on the speci-
EEG, ECG) with the information gained from ex- fic situation in Germany which the specifics of the
amining the patient (sensorial information); German health care system being separated into dif-
ferent sectors. Nevertheless the used information in
• Patient’s HQ treatment information: Informa- geriatric care is comparable to other countries while
tion provided by the patient, e.g. drug intake, crossing the sectoral boarders is the main challenge
health-relevant behaviours (nutrition, smoking) or in Germany.
familial-genetic preload; The information flows in geriatric treatment differ
• Patient’s HQ HQ information: information shared from the information flows in cancer care. There are
along the patient and its family and friends and four main reasons:
along the patient and other patients; • Patient population;
• Clinician’s HQ context information: Information • Multidisciplinary approach;
shared along the care team;
• Multi-professional approach;
• Clinician’s guidance: Clinicians can direct their
• Cross-sectoral approach.
patients to appropriate information resources.
223
HEALTHINF 2017 - 10th International Conference on Health Informatics
224
Abstract Information Model for Geriatric Patient Treatment - Actors and Relations in Daily Geriatric Care
• Other clinical professions (group): these are all • Clinical context information: laboratory fin-
other clinical profession not in direct contact with dings, electroencephalography (EEG), electrocar-
the patient and not part of the MGT. This also in- diography (ECG), medical imaging, other infor-
cludes other clinicians from the same discipline mation which is provided by specialised depart-
(higher or lower rank), associated discipline or he- ments;
alth organisation in contact with the clinician in • Medical context information: medical back-
charge. They can be also from the geriatric disci- ground information, latest research results, clini-
pline and/or internal medicine and share their in- cal guidelines.
formation and knowledge in regular clinical con-
ferences or they can be from other departments
and disciplines and are often involved by consul- 4.3 Actor-information Relations
tation and/or patient transfer between the discipli-
nes; The possible information relations are listed and ex-
plained below:
• Other knowledge actors (group): all other relevant
knowledge actors outside the treating HCOs like • Patient - MGT - Treatment Information: this is
medical societies, quality circles, medical specia- the main information relation in the geriatric treat-
list publishers, libraries, other hospitals from the ment process. All necessary treatment from invol-
same network (and not involved in the current tre- ved professions (clinician, care, therapists, social
atment of the specific patient) etc. This group of service) about the patient’s health status is resu-
actors could be also labelled as communities of med here;
practice (CoPs) (Wenger, 2000, 229ff.) (Li et al., • Patient - Other patients - Context information: this
2009, 1ff.). information relation contains all disease-related
information, but also experience-related informa-
4.2 Information Objects tion like information from other patients being tre-
ated by the same HCOs or even the same clinician;
Information objects are shared between actors and • Patient - Patient‘s Social Environment - Context
groups (see section 4.3 below). information: this relation is comparable to the
previous relation because persons from the pa-
• Treatment Information: about current treatment, tient’s social environment could be also suffering
can contain diagnosis, treatment decisions, feed- from a similar disease in the past or present;
back from the patient about the progress, results
of shared-decision, etc.; • Other patients - Patient‘s Social Environment -
Context information: in this relation other patients
• Context information: disease and behaviour rela- share their experience with the patient’s social en-
ted self-experiences (e.g. on procedures, medica- vironment. This could be information on how to
tions), information about suitable contacts (speci- act in critical disease-related questions;
alised hospitals, physicians, disease-related sup-
• MGT - Patient‘s Social Environment - Patient‘s
port groups etc.);
context information: through this relation infor-
• Patient‘s context information: health behaviour in mation about the patient’s situation at home is
the past, information on domestic and social envi- shared. Treatment information could also be veri-
ronment; fied;
225
HEALTHINF 2017 - 10th International Conference on Health Informatics
• MGT - Other HCOs - Patient‘s context informa- • Multi-professional Geriatric Team Session
tion: through this relation information about the (Rölker-Denker and Hein, 2015, 314f);
patient’s previous treatments (other hospitals, ge- • Interdisciplinary Clinical Case Conferences
neral and specialist physicians), his domestic situ- (Rölker-Denker and Hein, 2015, 315);
ation (in case of care or retirement home, or am-
bulatory care services) is shared; • Tumor boards (Rölker-Denker et al., 2015b, 54);
• Patient‘s Social Environment - Other HCOs - Pa- • Transition management (Rölker-Denker et al.,
tient‘s context information: by this information 2015a, ).
relation the patient’s social environments shares
patient’ context information with other HCOs like 5.1 Multi-professional Geriatric Team
information on health behaviour in other contexts Session
(previous disease, behaving in rehabilitation treat-
ments, etc.); The MGT session is the regular meeting of the geria-
• MGT - Other clinical professions - Clinical con- tric team 4.1. During this meeting all relevant infor-
text information: this relation contains the in- mation is discussed:
formation provided by consultations or morning, • Treatment information: Feedback from the patient
lunch or radiological conferences with other spe- on the health status is discussed as well as direct
cialist clinicians but also with other professions impressions from all persons in contact with the
like therapists not involved in the formal MGT; patient. Information passed towards the patient
• MGT - Other knowledge actors - Medical context is also discussed as well as the further treatment
information: MGT members communicate with process;
other members of their COPs about their current • Patient’s context information: this information is
treatment, they investigate in (online) libraries or of very high relevance for the MGT session. This
journals. includes information about the domestic environ-
ment, e.g. how many stairs has the patient to
climb at home, are there any assisting services
5 VALIDATION OF GIM or ambulatory care services, unhealthy behaviours
and supply with medication and assisting devices;
To validate the GIM four typical knowledge processes • Clinical context information: This includes from
are mapped to the model. The mapped knowledge other clinical professions like consultation results
processes are from other disciplines, blood values and medical
226
Abstract Information Model for Geriatric Patient Treatment - Actors and Relations in Daily Geriatric Care
imaging. During the session information which status and also take part in the decision process on
will be forwarded to other clinical professions is further treatment;
also discussed, e.g. information for treating sur- • Patient’ context information: as residential physi-
geons; cians are also part of the clinical case conference
• Medical context information: This includes in- (in terms of ”other HCOs”) they can provide more
formation stored in clinical guidelines, e.g. the context information about the patient as clinical
guideline on urinary incontinence for geriatric physicians could.
patients (AWMF (Arbeitsgemeinschaft der Wis-
senschaftlichen Medizinischen Fachgesellschaf- 5.4 Transition Management
ten) (engl: Association of the Scientific Medical
Societies in Germany), 2016) but there also many The goal of transition management is to ensure an op-
other guidelines for age-related health issues and timal patient path through the different interfaces of
diseases (e.g. clinical nutrition, delirium, Parkin- cross sectoral care (Huber et al., 2016). Transition
son disease, palliative care). management does not only include communication
between hospitals and downstream health care organi-
5.2 Interdisciplinary Clinical Case sations (releasing a patient into rehabilitation or stati-
Conferences onary/ambulatory care), it also includes the communi-
cation between hospitals and upstream health care or-
ganisations (moving patient from stationary care into
Interdisciplinary clinical case conferences consist of
hospitals) (Arve et al., 2009).
members from different medical fields, the scope of
these conferences is to discuss complex patient cases • Medical context information: up to now there is
and to derive possible treatments (Feldman, 1999). no national guideline on transition management
The conferences are organised on a regular basis by medical societies. But there are several local
(Rölker-Denker and Hein, 2015, 315) (Rölker-Denker networks that develop such guidelines and make
et al., 2015b, 54). During these conferences the follo- them publicly available;
wing information is discussed: • Patient’s context information: this information is
• Treatment information: The MGT clinicians pre- shared along all responsible HCOs and contains
sent their treatment information about the patient; information about further medication, previous
medication, recommendations on health-related
• Clinical context information: The other members behaviour (nutrition, physical activities, etc.).
of the clinical case conference provide their kno-
wledge about the specific case and discuss with
the inquiring clinicians possible treatment alter-
natives; 6 CONCLUSION AND OUTLOOK
• Medical context information: other clinical pro-
fessions provide and explain clinical guidelines 6.1 Conclusion
the asking clinicians are not aware of.
We developed an abstract geriatric information model
(GIM) for the purpose of better understanding the ty-
5.3 Tumor Boards
pical actors of geriatric treatment and the information
relations between them. The GIM was validated by
Tumor boards are similar to clinical case conferences
mapping typical care settings which occur during the
but focus on oncological diseases and overcome sec-
geriatric treatment. It was shown that all processes
toral boarders by connecting clinical physicians with
could be mapped into the GIM and all defined actors
residential physicians and other oncological professi-
and information relations within the GIM are of re-
ons (Rölker-Denker et al., 2015b, 54). Geriatric on-
levance. Some knowledge processes are limited to a
cological treatment is also multi- and interprofessio-
subset of actors (e.g. clinical case conferences do not
nal, includes the patients’ social environment (Mag-
imply the patient or the patient’s social environment)
nuson et al., 2016) and even allows patient participa-
whereas other knowledge processes include all actors
tion (Ansmann et al., 2014, 865ff.). Mainly the same
and information relations (e.g. the MGT session).
information is discussed as in the clinical case confe-
The GIM is not intended to be used for developing
rence but in addition:
sophisticated clinical information systems like other
• Treatment information: in case of participation approaches, e.g. the HL7 Clinical Information Mo-
the patient can give information about the health deling Initiative (CIMI) (HL7 Clinical Information
227
HEALTHINF 2017 - 10th International Conference on Health Informatics
Modeling Initiative, 2016). The purpose of CIMI is to integrative review of the literature. Journal of Multi-
develop interoperable healthcare systems on a techni- disciplinary Healthcare, pages 65–74.
cal basis. The focus is not on the communication bet- Feldman, E. (1999). The interdisciplinary case conference.
ween persons involved in the geriatric treatment. Ne- Acad Med, 74:594.
vertheless links to this work are mandatory in future HL7 Clinical Information Modeling Initiative (2016). Cli-
work because geriatric treatment is cross-sectoral 3.4 nical information modeling initiative [online].
and includes data and information from different IT Huber, T. P., Shortell, S. M., and Rodriguez, H. P. (2016).
systems. Improving Care Transitions Management: Examining
the Role of Accountable Care Organization Participa-
tion and Expanded Electronic Health Record Functio-
6.2 Outlook nality. Health Serv Res.
Kolb, G., Breuninger, K., Gronemeyer, S., van den Heuvel,
The GIM was only validated with four typical know- D., Lübke, N., Lüttje, D., Wittrich, A., and Wolff, J.
ledge processes in geriatric treatment. Referring to (2014). 10 jahre geriatrische frührehabilitative kom-
previous studies of the authors (Rölker-Denker and plexbehandlung im drg-system [german]. Z Gerontol
Geriat, 47:6–12.
Hein, 2015) (Rölker-Denker et al., 2015b) there are
more knowledge processes to be mapped towards the Kolb, G. F. and Weißbach, L. (2015). Demographic change
: Changes in society and medicine and developmental
GIM. trends in geriatrics. Der Urologe, 54(12):1701.
The approach of HQ and low quality information Laugesen, J., Hassanein, K., and Yuan, Y. (2015). The im-
was not included in the GIM so far. There have been pact of internet health information on patient compli-
no dedicated studies on the information quality in ance: A research model and an empirical study. J Med
daily geriatric treatment so far and, for thus, there are Internet Res, 17(6):e143.
no validated results available. There are studies for Li, L. C., Grimshaw, J. M., Nielsen, C., Judd, M., Coyte,
general information quality, e.g. analyse the impact P. C., and Graham, I. D. (2009). Use of communi-
of internet health information (Laugesen et al., 2015) ties of practice in business and health care sectors: a
but there are no dedicated studies in the geriatric con- systematic review. Implement Sci, 4:27.
text. Magnuson, A., Wallace, J., Canin, B., Chow, S., Dale, W.,
Mohile, S. G., and Hamel, L. M. (2016). Shared Goal
The GIM can be also used for identifying gaps in
Setting in Team-Based Geriatric Oncology. J Oncol
the IT landscape (Snyder et al., 2011). Healthcare Pract.
organisations can check all the actor-relation-couples Mangoni, A. A. (2014). Geriatric medicine in an aging so-
and see if there are gaps. ciety: Up for a challenge? Frontiers in Medicine,
1(10).
Nau, R., Djukic, M., and Wappler, M. (2016). Geria-
ACKNOWLEDGEMENTS trics – an interdisciplinary challenge. Der Nervenarzt,
87(6):603–608.
Rölker-Denker, L. and Hein, A. (2015). Knowledge process
The authors would like to thank the Metropolregion models in health care organisations - ideal-typical ex-
Bremen-Oldenburg (reference number: 23-03-13) for amples from the field. In Proceedings of the Interna-
partly supporting this work. tional Conference on Health Informatics (BIOSTEC
2015), pages 312–317.
Rölker-Denker, L., Seeger, I., and Hein, A. (2015a).
Überleitung aus sicht der krankenhäuser - ergebnisse
REFERENCES aus semi-strukturierten leitfadeninterviews auf ebene
der geschäftsführung in der region metropolregion
Ansmann, L., Kowalski, C., Pfaff, H., Wuerstlein, R., Wirtz, bremen-oldenburg. In 14. Deutscher Kongress für
M. A., and Ernstmann, N. (2014). Patient participa- Versorgungsforschung. Deutsches Netzwerk Versor-
tion in multidisciplinary tumor conferences. Breast, gungsforschung e. V. 7. - 9. Oktober 2015, Berlin.
23(6):865–869. Rölker-Denker, L., Seeger, I., and Hein, A. (2015b). Kno-
Arve, S., Ovaskainen, P., Randelin, I., Alin, J., and Rautava, wledge processes in german hospitals. first findings
P. (2009). The knowledge management on the elderly from the network for health services research metro-
care. International Journal of Integrated Care, 9. politan region bremen-oldenburg. In eKNOW 2015,
AWMF (Arbeitsgemeinschaft der Wissenschaftlichen Me- The Seventh International Conference on Information,
dizinischen Fachgesellschaften) (engl: Association of Process, and Knowledge Management, pages 53–57.
the Scientific Medical Societies in Germany) (2016). IARIA.
Harninkontinenz bei geriatrischen patienten, diagnos- Snyder, C. F., Wu, A. W., Miller, R. S., Jensen, R. E., Ban-
tik und therapie. tug, E. T., and Wolff, A. C. (2011). The role of infor-
Chamberlain-Salaun, J., Mills, J., and Usher, K. (2013). matics in promoting patient-centered care. Cancer J,
Terminology used to describe health care teams: an 17(4):211–218.
228
Abstract Information Model for Geriatric Patient Treatment - Actors and Relations in Daily Geriatric Care
229
Collaborative Reproducible Reporting
Git Submodules as a Data Security Solution
{peter.dewitt, tell.bennett}@ucdenver.edu
Abstract: Sensitive data and collaborative projects pose challenges for reproducible computational research. We present
a workflow based on literate programming and distributed version control to produce well-documented and
dynamic documents collaboratively authored by a team composed of members with varying data access priv-
ileges. Data are stored on secure institutional network drives and incorporated into projects using a feature
of the Git version control system: submodules. Code to analyze data and write text is managed on public
collaborative development environments. This workflow supports collaborative authorship while simultane-
ously protecting sensitive data. The workflow is designed to be inexpensive and is implemented primarily
with a variety of free and open-source software. Work products can be abstracts, manuscripts, posters, slide
decks, grant applications, or other documents. This approach is adaptable to teams of varying size in other
collaborative situations.
230
Dewitt, P. and Bennett, T.
Collaborative Reproducible Reporting - Git Submodules as a Data Security Solution.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 230-235
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Collaborative Reproducible Reporting - Git Submodules as a Data Security Solution
members with institutional review board approval can some distributed version control projects, including
access the data. Data analysis scripts and manuscript many of ours, have a centralized design (De Alwis
text files are available to all team members on pub- and Sillito, 2009).
lic code hosting services. The linkage between the In the simplest centralized design, a Git server
data and the code is made possible by a feature of hosts the repository and each team member would
the Git version control software: submodules. A 40- push to, and pull from, that server. It is possible to
character hexadecimal sequence (SHA-1 hash) allows have the individual team members’ repositories di-
us to share the version of the data source publicly rectly linked, but we did not use this option because
without compromising the data itself. of network security concerns. Another option is to
The objective of this manuscript is to present a have a bare repository on a network drive act as the
workflow that we developed to 1) protect sensitive central code repository. We use that design for a mi-
data from unauthorized access, 2) allow multiple au- nority of projects with unusually sensitive data. For
thors, included those with and without data access most projects, our team takes advantage of the inte-
rights, to contribute to a single set of files, and 3) min- grated issue tracker, web editing interface, and addi-
imize the financial commitment to hardware and soft- tional read/write permissions provided by a Git server.
ware. Several public Git repository sites exist. We chose
Our primary focus is on the use of the Git version to use Atlassian’s Bitbucket5 to host our reposito-
control system and specifically, Git submodules. We ries. At the time this choice was made, Bitbucket
will note other software tools and programs used in allowed academic account holders unlimited private
our workflow, but they can often be substituted for repositories and unlimited collaborators. Recently,
other similar software. Github.com has offered similar packages.
Code repositories solved the problems of dynamic
document authoring and collaboration, but we also
needed to track data set versions and limit data ac-
2 WORKFLOW OVERVIEW cess to approved team members without preventing
collaboration.
Dynamic document authoring is a key component of The solution was to use Git submodules. “Sub-
the overall reproducible research paradigm. Varia- modules allow you to keep a Git repository as a subdi-
tions on literate programming (Knuth, 1984) are ideal rectory of another Git repository. This lets you clone
for this purpose. The R package knitr (Xie, 2015), another repository into your project and keep your
an evolution of R’s sweave (Leisch, 2002) pack- commits separate.” (Chacon and Straub, 2014). Also,
age, provides a structured process for authoring a while the data files within the submodule exist in a
manuscript using a literate programming paradigm. subdirectory and are visible in the working directory,
knitr was highlighted several times at a recent only the SHA-1 of the commit of the submodule is
workshop supported by the National Academies stored in the primary project repository. Thus, when
of Sciences, Engineering, and Medicine (National the manuscript repository is pushed to bitbucket.org,
Academies of Sciences, Engineering, and Medicine, the only reference to the data is a 40-digit hexadec-
Division on Engineering and Physical Sciences, imal number. The data never leaves the team mem-
Board on Mathematical Sciences and Their Applica- bers’ machines, but the status of the data is shared
tions, Committee on Applied and Theoretical Statis- and documented between team members.
tics, 2016).
We typically perform data analysis with the sta-
tistical language R3 and rely on either markdown
or LATEX for markup. The desired format of our 3 INFRASTRUCTURE
deliverables dictates the markup language selection.
Weaving R code with a markup language is well- Below we describe how we have used existing in-
described (Gandrud, 2015). frastructure, open source software, and free hosting
Our team manages collaborative projects using a services to generate reproducible reports while pro-
distributed version control system, Git4 . Git is free tecting sensitive data. We designed the workflow
to use and is supported on all major operating sys- so that sensitive data is stored on a secure network
tems. Distributed version control systems are becom- hard drive or whole-disk encrypted personal machine.
ing more common than centralized systems, although Data transfer between the network drive and a team
member’s machine only occurs on the institution’s
3 https://www.r-project.org/
4 https://Git-scm.com/ 5 https://bitbucket.org
231
HEALTHINF 2017 - 10th International Conference on Health Informatics
network. The following subsections describe the nec- A basic repository design shown in Figure 2. An
essary hardware, repository design, and workflow for example code repository can be found at https://
collaboration. bitbucket.org/pedstbi/example collaborative report
which has a data submodule available at https://
3.1 Hardware bitbucket.org/pedstbi/example collaborative data
source. The analysis and manuscript authoring
Our institution maintains a Microsoft Windows net- code is free of sensitive data. Therefore, the remote
work. We chose to work on Windows machines be- code repository can be maintained on a publicly
cause they are available to all of our team members available code development system such as GitHub
and because they support whole-disk encryption soft- or Bitbucket. We use private code repositories to
ware that meets our institution’s requirements for data maintain academic confidentiality prior to manuscript
security. Each team member with access to the data publication. Repositories on either GitHub or Bit-
has a whole-disk encrypted laptop or desktop. This bucket can be made public at any time, such as when
software costs approximately 100 US Dollars per ma- a manuscript is submitted for publication.
chine, but allows each team member to have local A team member working on a project (manuscript,
copies of the data repositories relevant to their work. in this case) would have a local clone of the code
Like investigators at many academic institutions, we repository on their machine. Their daily workflow
have access to secure network drives behind the uni- would be to fetch and merge (pull-ing is shorthand for
versity’s firewall. We rely on the network drives for the fetch then merge process) any changes on the re-
data repository hosting and backup. mote repository made by other team members, make
changes to files using the text editor of their choice,
3.2 Repository Design stage and commit the changes using their local Git in-
stance, then push those changes to the remote reposi-
Although Git is a distributed version control platform, tory. Team members (clinical authors or collaborators
we conceptually have central data and code reposito- at other institutions, for example) whose contributions
ries on a network drive or Git server, see Figure 1. are focused on writing the manuscript or who do not
Each collaborator has a local clone of the necessary have a whole-disk encrypted machine might have a
data and code repositories on their machine that serve local copy of the code repository but not the data
as distributed backups of the central data and code. repository. Those team members can have the bene-
fits of a version-controlled project without cloning the
3.2.1 Data Repositories data submodule. One challenge introduced by this ap-
proach is that collaborators without local data reposi-
Data are housed in .csv format within our local data tories cannot compile manuscripts. Because the quan-
repositories. For collaboration, team members with titative results in the manuscript are generated by em-
data access privileges push to and pull form bare Git bedded analytic code within the manuscript file, those
repositories on our institution’s secure network drives. results cannot be updated without a local data copy.
Bare repositories do not contain a working directory: Periodically, team members with both data and code
individual files are not visible when inspecting the access must compile the manuscript (which runs the
contents of the directory and subdirectories. As such, embedded code) and commit the finished product to
inadvertently editing or over-writing the data files is the central code repository for reference by collabo-
very unlikely. We rely on the read/write access limits rators who primarily write and edit manuscript text.
enforced by the institution’s network to limit access to
these bare repositories and entrust those with access 3.2.3 Limitations
to not manually edit files. The repositories theoret-
ically could become corrupted. If that occurred, we The size of data submodules is the most important
would compare the distributed copies of the repos- limitation of this repository design. Thus far, the
itories between team members and re-initialize the largest data submodule in our system is approxi-
repository from the most current local copy. This is an mately 10GB. Segmentation of the data repositories
advantage of the distributed version control paradigm: into, for example, a large raw data repository and a
every local copy is a backup for all others. smaller analysis data repository for one project can
improve efficiency.
3.2.2 Code Repositories Additional features of Git such as branch-ing
strategies, forking, pull requests, rebase-ing, and oth-
In the simplest form of this workflow, a work product ers, provide additional levels of structure within the
such as a manuscript has its own code repository. collaboration. However, such tools can be over-
232
Collaborative Reproducible Reporting - Git Submodules as a Data Security Solution
Figure 1: Collaboration Structure. Data is version-controlled in bare repositories on our institutional shared network drives.
The datasets are tracked within projects as submodules. Each developer has access to the data on his or her whole-disk
encrypted laptop or desktop. Non-sensitive code, manuscript text, references, etc. are hosted on bitbucket.org. Other authors
are able to contribute by having access to the bitbucket.org code repositories. Note that the manuscript repositories, M1,
M2, and M3, only have access to the data sets via git submodules. The copies of M1, M2, and M3 on the hosting service
and on each collaborator machine have no access to the data sets. The hosting service and collaborator only see a 40-digit
hexadecimal SHA1 to reference the version of the data repository.
whelming for a novice Git user. Increased train- 2GB hard limits). Placing a dedicated Git server be-
ing time, or limited participation, must be weighed hind our institutional fire wall would provide a solu-
against the benefit of Git feature use. tion for data management and access control and use-
This workflow does include copies of sensitive ful collaboration tools. Hardware and administrative
datasets on the whole-disk encrypted local machines support costs would need to be considered.
of selected team members. Our experience has been
that data owners and institutional review boards are
supportive of this approach. If a particular dataset was 4 COSTS
not permitted to be housed on a local machine with
whole-disk encryption, then a computational server
within the institution’s firewall would likely be nec- This reproducible reporting workflow is powerful and
essary. also cost-effective. For many investigators, a Win-
dows operating system and Windows Office software
Clinical members of our research team without
are supported by the institution. Whole-disk encryp-
computational backgrounds have been able to adopt
tion software is inexpensive (100 US Dollars per team
most or all of this workflow with a modest time in-
member). Other software needed to implement this
vestment. However, like all complex tools, regular
workflow is free to use under the GNU General Pub-
use is needed to maintain comfort. A more integrated
lic License (GPL)6 or similar license. There are no
environment that was friendly to the naı̈ve user would
hardware costs if investigators currently have indi-
increase the accessibility of a reproducible reporting
vidual computers capable of performing the planned
workflow.
analyses and access to a secure network drive. Many
academic investigators already have this hardware in
3.2.4 Extensions/Other Options
place.
The time and effort needed to learn the necessary
Our team initially hosted code repositories on GitHub tools to adopt this workflow are likely higher than
and moved to Bitbucket as the team grew and the the software and hardware costs. However, the re-
number of projects increased. GitLab.com is another turn on investment can be high. Our experience in an
option that offers unlimited private repositories, un- academic research environment suggests that a team
limited collaborators, and up to 10GB disk space per
repository (compared to Bitbucket’s 1GB soft and 6 http://www.gnu.org/licenses/gpl-3.0.en.html
233
HEALTHINF 2017 - 10th International Conference on Health Informatics
234
Collaborative Reproducible Reporting - Git Submodules as a Data Security Solution
public Git servers). However, due to the limitations Leisch, F. (2002). Sweave: Dynamic generation of statisti-
regarding disclosure of data, our workflow would not cal reports using literate data analysis. In Härdle, W.
meet Peng’s Data Availability criterion. Summary and Rönz, B., editors, Compstat 2002 — Proceedings
in Computational Statistics, pages 575–580. Physica
statistics (Peng et al., 2006) could in some situations
Verlag, Heidelberg. ISBN 3-7908-1517-9.
be posted publicly, but overall the balance between
National Academies of Sciences, Engineering, and
reproducibility and data privacy will need additional Medicine, Division on Engineering and Physical Sci-
public discussion (National Academies of Sciences, ences, Board on Mathematical Sciences and Their
Engineering, and Medicine, Division on Engineering Applications, Committee on Applied and Theoretical
and Physical Sciences, Board on Mathematical Sci- Statistics (2016). Statistical Challenges in Assessing
ences and Their Applications, Committee on Applied and Fostering the Reproducibility of Scientific Results:
and Theoretical Statistics, 2016). Summary of a Workshop. National Academies Press.
Rossini and Leisch described how “information Peng, R. D. (2011). Reproducible research in computational
science. Science, 334(6060):1226–1227.
and knowledge was divided asymmetrically between
[collaborators]. . . ” (Rossini and Leisch, 2003) and Peng, R. D., Dominici, F., and Zeger, S. L. (2006). Re-
producible epidemiologic research. Am J Epidemiol,
Donoho reported that one of the benefits of a repro- 163(9):783–9.
ducible computational workflow was improved team- Rossini, A. and Leisch, F. (2003). Literate statistical prac-
work (Donoho, 2010). Our experience would support tice. Biostatistics Working Paper Series. Working Pa-
both of those ideas, as team members with variable per 194. accessed May 17th, 2016.
clinical, statistical, and technical backgrounds have Xie, Y. (2015). Dynamic Documents with R and knitr, Sec-
all contributed to the development of this workflow ond Edition. Chapman & Hall/CRC The R Series.
and to the quality of the workflow’s research prod- CRC Press.
ucts.
In conclusion, reproducible reporting is a key
component of the reproducible research paradigm.
This manuscript presents an inexpensive, practical,
and easily adopted workflow for collaborative repro-
ducible biomedical reporting when working with sen-
sitive data.
ACKNOWLEDGEMENTS
We thank Dr. Michael Kahn for his comments and
suggestions on our manuscript. Dr. Bennett is sup-
ported by Eunice Kennedy Shriver National Insti-
tute for Child Health and Human Development Grant
K23HD074620.
REFERENCES
Chacon, S. and Straub, B. (2014). Pro git. Apress. Online
at https://git-scm.com/book/en/v2.
De Alwis, B. and Sillito, J. (2009). Why are software
projects moving from centralized to decentralized ver-
sion control systems? In Cooperative and Human
Aspects on Software Engineering, 2009. CHASE’09.
ICSE Workshop on, pages 36–39. IEEE.
Donoho, D. L. (2010). An invitation to reproducible com-
putational research. Biostatistics, 11(3):385–388.
Gandrud, C. (2015). Reproducible Research with R and
RStudio. Chapman & Hall/CRC Press, second edition.
Knuth, D. E. (1984). Literate programming. The Computer
Journal, 27(2):97–111.
235
Managing Provenance for Medical Datasets
An Example Case for Documenting the Workflow for Image Processing
Ajinkya Prabhune1 , Rainer Stotzka1 , Michael Gertz2 , Lei Zheng3 and Jürgen Hesser3,4
1 Institute for Data Processing and Electronics, Karlsruhe Institute of Technology, Eggenstein-Leopoldshafen, Germany
2 Database Systems Research Group, Institute of Computer Science, Heidelberg University, Heidelberg, Germany
3 Experimental Radiation Oncology, Medical Faculty Mannheim, Heidelberg University, Mannheim, Germany
4 Experimental Radiation Oncology, IWR, Heidelberg University, Heidelberg, Germany
Keywords: Scientific Data Repository, ProvONE Provenance Standard, Open Annotation Data Model, DICOM Dataset,
Angioscopy Workflow, Metadata Management.
Abstract: In this paper, we present a novel data repository architecture that is capable of handling the complex image
processing workflows and its associated provenance for clinical image data. This novel system has unique and
outstanding properties versus existing systems. Among the most relevant features are a flexible and intuitively
usable data and metadata management that includes the use of a graph-based provenance management strategy
based on a standard provenance model. Annotation is supported to allow for flexible text descriptors as being
widespread found for clinical data when structured templates are not yet available. The architecture presented
here is based on a modern database and management concepts and allows to overcome the limitations of
current systems namely limited provenance support, lacking flexibility, and extensibility to novel requests. To
demonstrate the practical applicability of our architecture, we consider a use case of automated image data
processing workflow for identifying vascular lesions in the lower extremities, and describe the provenance
graph generated for this workflow. Although presented for image data, the proposed concept applies to more
general context of arbitrary clinical data and could serve as an additional service to existing clinical IT systems.
236
Prabhune, A., Stotzka, R., Gertz, M., Zheng, L. and Hesser, J.
Managing Provenance for Medical Datasets - An Example Case for Documenting the Workflow for Image Processing.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 236-243
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Managing Provenance for Medical Datasets - An Example Case for Documenting the Workflow for Image Processing
#(&
reproducing the results. For example, manipulations
'&
#$+!%&'#(($#
of image data via image processing routines (which
will dominate in the future to automatically process
"&$''# (%$'($&-
)(#(($##
#'( $+#!$
standard cases), the processed result is stored as new
)($&.($#
&*'
#($& !$+ ##$(($#&*'
$& !$+'
DICOM data, even if only small modifications on the ( '$*&- )!($#&*
header information were performed.
''-&
#&!#(
From the perspective of repeatability, the image
#"#(
((
((
,(&($# ((&$''#
processing workflow would have to be stored in the
(($!!# ((($&
'((
DICOM data as well. This can be accomplished either
(&#'&
'(&($#
by using private tags or by defining a new modality.
#"#(
(&'&*($# (#!-''
The former step is an ad-hoc solution since there are
(
()&($# (&$''#
no formal rules how this should be done and gener-
ally we cannot assume that all users are handling this
issue with sufficient care. Hence, there is no guaran-
tee that this image processing workflow can ever been
repeated. The latter strategy requires a new DICOM ((($& (&* !)'(&
'&*& %%!($#$'(#
modality standard, which is an immense overhead. -'("
From this perspective, there is a demand for an Figure 1: Image Processing Data Repository Architecture.
easy-to-use technology that not only maps all meta-
data formats, workflows, and patient related data but
ity for handling the lifecycle of DICOM dataset stored
also enables users to describe new workflows and still
in the PACS server. The IPDR follows a modular ar-
guarantee the provenance information.
chitecture design, as shown in Figure 1. The modular
This lack of flexibility of the current system and
design of IPDR allows us to extend the functionality
the brittleness of the DICOM standard led us to pro-
to fulfil any new requirements put forth by the radia-
pose a different type of data repository architecture
tion therapy (RT) research community. The complete
that is overcoming these limitations. Instead of intro-
IPDR architecture is developed in Java, the various
ducing a disruptive solution in the existing PACS in-
REST services are implemented in Jersey (Sandoval,
frastructure, we present an auxiliary system that pro-
2009) and the front-end is developed in Vaadin frame-
vides the following functionality;
work. The IPDR is deployed on a web server (Tomcat
• Metadata management for extracting, modelling, 7). Following is the description of the core compo-
indexing and storing the metadata embedded from nents of the IPDR architecture.
DICOM-file in a flexible and a scalable database
• Provenance tracking using standard provenance 2.1 Generic Client
models such as ProvONE and PREMIS1 for the
image processing workflows. The Generic Client component provides a convenient
• Data annotation (image annotations) for systematic solution for the RT medicine and research commu-
capturing of vital details in the standard Open An- nity to integrate their existing software/tools with the
notation Data Model (Sanderson et al., 2013). IPDR seamlessly. The Generic Client is an upgrade
• Data preservation for allowing long-term access to the GCS-API (Prabhune et al., 2015) that was pre-
and reusability of the data. viously developed for handling the datasets of the
nanoscopy research community. The Generic Client
• Data quality control and data curation for specific
is extended to handle the DICOM files. The various
tools controlling rules of good practice and later
modules of Generic Client are explained below:
diagnostic and treatment guidelines.
• Access Layer-API: The access layer API exposes
the various interfaces for connecting to the existing
radiation therapy data processing tools. Currently,
2 IMAGE PROCESSING DATA we have developed a command line interface (CLI)
REPOSITORY over the access layer API that allows the RT com-
munity to transfer the datasets.
The goal of the Image Processing Data Repository
• Base Metadata Registration: For long term
(IPDR) is to provide the various auxiliary functional-
archival, it is necessary to register of the DICOM
1 http://www.loc.gov/standards/premis/ files in IPDR. However, the DICOM files main-
237
HEALTHINF 2017 - 10th International Conference on Health Informatics
tain its proprietary metadata schema that needs to rently, the Apache ODE2 BPEL workflow engine
be translated to the standard metadata schema sup- is integrated with IPDR and workflows defined
ported by the IPDR. This module enables the au- in BPEL specification (OASIS, 2007) are sup-
tomated registration of the DICOM datasets by ex- ported. The Prov2ONE (Prabhune et al., 2016) al-
tracting the administrative metadata concerning the gorithm handles the automatic creation of prospec-
DICOM Study, Series, and Image and mapping it tive ProvONE graph, which is stored in a graph
to the Core Scientific Metadata Model (CSMD) data model of the metadata storage.
(Matthews, 2015). • Data discovery submodule provides the users to
• Ingest/Download Workflows: Ingest/Download search the ingested DICOM datasets based on the
workflows module holds the predefined workflow metadata stored in the metadata storage. The meta-
that allow the ingestion of DICOM data from client data are indexed for enabling full-text search, for
systems to the IPDR or to download the DICOM searching over provenance graphs various queries
datasets from the IPDR to the client system. implemented as RESTful services are provided.
• Data Transfer: The data transfer module allows Finally, to enable large scale metadata harvesting
the transfer of DICOM datasets bi-directional from the Open Archives Initiative Protocol for Metadata
multiple endpoint, i.e. from client system or data Harvesting (OAI-PMH)3 is implemented.
acquisition systems to IPDR or vise versa. Cur- • Annotation service is an interactive submodule that
rently, the HTTP WebDAV (Goland et al., 1999) allows enriching of the images through the anno-
protocol is supported for high-throughput transfer tation service. Valuable information provided in
of the datasets. The various interfaces for inte- form of annotations by the researchers is modeled
grating other transfer protocols such as, FTP and using the Open Annotation Data Model and main-
gridFTP (Allcock et al., 2005) are available. The tained in the metadata storage.
data transfer module is designed to be fail-safe. For • Publication service submodule allows users to
example, data transfers that are interrupted are au- share (provide open access) the experiment dataset
tomatically re-triggered for transfer. To optimize with other research communities, which can be
high-volume data transfers, the number of parallel based on data exchange technologies like i2b24 .
WebDAV connections can be manipulated.
Metadata: The metadata module is responsible for
• Authentication and Authorization: The Generic handling all the metadata specific tasks in the IPDR.
Client follows a two-fold process. First, to enable Metadata can either be embedded inside the DICOM
the registration of DICOM datasets , for a regis- files or for other file formats it can be ingested sep-
tered member of the RT research community, an arately with the datasets. For enabling querying,
OAuth-secured RESTful connection is established. sharing and reusing of metadata, DICOM metadata
Each researcher is provided with a unique access needs to be stored in a dedicated metadata storage.
token and access token secret. Second, for transfer- Furthermore, as DICOM metadata is subject to fre-
ring the data, the WebDAV protocol authentication quent changes throughout its lifecyle, it is necessary
is required. Currently, WebDAV authentication for to have a flexible database model. Thus, we chose
an entire research community is configured. ArangoDB5 , a database which offers three different
types of data models, namely, key-value, document
2.2 Image Processing Data Repository and graph data model.
• Metadata Extraction: The various metadata ex-
The IPDR is a multi-module architecture that is sep-
tractors for extracting the metadata from DICOM,
arated into functionality specific module. The IPDR
HDF5, TIFF and XML files are provided as inde-
is deployed as a web application with access to the
pendent micro-services by this module. For ex-
high-performance computing cluster, the large-scale
tending towards other file formats, this module
data storage, and a dedicated metadata database. Fol-
provides a generic interface that can be imple-
lowing is the description of each module of the IPDR:
mented by any new metadata extractors.
IPDR Services: The services module provides the
various arbitrary high-end services for interacting • Metadata Modelling: The various metadata mod-
with datasets stored in IPDR. els (schemas) are registered through this com-
• Scientific Workflow (medical Image Data Process- 2 http://ode.apache.org/
ing workflow) submodule offers the integration 3 https://www.openarchives.org/pmh/
of a workflow engine for automating the execu- 4 www.i2b2.org
238
Managing Provenance for Medical Datasets - An Example Case for Documenting the Workflow for Image Processing
ponent. For example, the ProvONE provenance • Data Processing: The integration with the HPC
model, CSMD, Metadata Encoding and Transmis- cluster and configuration of the execution envi-
sion Standard (METS)6 and PREMIS are some of ronment is handled by this submodule. More-
the currently supported metadata schemas. Fur- over, when new intermediary datasets are gener-
thermore, application-specific metadata model of ated as a result of an execution of data processing
DICOM is also registered by this submodule. algorithm, the automated registration and ingest of
• Metadata Processing: The metadata processing these datasets is performed by this submodule.
submodule provides the handling and assembling
of the community specified METS profile. METS 2.3 User Interface
is metadata container format that comprises of var-
ious sections which allow encoding of adminis- A web-based user interface developed in Vaadin is
trative amdSec
, structural fileSec
, structMap
, integrated with the IPDR. Feature such as free-text
structLink
descriptive dmdSec
and provenance search over metadata and faceted search are avail-
digiprovMD
metadata. The heterogeneous meta- able for discovering the datasets. Provenance graphs
data comprising descriptive and administrative stored in ArangoDB are visually represented using the
metadata from the ArangoDB document store and D3.js (Zhu, 2013) framework. The OAI-PMH meta-
provenance metadata from graph store are assem- data services are exposed through the user interface
bled in the METS profile for enabling sharing of for harvesting the metadata. As the user interface
entire metadata for a dataset. is integrated with the workflow engine, the radiation
• Metadata Storage: The various database specific therapy research community can perform remote exe-
storage adapter for storing and querying the meta- cution of their image processing workflows.
data are implemented in this submodule. The
CRUD operations for document metadata repre-
senting the contextual information from the DI-
COM dataset, for graph metadata representing the 3 DATA AND METADATA
provenance and workflows, and the six verbs of WORKFLOW
the OAI-PMH protocol are implemented in Arango
Query Language (AQL). Datasets in interventional radiological clinics follow
Data: The Data module provides the integration with a systematic workflow, starting from the image acqui-
the low-level functionality that is responsible for stor- sition in DICOM format to the final generation of a
ing the data in the cache storage and further in the tape treatment record. During each step of the workflow,
storage for long term archival. This data storage rep- the DICOM images are subject to image manipula-
resents the PACS server, which is enriched with the tions and diagnostic information is extracted; these
high-performance computing (HPC) cluster for en- datasets are hence enriched with essential metadata
abling processing of the DICOM dataset, where these describing the diagnostic details at each step. More-
data processing services (algorithms) are deployed on over, additional and related datasets might be created
the HPC. Following are functionalities that extend the as well. To manage these datasets, we described the
underlying PACS server. complete flow of the DICOM datasets and metadata
• Data Preservation: The Data Preservation submod- beginning from the Data Acquisition system (DAQ)
ule provides with the checksum of the dataset that and the treatment to making it accessible to clinicians
is to be ingested in IPDR. This checksum is main- for finding similar cases or for quality assurance rea-
tained in the PREMIS metadata schema for verify- sons; and to use it for documentation. The complete
ing the consistency of a file during data transfers workflow, described in our example case consists of
through Generic Client. eight steps as shown in Figure 2. (1) The workflows
begins when the either raw DICOM dataset acquired
• Data Analysis and Curation: The various com-
from the CT scanner system is made available to the
munity specific data analysis and curation algo-
Generic Client. (2) The Generic Client is entirely au-
rithm are registered in these submodules. The data
tomated, it performs the registration of the dataset to
processing algorithms are deployed as individual,
be ingested by extracting the base metadata from the
reusable processes that expose a unique REST end-
DICOM metadata section, translates it into the CSMD
point, which is used when assembling a scien-
standard and registers the dataset. (3) A successful
tific workflow (necessary for composing the BPEL
registration of base metadata triggers the transfer of
workflow).
data to the PACS server. (4) The complete metadata
6 http://www.loc.gov/standards/mets/ from the DICOM dataset is extracted, modelled and
239
HEALTHINF 2017 - 10th International Conference on Health Informatics
Figure 2: Flow of data and metadata from clinical data acquisition and treatment system to IPDR.
validated. (5) The metadata is ingested to the ded- Image processing, 3D reconstruction and surface ren-
icated metadata storage database. (6) Metadata is dering are available. However, these workflows are
segregated as descriptive or provenance metadata and often distributed, and the various applications partici-
stored either in document data model or graph data pating in the execution of the workflow are deployed
model of ArangoDB. (7) The DICOM dataset from on a stand-alone hosting system. Various endeavors
the cache storage is transferred to archive storage for address the handling of provenance and workflows
long-term preservation. The preservation metadata in these distributed agent oriented workflows (Kifor
associated with the dataset is updated in the meta- et al., 2006) (Zhang et al., 2009).
data storage. (8) The metadata is indexed for enabling Custom data processing workflows: In the case of
free-text search and allowing discovery of the datasets custom data processing workflows the various data
from the IPDR. The data and metadata is accessible in processing steps (algorithms) are typically defined
the Vaadin based user interface which is connected to and implemented for advanced data processing in the
the IPDR through various REST services. clinical environment. Currently, to coordinate and
trace the execution of the workflow steps, the work-
list embedded in the DICOM file is referred. The
DICOM worklist (to-do lists) hold the list of tasks
4 WORKFLOW AND that are to be performed on DICOM datasets. How-
PROVENANCE ever, DICOM does not have the capability to model
and maintain the provenance traces associated with
A successful completion of the Schedule (Acquisi- the data. Even though the worklist offers a conve-
tion) Workflow (SWF) generates the various DICOM nient technique for maintaining the workflow steps,
files that are stored in the PACS server. The Post- it obviously lacks an accepted workflow and prove-
Processing Workflow (PAWF) is the logical extension nance standard. For modelling comprehensive prove-
of the SWF (Liu and Wang, 2010), which aims for de- nance information, i.e. both prospective provenance
riving additional qualitative and quantitive data that is (workflow execution plan) and retrospective prove-
beneficial for improving the patient’s treatment. Typ- nance (runtime events) (Zhao et al., 2006), the W3C
ically, in a clinical environment, there are two cate- ProvONE standard is adopted. Furthermore, to en-
gories of post-processing workflows. able reuse of these data processing algorithms, they
Distributed application (agent) oriented work- are registered as web-services in the Data Analysis
flows: In the case of distributed agent oriented work- and Curation sub-module of the IPDR. The interme-
flows, various information systems are controlled un- diate data generated after each step in the workflow
der the authority of different health care actors such is ingested in the IPDR PACS server, thus preventing
as physicians, general practitioners and various hos- unnecessary repetition of the workflow.
pital departments. Currently, distributed agent ori- Using an existing angioscopy image analysis
ented post-processing workflow steps involves appli- workflow (Maksimov et al., 2009) (Brockmann et al.,
cations, such as Computer Aided Detection (CAD), 2010), the various processing steps are deployed as
240
Managing Provenance for Medical Datasets - An Example Case for Documenting the Workflow for Image Processing
241
HEALTHINF 2017 - 10th International Conference on Health Informatics
242
Managing Provenance for Medical Datasets - An Example Case for Documenting the Workflow for Image Processing
bility of complex image processing workflows using gineering grid-based medical software. International
integrated workflow engine, (e) large-scale metadata Journal of Medical Informatics, 76(8):621 – 632.
harvesting through standard OAI-PMH protocol. Goland, Y., Whitehead, E., Faizi, A., Carter, S., and Jensen,
To demonstrate the handling of image processing D. (1999). Http extensions for distributed authoring–
webdav. Technical report.
workflow with capturing of its associated provenance,
Kifor, T., Varga, L. Z., Vazquez-Salceda, J., Alvarez, S.,
the angioscopy workflow modelled in BPEL was ex- Willmott, S., Miles, S., and Moreau, L. (2006). Prove-
ecuted using a workflow engine integrated with the nance in agent-mediated healthcare systems. IEEE In-
IPDR, and the associated provenance was automati- telligent Systems, 21(6):38–46.
cally modelled in ProvONE (Figure 3). Liu, Y. and Wang, J. (2010). PACS and digital medicine:
However, the data exchange approach uses safe essential principles and modern practice. CRC Press.
data transfer strategies but are not yet adapted to clin- Maksimov, D., Hesser, J., Brockmann, C., Jochum, S., Di-
ical needs. An integration of i2b2 and a data ware- etz, T., et al. (2009). Graph-matching based cta. IEEE
house that collects all clinical data in combination Transactions on Medical Imaging, 28(12):1940–1954.
with technologies such as PCORnet7 offers the poten- Marcheschi, P., Ciregia, A., Mazzarisi, A., Augiero, G., and
Gori, A. (2009). A new approach to affordable and re-
tial to standardised data exchange for studies and con-
liable cardiology pacs architecture using open-source
sultation and will thereby allow using our architecture technology. In 2009 36th Annual Computers in Car-
to be integrated into a clinic-wide information system diology Conference (CinC), pages 537–540.
of the next generation. In particular, this strategy is Matthews, B. (2015). Csmd: the core scien-
considered to be integrated into data integration cen- tific metadata model. Online http://icatproject-
tres that are currently planned at the university med- contrib.github.io/CSMD/csmd-4.0.html.
ical centre Mannheim (UMM) and the MIRACUM8 Mildenberger, P., Eichelberg, M., and Martin, E. (2002).
consortium that is currently funded by the German Introduction to the dicom standard. European Radiol-
Ministry of Research and Education (BMBF). The ogy, 12(4):920–927.
technology is built upon developments of the BMBF- OASIS (2007). Standard, O.A.S.I.S: Web services busi-
ness process execution language version 2.0. Online
project LSDMA9 . http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.
Prabhune, A., Stotzka, R., Jejkal, T., Hartmann, V., Bach,
M., Schmitt, E., Hausmann, M., and Hesser, J. (2015).
REFERENCES An optimized generic client service api for managing
large datasets within a data repository. In Big Data
Computing Service and Applications (BigDataSer-
Allcock, W., Bresnahan, J., Kettimuthu, R., et al. (2005). vice), 2015 IEEE First International Conference on,
The globus striped gridftp framework and server. In pages 44–51.
Proceedings of the 2005 ACM/IEEE conference on Prabhune, A., Zweig, A., Stotzka, R., Gertz, M., and
Supercomputing, page 54. IEEE Computer Society. Hesser, J. (2016). Prov2ONE: An Algorithm for
Bian, J., Topaloglu, U., and Lane, C. (2009). Eir: En- Automatically Constructing ProvONE Provenance
terprise imaging repository, an alternative imaging Graphs, pages 204–208. Springer Publishing.
archiving and communication system. In 2009 Annual Sanderson, R., Ciccarese, P., Van de Sompel, H., Bradshaw,
International Conference of the IEEE Engineering in S., Brickley, D., a Castro, L. J. G., et al. (2013). Open
Medicine and Biology Society, pages 2168–2171. annotation data model. W3C community draft.
Brockmann, C., Jochum, S., Hesser, J., et al. (2010). Graph- Sandoval, J. (2009). Restful java web services: Master core
matching-based computed tomography angiography rest concepts and create restful web services in java.
in peripheral arterial occlusive disease. Clinical Imag- Packt Publishing Ltd.
ing, 34(5):367 – 374.
Zeilinger, G., Montgomery, O., Evans, D., et al. (2010).
Davidson, S. B., Boulakia, S. C., Eyal, A., Ludäscher, B., The dcm4che project. Online Sourceforge project
McPhillips, T. M., Bowers, S., Anand, M. K., and https://sourceforge.net/projects/dcm4che/.
Freire, J. (2007). Provenance in scientific workflow
Zhang, J., Lu, X., Nie, H., Huang, Z., and van der Aalst,
systems. IEEE Data Eng. Bull., 30(4):44–50.
W. M. P. (2009). Radiology information system: a
Dolin, R. H., Alschuler, L., Boyer, S., Beebe, C., Behlen, workflow-based approach. International Journal of
F. M., Biron, P. V., and Shabo (Shvo), A. (2006). Computer Assisted Radiology and Surgery, 4(5):509–
Hl7 clinical document architecture, release 2. Jour- 516.
nal of the American Medical Informatics Association,
Zhao, Y., Wilde, M., and Foster, I. (2006). Applying
13(1):30–39.
the Virtual Data Provenance Model, pages 148–161.
Estrella, F., Hauer, T., McClatchey, R., Odeh, M., Rogulin, Springer Berlin Heidelberg, Berlin, Heidelberg.
D., and Solomonides, T. (2007). Experiences of en- Zhu, N. Q. (2013). Data visualization with D3. js cookbook.
7 www.pcornet.org Packt Publishing Ltd.
8 www.miracum.de
9 www.helmholtz-lsdma.de
243
Internet of Things Controlled Home Objects for the Elderly
Keywords: Systematic Literature Review, Internet of Things, Visualization, Elderly Assistance, Caretaker, Remote
Assistance, Assisted Living.
Abstract: The number of elderly people suffering from physical or cognitive difficulty is increasing continuously. El-
derly people prefer to live in their familiar environment where they can easily perform different activities of
their daily life which is also good for their mental and physical well-being. Internet of Things is a mecha-
nism through which any objects can be monitored, controlled, and manipulated. In order to develop efficient
application for the elderly living at home independently, the researcher should be aware of the home objects
as well as of the living environment. This study uses systematic literature review to determine applications
developed to assist elderly people inside their home. A total of 25 primary studies are identified. With the
analysis of those studies, important and relevant objects in the daily life of the elderly are identified. Using the
results from the review, a new scenario of home environment is visualized. The visualization is expected to
provide caretakers with a better view of the living condition of the elderly and position and state of the home
objects. This new home scenario is expected to offer a secure and easy living environment for the elderly,
where Internet of Things can be used to control all the frequently used home objects by the elderly.
1 INTRODUCTION can live longer and safer if they stayed in their own
home environment (Bassi and Horn, 2008). Their
Internet of Things (IOT) is a developing phenomenon friends and family also feel secure to have them in
in the field of technological advancement as well as in their own house in comparison to hospitals and care
research domain (Atzori et al., 2010; Xu et al., 2013). homes (Arcelus et al., 2007). Hospitals and health-
The main principle of IOT is continuous monitor and care centres may not be able to provide services to all
control of everyday objects or things over the inter- who require (Arcelus et al., 2007). Smart homes can
net. The thing in IOT has no limitation and can be provide automation of domestic tasks, easier commu-
any objects that are used in day to day life (Bassi nication, higher security, and are adaptive to modern
and Horn, 2008). The thing can be any living or human needs as well as social needs (Morris et al.,
non-living object; from electronic devices to foods, 2013; Lê et al., 2012).
clothes and furniture we use in our daily life, from The aim of technological advancement for elderly
animals like cow, dog, cats, and rats, to plants and is to provide them a sense of independence even if
trees (Madakam et al., 2015). An object or thing has they are physically or cognitively incapable. Avoid-
its own unique identity, which allows communication ing diseases and encouraging healthy living is also a
between not only humans, but also between objects prime concern (Tran, 2002). Everyday activities that
(Madakam et al., 2015). With availability of continu- are easy to accomplish can be problematic as people
ous internet connection, all the connected objects can get older. Simple tasks like brushing teeth, turning the
be monitored regularly through an interconnected net- tap off, switching TV off or on, and taking medicines
work. can get tougher with age (Morris et al., 2013). IOT is
Over 7% of the world population are over 65 years a step forward in helping elderly complete these activ-
of age and the number is expected to increase 20% by ities without physical presence of a caretaker, which
the year 2050 (Morris et al., 2013). Also, by 2035, the also helps to minimize their expenses (Arcelus et al.,
number of people affected by dementia is expected to 2007). IOT will also help one caretaker to moni-
double. Hence there is requirement of policies and tor and assist multiple elderly patients from a remote
resources to meet the need of the aging population location. With IOT, caretakers have the freedom to
as well as of those suffering from dementia. Elderly
244
Dawadi, R., Asghar, Z. and Pulli, P.
Internet of Things Controlled Home Objects for the Elderly.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 244-251
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Internet of Things Controlled Home Objects for the Elderly
manipulate the home objects themselves and control different objects through a global infrastructure, in-
them. ternet (Madakam et al., 2015). IOT have been used
Above mentioned concerns motivated us to con- successfully in various fields such as assisted living,
duct a study to find different IOT based applications e-health, domotics, enhanced learning, surveillance,
targeted for the elderly people living alone. Moreover, environment monitoring, health monitoring, critical
the goal of the study is to determine different kinds infrastructure monitoring, etc. (Atzori et al., 2010;
of home objects dealt in those applications. Figure 1 Gubbi et al., 2013).
shows the overall idea of the study. This study is ben- The main strength behind IOT is that using inter-
eficial for those researchers and developers who are connected devices, it can have high impact on several
using IOT for the care and well-being of the elderly. aspects of our everyday life (Atzori et al., 2010). Con-
The paper is structured as follows: section 2 presents sidering the increasing number of research on IOT
an overview of previous studies. Section 3 explains in recent years (Stankovic, 2014), it can be expected
the research method carried out for the study, and sec- that IOT will play a greater role in our daily lives
tion 4 presents the findings of the study, limitation of in upcoming years. IOT can help in digitalization
the study, and scope for future research. Section 5 of day to day activities, providing security in build-
concludes the paper highlighting the main contribu- ings, and decreasing the energy consumption of de-
tion of our work. vices. IOT is not an independent system, but it can
be regarded as a critical, integrated infrastructure by
the use of which many applications and services can
operate (Stankovic, 2014).
245
HEALTHINF 2017 - 10th International Conference on Health Informatics
3 RESEARCH METHOD
This section explains the research method utilized in
this study. Systematic Literature Review (SLR) was
selected as a research method, which is a means of
identifying, evaluating, and interpreting all research
relevant to the particular area of interest or research
question (Kitchenham, 2004). SLR can be used
to verify or contradict any research hypothesis and
can also lead to new research activities (Kitchenham,
2004; Biolchini et al., 2005).
The steps followed in the SLR were based on the
guidelines for conducting a SLR (Kitchenham, 2004;
Kitchenham and Charters, 2007). SLR, in general, is
more time consuming than other traditional reviews
and provides information about the effects of some
phenomenon across a wide range of settings and em-
Figure 2: IOT and elderly, based on (Gubbi et al., 2013). pirical methods (Kitchenham, 2004). The first step in
SLR is the formation of the research protocol. After
2015). To ease this concern, Old Birds, a web applica- a research area or a topic is finalized, it is necessary
tion prototype was implemented (Korvala and Raap- to create a review protocol that consists of research
pana, 2015). It is run by a game engine that was questions, inclusion and exclusion criteria, quality as-
originally built for remote care giving (Pulli et al., sessment criteria, keywords used to search literature,
2012). The elderly and their surrounding environment steps for reviewing the literature, and designated syn-
are presented in gaming avatars, which helps to mini- thesis of the findings (Kitchenham, 2004; Biolchini
mize the concerns of privacy, as shown in figure 3. et al., 2005).
The following two research questions were se-
lected for the study:
• RQ1: What are the different areas inside the house
where IOT can be applied for the elderly?
• RQ2: What kind of home objects necessary for
the elderly are controlled by IOT based applica-
tions?
The inclusion and exclusion criteria used for the
review are presented in table 1. Along with those,
following quality assessment criteria were created to
select the primary studies that were as relevant to the
research questions as possible:
1. Is the application discussed in paper targeted to
Figure 3: Old Birds simulation environment, (Firouzian and old people living alone?
Nissinen, 2013).
2. How much is IOT discussed as part of everyday
Currently, one of the main challenges for IOT sys- life for the user?
tem designers is to design a system that can help el- 3. Was the application an experiment, controlled ob-
derly in everyday activities as well as be supported servation study, observation study without control
by health care workers (Bassi and Horn, 2008). This groups or just theoretical?
rapid shift of the need of medical services for in-house
4. Does the study clarify the problems faced during
care (Lee et al., 2013) provides the developers of IOT
implementation?
based applications with a new and productive area to
deal with. Daily monitoring is enhanced by IOT thus 5. Does the study provide details of the objects con-
increasing the quality of life and health of elderly peo- trolled by the applications?
ple (Tran, 2002; Yang et al., 2014). 6. Does the study is concentrated in daily activities
inside the home or outside.The labels consists of
sequential numbers?
246
Internet of Things Controlled Home Objects for the Elderly
247
HEALTHINF 2017 - 10th International Conference on Health Informatics
can know the status of the objects continuously and 1997). The home objects from table 3 were thus uti-
determine the changes in the state of the object due lized to vision a scenario in the day of an elderly per-
to any activity of the elderly. With such visualization, son. This visualization is intended to showcase an el-
presence of camera is also redundant which will en- derly person in different areas of the house and show
courage old people to accept the technology as they different IOT enabled home objects that they have
regard technology, mainly video surveillance, as an to deal with for their daily activities. The areas of
intrusion to their privacy (Arcelus et al., 2007). the house where elderly require assistance from the
Visualization is a method to infer new knowl- caretakers were selected as: bedroom, living room,
edge from collected information to get a comprehen- kitchen, dining room, and bathroom.
sive view of the space of interest (Gershon and Eick, The visualization will help the caretaker to deter-
248
Internet of Things Controlled Home Objects for the Elderly
249
HEALTHINF 2017 - 10th International Conference on Health Informatics
250
Internet of Things Controlled Home Objects for the Elderly
mote patient monitoring: what impact can data analyt- Sung, W.-T. and Chang, K.-Y. (2014). Health parameter
ics have on cost? In Proceedings of the 4th Confer- monitoring via a novel wireless system. Applied Soft
ence on Wireless Health, page 4. ACM. Computing, 22:667–680.
Liang, P.-C. (2016). Cost-effective design of real-time home Tang, L. Z. W., Ang, K. S., Amirul, M., Yusoff, M. B. M.,
healthcare telemonitoring based on mobile cloud Tng, C. K., Alyas, M. D. B. M., Lim, J. G., Kyaw,
computing. PhD thesis, University of Surrey. P. K., and Folianto, F. (2015). Augmented reality con-
López-de Ipiña, D., Dı́az-de Sarralde, I., and Zubı́a, J. G. trol home (arch) for disabled and elderlies. In In-
(2010). An ambient assisted living platform integrat- telligent Sensors, Sensor Networks and Information
ing rfid data-on-tag care annotations and twitter. J. Processing (ISSNIP), 2015 IEEE Tenth International
UCS, 16(12):1521–1538. Conference on, pages 1–2. IEEE.
Luo, X., Liu, T., Liu, J., Guo, X., and Wang, G. (2012). De- Touhy, T. A. and Jett, K. F. (2013). Ebersole & Hess’ To-
sign and implementation of a distributed fall detection ward Healthy Aging: Human Needs and Nursing Re-
system based on wireless sensor networks. EURASIP sponse. Elsevier Health Sciences.
Journal on Wireless Communications and Network- Tran, B. Q. (2002). Home care technologies for promot-
ing, 2012(1):1. ing successful aging in elderly populations. In En-
Madakam, S., Ramaswamy, R., and Tripathi, S. (2015). In- gineering in Medicine and Biology, 2002. 24th An-
ternet of things (iot): A literature review. Journal of nual Conference and the Annual Fall Meeting of the
Computer and Communications, 3(05):164. Biomedical Engineering Society EMBS/BMES Con-
ference, 2002. Proceedings of the Second Joint, vol-
Morris, M. E., Adair, B., Miller, K., Ozanne, E., Hansen,
ume 3, pages 1898–1899. IEEE.
R., Pearce, A. J., Santamaria, N., Viega, L., Long, M.,
and Said, C. M. (2013). Smart-home technologies to Vardoulakis, L. P., Ring, L., Barry, B., Sidner, C. L., and
assist older people to live well at home. Journal of Bickmore, T. (2012). Designing relational agents as
aging science, 1(1):1–9. long term social companions for older adults. In In-
ternational Conference on Intelligent Virtual Agents,
Neßelrath, R., Haupert, J., Frey, J., and Brandherm, B.
pages 289–302. Springer.
(2011). Supporting persons with special needs in
their daily life in a smart home. In Intelligent Envi- Williams, D., Ahamed, S. I., and Chu, W. (2014). Designing
ronments (IE), 2011 7th International Conference on, interpersonal communication software for the abilities
pages 370–373. IEEE. of elderly users. In Computer Software and Appli-
cations Conference Workshops (COMPSACW), 2014
Panicker, N. V. and Kumar, S. (2015). Design of a tele- IEEE 38th International, pages 282–287. IEEE.
monitoring system for detecting falls of the elderly. In
Green Computing and Internet of Things (ICGCIoT), Wu, Q., Shen, Z., Leungy, C., Zhang, H., Cai, Y., Miao,
2015 International Conference on, pages 800–803. C., et al. (2013). Internet of things based data driven
IEEE. storytelling for supporting social connections. In
Green Computing and Communications (GreenCom),
Pulli, P., Asghar, Z., Siitonen, M., Niskala, R., Leinonen, 2013 IEEE and Internet of Things (iThings/CPSCom),
E., PitkPitkanen, A., Hyry, J., Lehtonen, J., Kramar, IEEE International Conference on and IEEE Cy-
V., and Korhonen, M. (2012). Mobile augmented ber, Physical and Social Computing, pages 383–390.
teleguidance-based safety navigation concept for se- IEEE.
nior citizens. In 2nd. International Conference on Ap-
plied and Theoretical Information Systems Research Xu, G., Ding, Y., Zhao, J., Hu, L., and Fu, X. (2013). Re-
(2nd. ATISR2012), pages 1–9. search on the internet of things (iot). Sensors & Trans-
ducers, 160(12):463.
Raad, M. W., Sheltami, T., and Shakshuki, E. (2015).
Ubiquitous tele-health system for elderly patients with Yang, L., Ge, Y., Li, W., Rao, W., and Shen, W. (2014). A
alzheimer’s. Procedia Computer Science, 52:685– home mobile healthcare system for wheelchair users.
689. In Computer Supported Cooperative Work in Design
(CSCWD), Proceedings of the 2014 IEEE 18th Inter-
Rusu, L., Cramariuc, B., Benţa, D., and Mailat, M. (2015). national Conference on, pages 609–614. IEEE.
Implementing bpmn 2.0 scenarios for aal@ home so-
lution. International Journal of Computers Communi- Zgheib, R., Conchon, E., et al. (2015). A semantic web-
cations & Control, 10(2):230–237. of-things architecture for monitoring the risk of bed-
sores. In 2015 International Conference on Com-
Savola, R. M., Savolainen, P., Evesti, A., Abie, H., and Si- putational Science and Computational Intelligence
hvonen, M. (2015). Risk-driven security metrics de- (CSCI), pages 318–323. IEEE.
velopment for an e-health iot application. In Infor-
mation Security for South Africa (ISSA), 2015, pages
1–6. IEEE.
Sohn, S. Y., Bae, M., Lee, D.-k. R., and Kim, H. (2015).
Alarm system for elder patients medication with iot-
enabled pill bottle. In Information and Communica-
tion Technology Convergence (ICTC), 2015 Interna-
tional Conference on, pages 59–61. IEEE.
Stankovic, J. A. (2014). Research directions for the internet
of things. IEEE Internet of Things Journal, 1(1):3–9.
251
A Model Proposal for Augmented Reality Game Creation to
Incentivize Physical Activity
Keywords: Gamification, Augmented Reality, Health, Fitness, Game Design, Mobile Applications.
Abstract: Obesity and a sedentary lifestyle are relevant issues in today’s society. Even though different resources can
be used to approach this problem, technology provides endless possibilities to fight against this problem. This
article presents the results of a model to create augmented reality games where goals are achieved by doing
physical activity (moving between different places). In order to evaluate the model, a prototype was built and
presented to 50 participants. The results obtained indicated that an important percentage of the interviewees
were attracted to the idea of playing a game to increase their physical activity.
252
Cicció, J. and Quesada, L.
A Model Proposal for Augmented Reality Game Creation to Incentivize Physical Activity.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 252-259
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
A Model Proposal for Augmented Reality Game Creation to Incentivize Physical Activity
information technology. Alahäivälä and The game is a step and floor counter. The
OinasKukkonen (2016) presented a systematic application includes three settings: competition
literature review that focused on “health mode, collaborative mode, and hybrid mode.
gamification.” The study discussed 32 studies HealthyTogether was evaluated with 18 dyads. The
conducted between 2011 and 2015. Nine of them study found significant step and floor increase in both
were categorized as “increasing physical activity.” cooperation and hybrid mode (up to 21.1% and
Some of the studies in their literature review are 18.2%, respectively) but not in the completion mode
described below. (Y. Chen and Pu, 2014). Another study was carried
Recent technological devices inspire new out that considered solo mode in similar conditions.
applications. By using Microsoft Kinect, Brauner et The researchers found an increase in the amount of
al. (2013) proposed a game to promote physical exercise that was associated with gamification.
fitness that focuses on elderly people. An avatar is Furthermore, they concluded that gamification affects
presented within a garden. The player, through the software design (Giannakis, Chorianopoulos, and
virtual avatar, can pick up carrots from the soil or Jaccheri, 2013).
fruits and vegetables from trees and the soil. An Spillers and Asimakopoulos (2014) discussed
experiment was conducted with 70 users. Most of the how extended gamification and social elements in the
participants (72%) stated that this game increased mobile and the fitness context can improve people’s
their motivation to exercise on a regular basis motivation. Indeed, a positive short term behavioural
(Brauner et al., 2013). change was observed in their research project.
Nintendo Wii Fit activity games were also Zuckerman and Gal-Oz (2014) evaluated the
evaluated. A group of beginners and non-beginners effectiveness of virtual rewards. They argued that
played with Wii Fit games in different settings. The according to the self-determination theory (SDT) of
former was positive about the games when combining human motivation, three innate psychological needs
fitness and fun. However, the latter was unsatisfied determine motivation: (1) competence, (2) autonomy,
with the Wii Fit as a fitness tool (Reynolds, Sosik, and and (3) relatedness. Results showed that daily
Cosley, 2013). walking or running time while interacting with an
HealthyTogether is an Android application that application was significantly higher than walking
uses an activity tracker (FitBit) that was developed in time without any application interaction.
2014. By following simple rules, the user can win
badges and points (karma points).
253
HEALTHINF 2017 - 10th International Conference on Health Informatics
This section describes the elements that all AR games The game should have different goals that can be
achieved as a result of the interaction between the
that involve moving from one place to another should
include. These elements are the result of years of user and the application (Novak, 2012). The game
developing different video games of diverse genres. must have a list of customized daily goals for the
player. The goals will be based on (1) how many steps
Aside from the expertise acquired through the years,
some of the key components explained in this article have been made, (2) the distance, either by walking
can be found in the most popular games available in or running, that has been traveled, and (3) how many
stairs or floors have been climbed.
the market (Novak, 2012).
The games that use this model should comply The game should have an algorithm capable of
with the following requirements: a mobile device that creating customized goals based on the users’
performance. The idea is to ask players for an extra
has an active internet connection, a GPS, and a
camera. effort every day they use the game. This idea can be
Figure 1 shows the proposed model with its achieved by presenting different places to visit in a
single day or by including a far place to go.
components. These components include game design,
statistics, user information, anti-cheat control, When the goals depend on the users, the game
augmented reality, notifications, data collector, and provides a personalized experience and will get the
highest possible retention ratio. If the user is falling
social interaction. The following sections describe the
previous concepts. behind, aspects such as distance and time should be
easier for them to complete.
The game should spawn points on the map. Those
3.1 Game Design points will represent the places the player should visit
in order to make some kind of progress in the game.
Game design is an essential component that includes
rules, gameplay, and storyline. All of them combined In addition to spawning points all over the map, the
facilitate the interaction between players in case the user can be encouraged to get to a specific place,
game has health purposes (Novak, 2012). within a time limit, by walking or running. Some
goals can be based on the number of times a specific
3.1.1 Game Mechanics place is visited within a timeframe. Similarly, the
player can achieve a goal by traveling the double or
There are several game mechanics that can be thrice of the standard goal.
incorporated in order to incentivize people to do
exercise. We consider that there are four main game 3.1.3 Story
mechanics—steps, walking, running, and floor
climbing— that can be used in order let the player An essential part in today’s games is their story. The
interact with the game. By using and mixing these story is the way people can get identified with the
four mechanics, different types of exercises can be game and have an urge to keep playing. All games
covered (from casual training to more complex have a story which can be as simple or complex as the
exercise routines). creators want (Dille and Zuur Platen, 2008). The idea
Some actions can be followed in order to is to have an easy-to-pick-up story to attract more
promote physical activity in the players (González et people into the game. This should be aligned with the
al., 2016). For instance, if it is assumed that users do goals described in Section 3.1.2. In other words, the
not exercise regularly, they can start using the stairs users have to be motivated during the game in order
instead of elevators to get to their destiny. Moreover, to keep moving through the different levels.
they can start walking short distances every day. Another important aspect is to have a story that
The game should be able to distinguish between has a replay value. The story cannot be linear with a
walking and running. This can be achieved by using beginning and end because the main goal is to keep
a combination of the GPS and the accelerometer of people interested in exercising from a mid to a long
the mobile device. By using the correct type of term. In order to do this, the story can have
movement and velocity, the game can provide users multiplayer elements that give an additional replay
with different options in terms of the quests to be value to the players.
accomplished and the type of loot to be earned. The two techniques that can be used with the
players are to have them compete by themselves or to
have them cooperate among each other to get a
common goal (Novak, 2012). Aside from the
254
A Model Proposal for Augmented Reality Game Creation to Incentivize Physical Activity
retention ratio, these techniques can help to attract Developers should compare users’ performance
more users into the game in less time because its between different timeframes by using friendly-via
existence can be easily spread (González et al., 2016). graphics, which include the time users prefer to do
exercise and the average workout time.
3.1.4 Rewards
3.3 User Information
When a goal is achieved, the user should be rewarded
by the effort made while playing the game. The Health-related applications should create a
reward can be a permanent upgrade—like gaining customized experience for their users by gathering
experience for the character, getting perk, or information about their physical activity performance
unlocking new weapons—or a temporary upgrade— (Alahäivälä and Oinas-Kukkonen, 2016). The game
like being healthier and causing more damage for a should ask the players for basic data that includes—
specific amount of time. but not limited to—age, sex, height, weight and how
The rewards are an essential part of any game often he or she does exercise or intends to do it.
because users feel engaged with the story and may The weight data gathered from the user should be
want to do more exercise to get more rewards (Novak, updated on a monthly basis in order to enable
2012). Additionally, they can have a positive impact developers to create more accurate health plans for
on the replay value by making it easier for people to the players. Moreover, the progress made by the users
feel attracted to the content that the game offers. can be tracked while they use the application.
The user information module should keep the raw
3.1.5 User Progression data of how a player has been performing while using
the app. Also, this module should be able to create an
In order to have the highest percentage of retention
estimate of the calories the player has burned within
ratio, the game should make the players feel that they
a specific timeframe. Furthermore, if the users have a
are making progress. This can be done by unlocking
weight or distance target, this module can feed the
the game content as the user goes through challenges
game goals to help them achieve the health goal.
or achieves a goal.
User progression creates the illusion that players
are constantly completing different actions and that
3.4 Augmented Reality
there is a constant purpose and motivation to finish
AR is intended to give users the bridge between
the game (F. X. Chen, King, and Hekler, 2014). The
reality and the game they are playing (Kipper and
story elements and the user progression can give a
Rampolla, 2013). The idea is to collect objects in a
higher replay value to the game because the idea is
real world location and to use them within the
for users to come and play again.
boundaries of the virtual game.
The game should be able to create new goals and
There are several ways AR can be incorporated
objectives based on the characteristics of each user.
into the game. For instance, when a player gets to a
By learning about the players’ habits, the game can
target destination, he or she will have the option to
provide a personalized experience. For instance, the
search a zone and find an object. Once the object is
game can create goals or missions that require more
found by using the device camera, the users will get a
effort when the user is more interested in the game.
reward in the game. By combining these features, the
limits are only set by the developers’ imagination.
3.2 Statistics
Every game that is intended to motivate people to be
3.5 Anti Cheat Control
healthier by doing more exercise should collect and
All games need a mechanism that prevents players
present statistical data (Brauner, Calero Valdez,
from cheating. This particular software piece should
Schroeder, and Ziefle, 2013). With this information,
detect if the player is trying to achieve the goals by
players can learn more about their performance in a
skipping the required exercises.
specific timeframe.
The game should have an algorithm mix that uses
The collected data can be presented in charts and
devices such as the GPS, the gyroscope, and the
in a granular way. The data can include what the user
accelerometer to measure how fast the player is
did in a particular day with an hourly breakout or with
traveling. In fact, these mechanisms can detect if the
their performance within a month, a quarter, a
movements made by the users are possible for human
semester, or any other long-term timeframe.
beings.
255
HEALTHINF 2017 - 10th International Conference on Health Informatics
3.6 Notifications
Notifications remind users to stay active (Brauner et
al., 2013). For instance, notifications let players know
when they have to move either because they have
been inactive for a long time or because they have to
look for bounties or upgrades. Socially speaking,
notifications can tell users when friends are asking for
help, when they want to compete, or when a
cooperative mission is needed.
Notifications should be customized in order to
give users the option to enable or disable data. The
players should decide what kind of information they
want to receive after completing the tasks included in
the notifications in order to avoid any unpleasant
experiences. By providing this possibility, users will
not feel overwhelmed or annoyed if they receive
notifications of activities that they do not want to see. Figure 2: Objectives of the Application Mockup.
3.7 Data Collector (Device) traveled distances, and time spent in a workout. The
second part is an inflow where the users can ask for
One of the most relevant aspects to consider when help in order to complete cooperative and competitive
creating a health-based video game is the device missions.
players need to use. The device has to be to capable
of tracking the movement of the users, their velocity
and the places they visit.
In order to fulfill the previous requirements, the 4 IMPLEMENTATION
device should include at least a GPS to have the
geolocation of the user and to create target points The model of the game that we implemented was
where they should go within a distance range. In based on the model described in Section 3. The model
addition, an accelerometer and a gyroscope are can be used in different game genres such as action,
required to avoid relying only on a GPS connection simulation, and role plays.
and to help reduce the possibility of cheating in the Because a role-playing game (RPG) was set, a
game. story of a brave warrior trying to reclaim his family
Finally, the augmented reality functionality can honor and lands was developed. These lands were
be used if the data collector has a camera and an API stolen by the evil wizard Magrathea. To reclaim them,
that developers can access and use. the warrior needs to go through different dungeons.
When going into the dungeons, the warrior has to
meet some requirements like having a specific level
3.8 Social Interaction
and having a special gear in order to access different
places in the game. In these situations, the user is
Social networks aim at giving more visibility to
required to do some kind of physical activity.
applications or games to help them go viral; hence, a
The game, with the help of AR, will spawn points
social module—planned in two directions— has to be
of interest for the player to get different rewards—an
included as part of the game.
armor, weapons or magical powers. The game also
The first part is an outflow where users can post
rewards persistency because if the players exercise
achievements, rewards, perks, and missions in
every day, their virtual character becomes more
different social networks. In addition, players can powerful; otherwise, the virtual character becomes
share with other players their real life progress, weaker and loses his or her lands.
256
A Model Proposal for Augmented Reality Game Creation to Incentivize Physical Activity
257
HEALTHINF 2017 - 10th International Conference on Health Informatics
From the total number of participants interested in decreased. Due to the fact that being attracted to video
the application, 100% mentioned that having access games is not based on age or sex, new technologies
to statistics over time to see their monthly or quarterly have the possibility of reaching more people.
progress is extremely useful. Approximately 92 % The findings also state that the proposed model
considered that they need daily statistics, and 85% of provides the main components that a game should
the participants need the application to tell them when have in order to incentivize people to do exercise.
to do exercise. This is possible because of the mechanics proposed in
The participants were asked if they knew what the game design section, which provide an overview
AR is. For those who were unsure or did not know, a of what a game should have in order to increase the
video with concrete examples was used to explain the number of engaged players. Users are attracted to a
concept to the participants. After seeing the mockups game when it has a high-replay value, an interesting
of the game and claiming that they were interested in story, and cooperative and competitive elements.
it, 85% of the participants said that the AR component The participants also highlighted the importance
was essential and attractive in the game. of having player statistics which help to gather data
of the users’ real life progress in short and medium
term. This part of the module is fundamental because
AR and Fitness Game if data is not quantified, users cannot determine if
50 they are making progress in the game.
Some participants were really worried about the
45 idea of playing in public places due to security
40 problems. One possible solution is to consider places
with low crime rates to be part of the game.
35 When developing a AR and Fitness Game, the
21
30 lack of guidelines to design this kind of software
increases the cost of the project and the effort that is
Users
ACKNOWLEDGEMENTS
6 DISCUSSION
This work was partially supported by the Escuela de
Ciencias de la Computación e Informática at
The results revealed that people who do not exercise
Universidad de Costa Rica (ECCI-UCR).
are more willing to change their routine if they find a
strong reason to do so. In this project, ‘this reason’ is
called the AR game. Similarly, people who already
have an exercise routine also feel attracted to this kind REFERENCES
of game application.
Based on the results obtained, the massive use of Alahäivälä, T., Oinas-Kukkonen, H., 2016. Understanding
these technologies (AR and Smartphones) should be persuasion contexts in health gamification: A
taken into account by many developers because they systematic analysis of gamified health behavior change
support systems literature. In International Journal of
incentivize people do change their sedentary lifestyle.
Medical Informatics.
By changing users’ habits, other problems such as Brauner, P., Calero Valdez, A., Schroeder, U., Ziefle, M.,
diabetes and hypertension can be avoided or at least 2013. Increase physical fitness and create health
258
A Model Proposal for Augmented Reality Game Creation to Incentivize Physical Activity
259
Medical Imaging: Exams Planning and Resource Assignment
Hybridization of a Metaheuristic and a List Algorithm
Abstract: The presented work is about optimization of the hospital system. An existing solution is the pooling of
resources within the same territory. This may involve different forms of cooperation between several hospitals.
Problems of sizing, planning and scheduling may be considered. We define the problem of activities planning
with resource assignment. To solve this problem, we propose a hybridization between a metaheuristic and a
list algorithm. Single based metaheuristics are used. This proposition requires a new encoding inspired by
permutation problems. This method is easy to apply: it combines already known methods. With the proposed
hybridization, the constraints to be considered only need to be integrated into the list algorithm. For big
instances, the solver used as a reference returns only lower and upper bounds. The results of our method
are very promising. It is possible to adapt our method on more complex issues through integration into the
list algorithm of the constraints. It would be particularly interesting to test these methods on real hospital
authorities to assess their significance.
260
Klement, N., Grangeon, N. and Gourgand, M.
Medical Imaging: Exams Planning and Resource Assignment - Hybridization of a Metaheuristic and a List Algorithm.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 260-267
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Medical Imaging: Exams Planning and Resource Assignment - Hybridization of a Metaheuristic and a List Algorithm
261
HEALTHINF 2017 - 10th International Conference on Health Informatics
An exam should be done before a period at the About the comfort of the patient, the criterion is
latest, called a due date. Each exam has a known pro- the number of exams done at their reference place. If
cessing time which depends on the assigned human some exams cannot be done at their reference place,
and material resources. Each exam starts at one pe- the distances between the reference places and the ef-
riod and ends at the same one. Each exam has a refer- fective ones may be minimized.
ence place, where it should be done, if possible. About the medical criterion, the number of ex-
An exam needs a given number of human re- ams done before their due dates has to be maximized.
sources and one material resource. All required re- Thus, if a patient needs other exams, the next ones
sources must be compatible with each other. By defi- could be done on time. If an exam is planned after its
nition, an exam is compatible with some material re- due date, the tardiness may be minimized.
sources, so the assigned material resource must be
compatible with the exam. This material resource be- 3.3.2 Constraints
longs to a type, so the assigned human resources must
have the needed skill to use this type of material re- Constraints that Must Be Respected
source. The place where the exam is done is deduced • Each exam must be assigned to human resources,
from the one where is located the assigned material one material resource and one period. The consid-
resource. ered human resources must be assigned during the
period at the place where the considered material
3.3 Decision Subsystem resource is located.
• Compatibility between the material resource and
The objective is to develop a model which, from a
the exam: the assignment must satisfy the given
set of exams, builds a planning associating the triplet
list of incompatibilities between exams and mate-
{exam, human resources, material resource} to a pe-
rial resources.
riod. The study is made in a predictive approach, all
the exams can be treated since the beginning of the • Compatibility between skill of the human re-
planning horizon. The objective of this model is not source and the type of the material resource: for
to schedule exactly the exams but to assign one pe- each exam, the human resource must be able to
riod to each exam. This planning must optimize some work on the considered material resource.
criteria and respect some constraints. • If a human resource can move during the plan-
ning horizon, its moves are constrained: a human
3.3.1 Criteria resource can only work at one place during one
period.
Three categories of criteria can be defined: econom-
ical, about the comfort of the patient, and about the
proper functioning of the HGT. Constraints that May Be Respected
Concerning the economical aspects, criteria are • Exams should be done before their due dates and
about the costs. Occupation rates of each place, each at their reference place.
material resource and each human resource help to • Material resources and human resources may be
ensure the proper use of these entities. To be the most used or work during their opening schedule. Oth-
economic, these occupation rates have to be maxi- erwise, additional time is considered as overtime.
mized. However, it can be preferable to define a se- Overtime is limited in time.
curity margin, so the HGT can be reactive in case
of hazard. All exams are planned during the con-
sidered planning horizon. The makespan is the pe-
riod assigned to the last exam. It ensures that all ex- 4 CONSIDERED PROBLEMS
ams are assigned as soon as possible. The smaller
the makespan is, more time remains free at the end The considered problem is defined as follow: exams
of the planning horizon to potentially treat the next planning and assignment of needed material and hu-
exams. The number of moves of human resources in man resources. The previous analysis was about the
the HGT should be considered, as well as overtime of complete problem. Some hypothesis are made to di-
human and material resources. Overtime and moves vide this complete problem into three problems.
have a cost for the HGT. It is better to minimize them.
But it can be interesting to allow some overtime or 4.1 Hypothesis
some moves to increase the number of exams during
the considered period. The following hypothesis are made:
262
Medical Imaging: Exams Planning and Resource Assignment - Hybridization of a Metaheuristic and a List Algorithm
• Only one human resource and one material re- packed items has to respect the capacity of the bins.
source are needed to perform exams. Human re- Each item has to be assigned once and only once.
sources are compatible with one or several types
of material resources. 4.3.1 Without Human Resources
• Processing time of the exams are given and fixed.
Considering Problem 1, the aim is to assign exams
• Opening schedules of material resources are equal to a material resource during a period. The planning
in every periods. horizon is made by couples (resource, period). The
• To each exam, the release date is equal to the date objective is to assign exams to couples (resource, pe-
of appointment decision. These dates are equal to riod). Exams have to be done as soon as possible: the
zero: all exams are known at the beginning of the aim is to minimize the number of couples, (= the num-
planning. ber of bins). An example is given by Figure 1, where
the assignment of exams to material resources MR1 ,
• Distances between places are taken into account MR2 and MR3 is considered. Table 1 summarizes
in the time allocated to the human resources to analogies between bin packing problem and Problem
move from one place to another. This time is as- 1: exams planning with resources assignment.
sumed to be constant, all places are equidistant to
the others. Time
Opening
• Overtime is not allowed. schedule
of resources
6
4.2 Definition of the Considered
Problems 2
Caption:
11
1 3 5
The complete problem is divided into three problems Exam
7 X
number X
of increasing difficulty: 4
• Problem 1 is the more basic: human resources are Resource MR1 MR2 MR3 MR1 MR2 MR3 Bin
not considered. Only the material resources are Period Monday AM Monday PM
considered. Figure 1: Representation of Problem 1.
• Human resources are considered in Problem 2.
They can work on one or several types of mate- Table 1: Analogies between both problems.
rial resources. They cannot move, they work all Bin packing Problem of exams planning
the time at the same place. The assignment of the problem with resources assignment
263
HEALTHINF 2017 - 10th International Conference on Health Informatics
Group 1
Group 2
schedule of the material resource during the pe-
riod and the compatibility between the exam and Time Opening
the material resource. schedule
of material
• p2 : assignment of each exam to a human resource resources
during a period, respecting the work time of the
human resource during the period and the compat-
ibility between the exam and the human resource. 6
2
Compatibility between exam and human resource 5
3 7
is not directly defined but can be deduced: an exam 1
4 8
is compatible with a human resource if and only if Material
Resource MR1 MR2 MR3 MR1 MR2 MR3
this exam is treated by a material resource from one Bin
Type X-ray Scanner X-ray Scanner
type and this human resource can work on this type of Monday AM
Period Monday PM
material resource.
Thus, group g is the couple (period, type). In Figure 2: Interdependent bin packing problem.
both problems p1 and p2 , exam has to be assigned
during the same period to the same type of material 5.1 Genericity
resource. Figure 2 illustrates the interdependent bin
packing problem in the HGT case. The lower portion The proposed tool, illustrated by Figure 3, uses a hy-
of the figure is the assignment of exams to material re- bridization of a metaheuristic and a heuristic, more
sources and periods, in the same way as Figure 1. The precisely a list algorithm. A single solution based
upper portion is the assignment of exams to human re- metaheuristic or a population based metaheuristic can
sources and periods. In both portions, each exam has be used. The encoding used by the metaheuristic is
to be assigned to the same period and the same type a list Y of exams. The list algorithm L considers
(according to the type of the material resource and the the exams according to their order in list Y to plan
competencies of the human resource to use this type). and assign them to the required resources, consider-
ing the problem constraints. This builds a solution
X. The objective function H evaluates the solution
5 RESOLUTION METHOD X . According to this evaluation, the solution is cho-
sen or not by the metaheuristic. At the end of the
The bin packing problem is NP-Hard (Garey and running, the given solution by the hybridization is the
Johnson, 1979). Our problems are an extension of the best list Y ∗ of exams: the one which optimizes the ob-
bin packing problem, so our problems of exams plan- jective function by applying the list algorithm. This
ning with resources assignment are also NP-Hard. In hybridization can be used to solve many problems:
the following, approximate methods are used to solve the specificity of a given problem is only considered
them. in the list algorithm.
Our proposed method is a hybridization of a meta-
heuristic and a list algorithm. Our tool is convenient 5.2 A List Y of Exams
because one part is generic: it can be used for any
of the considered problems. Only the list algorithm The general scheme of the encoding is given by Equa-
needs to be specific to the considered problem. tion (1), with Ω the set of all the lists Y and S the set
264
Medical Imaging: Exams Planning and Resource Assignment - Hybridization of a Metaheuristic and a List Algorithm
A list Y of exams Metaheuristic The best list Y ∗ Algorithm 1 to solve the cases of Problems 2 and 3,
considering human resources.
Cost H of Solution X?
(assignment Algorithm 1: List Algorithm First Fit HGT.
this solution
List and planning)
algorithm
Data: List of exams (Yi )i∈{1,N} ; opening
schedule of all resources during all
Figure 3: Hybridization metaheuristic - List algorithm. periods; processing time of all exam
1 Occupied time := 0 for all resources and all
of all the admissible solutions X built by the list algo- periods
rithm L. 2 forall the i do
3 First resource, first period,
Y ∈Ω −→ L(Y ) = X ∈ S −→ H(X) (1) assigned := f alse
Heuristic L Criterion H
4 while (assigned = f alse) AND current
The set Ω is the set of all permutations of exams. period ≤ max of periods do
Cardinal of Ω is N! with N the number of exams. One 5 while (assigned = f alse) AND current
solution Y ∈ Ω is a list of exams. More details about resource ≤ max of resources do
the encoding are given in (Gourgand et al., 2014b). 6 if exam Yi is compatible with
current resource then
5.3 Metaheuristic 7 if exam Yi fits in couple
(resource, period) then
The metaheuristic performs in the set of solutions Ω. 8 Assign exam Yi to couple
An initial solution is randomly computed: a list of ex- (resource, period)
ams randomly sorted between one and the number of 9 Update occupied time of
exams. Several metaheuristics have been used: some couple (resource, period)
single solution based metaheuristics such as iterated 10 assigned := true
local search or simulated annealing. A neighborhood
system is used to visit the set of solutions, it allows 11 Next resource
to go from one solution to another one. Neighbor- 12 Next period
hood system V is a permutation of two exams in the
list Y : the exam at position i permutes with the one
which is at position j. V satisfies the accessibility and
reversibility properties. 5.5 Objective Function
265
HEALTHINF 2017 - 10th International Conference on Health Informatics
5.6 The Best List Y ∗ • Our results from the method previously published
in (Gourgand et al., 2014a), using two single so-
Algorithm 2 describes the whole method with the ex- lution based metaheuristics (iterated local search
ample of stochastic descent as the used metaheuristic. and simulated annealing) in a classical way: the
Stochastic descent may be used in an iterated local best value found by all these methods is reported.
search. The set Ω of the lists of exams is browsed • Our results from our proposed method detailed in
thanks to the metaheuristic using neighborhood sys- the current paper. The used metaheuristics are dis-
tem V . Lists are compared thanks to the list algorithm tinguished: iterated local search and simulated an-
L and the objective function H. According to an ac- nealing, written ILS* and SA*.
ceptance criterion, some lists are selected. At the end,
the metaheuristic gives the best found list Y ∗ . The results are promising. Firstly, this problem
has been solved by CPLEX thanks to our mathemat-
Algorithm 2: Hybridization between stochastic de- ical model previously proposed. The solver finds an
scent and a list algorithm. optimal solution only for small size of problems (less
Data: Initial solution Y than two hundred exams over four days). The solver
1 X := L(Y ) does not find any solutions when the size of the prob-
2 while necessary do lem increases. Then, it has been solved with two ap-
3 Choose uniformly and randomly Y ∈ V (Y ) proximate methods: in a classical way, and with a
4 X = L(Y ) hybridization. Both methods find an optimal solu-
5 if H(X ) ≤ H(X) then tion for the small instances. For biggest instances,
6 X := X the hybridization between a metaheuristic and a list
7 Y := Y algorithm outperforms our previous method. Simu-
lated annealing seems to work better than iterated lo-
Result: Y ∗ = Y cal search.
266
Medical Imaging: Exams Planning and Resource Assignment - Hybridization of a Metaheuristic and a List Algorithm
Table 2: Results: (number of exams assigned after their due dates; sum of assigned periods to all the exams).
solved thanks to this tool by changing the list algo- in a Global-Local World, volume 438, pages 572–579.
rithm: for instance, it has been used to solve an in- Springer Berlin Heidelberg.
dustrial problem (Silva et al., 2016). Problems with Johnson, D. S. (1973). Near-optimal bin packing algo-
human resources can easily be solved by developing rithms. PhD thesis, Massachusetts Institute of Tech-
some new list algorithms dedicated to them. Then, a nology.
direct application to a hospital system could be envis- Litvak, N., van Rijsbergen, M., Boucherie, R. J., and van
Houdenhoven, M. (2008). Managing the overflow of
aged. Other applications in the hospital field could be
intensive care patients. European journal of opera-
done, in other hospital services, with other resources, tional research, 185(3):998–1010.
etc. We could extend our current work about med- Rais, A. and Viana, A. (2011). Operations research in
ical imaging to medical surgeries. More constraints healthcare: a survey. International Transactions in
about medical team should be considered. The next Operational Research, 18(1):1–31.
problematic is to consider patients with several ex- Santibáñez, P., Begen, M., and Atkins, D. (2007). Surgical
ams or surgeries, by taking into account precedence block scheduling in a system of hospitals: an applica-
constraints between them. tion to resource and wait list management in a british
columbia health authority. Health care management
science, 10(3):269–282.
Silva, C., Klement, N., and Gibaru, O. (2016). A generic de-
REFERENCES cision support tool for lot-sizing and scheduling prob-
lems with setup and due dates. In International Joint
Cardoen, B., Demeulemeester, E., and Beliën, J. (2010). Conference - CIO-ICIEOM-IIE-AIM (IJC 2016), San
Operating room planning and scheduling: A literature Sebastian, Spain. ICIEOM.
review. European Journal of Operational Research, Trilling, L., Guinet, A., and Le Magny, D. (2006). Nurse
201(3):921–932. scheduling using integer linear programming and con-
Coello, C. A. (2000). An updated survey of ga-based mul- straint programming. IFAC Proceedings Volumes,
tiobjective optimization techniques. ACM Computing 39(3):671–676.
Surveys (CSUR), 32(2):109–143. Van den Bergh, J., Beliën, J., De Bruecker, P., Demeule-
Everett, J. (2002). A decision support simulation model for meester, E., and De Boeck, L. (2013). Personnel
the management of an elective surgery waiting sys- scheduling: A literature review. European Journal of
tem. Health Care Management Science, 5(2):89–95. Operational Research, 226(3):367–385.
Garey, M. R. and Johnson, D. S. (1979). Computers VanBerkel, P. T. and Blake, J. T. (2007). A comprehen-
and Intractability: A Guide to the Theory of NP- sive simulation for wait time reduction and capacity
completeness. WH Freeman and Company, New planning applied in general surgery. Health care man-
York. agement Science, 10(4):373–385.
Gourgand, M., Grangeon, N., and Klement, N. (2014a). Ac- Zhu, X. and Wilhelm, W. E. (2006). Scheduling and lot
tivities planning and resource assignment on multi- sizing with sequence-dependent setup: A literature re-
place hospital system: Exact and approach methods view. IIE transactions, 38(11):987–1007.
adapted from the bin packing problem. In 7th Inter-
national Conference on Health Informatics, Angers,
France, pages 117–124.
Gourgand, M., Grangeon, N., and Klement, N. (2014b).
An analogy between bin packing problem and per-
mutation problem: A new encoding scheme. In Ad-
vances in Production Management Systems. Innova-
tive and Knowledge-Based Production Management
267
Uncovering Key Factors for a Hospital IT Change Strategy
Abstract Changing an Information Technology (IT) system within any organisation is a difficult and complex
process. However, within the hospital setting, additional complexities make such change more difficult.
These complexities include the protection of patient safety and privacy, improving the quality of the patient
experience, protecting information and supporting the clinician in their medical requirements. Our research
indicates that uncovering the process of hospital IT change management is not documented – making it
difficult to build on evidence-based research and instill a ‘lessons learned’ approach in publicly funded
hospitals. We address this gap in this paper. Using qualitative research methods we present the results of
observations carried out in healthcare settings as well as twelve structured interviews with hospital staff. We
employ the Kotter Change Model as a lens to understand this change process. While benefiting from the
structure that Kotter’s model provides, we argue for the need to extend this model in an effort to capture the
various influences of healthcare IT-enabled innovation which will, in turn, enable much needed change
within hospitals. Building on our findings, we introduce a Healthcare IT Change Management Model (HIT-
CMM).
268
Carroll, N., Richardson, I. and Travers, M.
Uncovering Key Factors for a Hospital IT Change Strategy.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 268-275
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Uncovering Key Factors for a Hospital IT Change Strategy
269
HEALTHINF 2017 - 10th International Conference on Health Informatics
1. What are the current IT systems in place Table 1: Summary of Interviewee Profiles.
within your department? Yrs
2. Give examples of how new IT systems or Interviewee Department Specialty
Exp.
processes were implemented? Specifically Nurse and Risk
how was the change process managed? Give 1 Quality 23 Manager with focus
on use of IT systems
examples. Administration with
3. Kotter’s (2005) is a change management 2 Radiology 29
focus on quality
model, which recommends 8 steps to follow 3 Physiotherapy 17
General
to manage change. Kotter’s Step 7 Administration
4 HR 28 Project Manager
“Consolidate Improvements and Produce
5 Dermatology 4 Clinician
More Change” recommends that Clinician/Project
management or change advocates should be 6 Radiology 25
Manager
become more involved in the process thus Manager with focus
ensuring continuation of changes. Kotter’s 7 IT 30 on hardware and
software deployment
Step 8 “Institutionalise New Approaches” Manager with focus
recommends that for success change has to 8 Quality 19
on rick management
be implemented so that it is now part of the Manager with focus
9 Laboratory 28
organisations culture. Is this true in your on deployment
experience in regards to moving or changing Clinician/Project
10 Radiology 28
Manager
to new IT systems/processes? Give examples. 11 IT 20 Project Manager
4. Were there any unexpected problems or 12 Quality 10 System user
issues that affected such project changes?
Give examples.
5. What is your opinion of the new IT
system/process implemented? 4 FINDINGS
6. What could or should have been done
differently? Give examples. Within the hospitals, we found that there were silos
of IT innovation in which a clinician or manager
The interviewees’ answers were reliably championed IT change. Silos proved problematic
aggregated and comparisons were made between the when patients had to move between departments.
different interviewees. We identified a number of The need for national or central rollout of projects
emerging themes using open coding to categorise the was identified as a solution. National or central
text – allowing us to build a story around specific rollouts do take time so some departments would go
events, facts, and interpretations. ahead and implement new systems thus creating IT
The interviewees’ work experience spanned from silos.
4 to 30 years. Participant’s interview data (Table 1) The interview findings identified various
was analysed to understand the change process conduits of information on the real-world IT change
within the case study. We reviewed the data within management process, and enabled us to explain how
the structure of Kotter’s change model steps 1 to 8, change management may be viewed as a product of
which allowed us to understand how change had change leadership. Based on our analysis of the
been made within the hospital setting. This observations and the interviews, we identified a
facilitated our gaining a rich insight of the working number of key themes, which we present as follows:
environment.
Analysing the findings from the hospital study a) Requirement for Change
we identified key themes. We contextualized these b) Attitudes towards new IT systems and
findings and their implications on Kotter’s change processes
model. Our results indicate that some aspects of c) Lessons Learned
Kotter’s change model is useful to successfully We provide a discussion to contextualize these
manage change but would need to be modified for a findings and their implications on Kotter’s change
healthcare context. This case study facilitates model.
analysis from a hospital perspective and the findings
informed and enhanced a proposed model, which we
call the HIT-CMM (see Table 3).
270
Uncovering Key Factors for a Hospital IT Change Strategy
271
HEALTHINF 2017 - 10th International Conference on Health Informatics
explain, “there is no point in implementing centrally was discussed by Interviewee 6 discusses this and
and then letting people do what they want locally. suggest that a “well-structured maintenance service
You might as well have two systems”. Interviewee agreements especially out of hours service for
10 states “communication was good with staff and example the previous system came from [Global
team but could have been a lot better with the Tech Company] and they had a person onsite to deal
general public”. Interviewee 8 also highlights the with issues”. Interviewee 7 suggests that the success
importance of communication “very importantly for in implementing change may be in the ability to
bringing in change that communication and team understand user’s requirements and foster a
work essential”. This suggests that implementing relationship to ensure buy-in at the beginning of the
change requires improved planning and project: “to implement change you have to talk to
communication strategies. This led us to consider the end user and get buy-in. Start with what you
whether change management requires a specific want and work back. Successful projects always had
approach or whether it is a product of change buy-in”.
leadership, which we examine further in the next However, to facilitate an improved structured
section. process, Interviewee 2 indicated the need to
“encourage more trust” and avail of additional onsite
4.3 Lessons Learned support for the technology providers. One of the
issues associated with the lack of support was the
Interviewees were provided with the opportunity to different time zones (i.e. Ireland and the USA)
explain what they might do differently if they were requiring out of office phone calls for long
to undertake a similar change management task. durations. The level of support provided was often
Interviewee 1 explained that they would like to have unsatisfactory, for example, “they sometimes say the
more control of the chosen software vendors and problem is our network when the network is
suggest that not all users were happy with the working” (Interviewee 2). Interviewee 4 also shared
software. Interviewee 2 raised more concerns with these concerns and explained that if they underwent
the overall change process. For example, a similar project they would have “someone on hand
interviewee 2 had concerns around the need to instead of having to ring California with issues”.
rebuild a service network, the need to fill out This would make a big difference.” The need for
medical records (time-consuming) and the threat of improved planning and greater stakeholder
personnel moving department or institution and in so involvement was discussed. For example,
doing, bring much needed competence out of the Interviewee 9 discusses a failed project and suggests
department. Therefore, more engagement of all “it was not scoped well and users were not involved
parties and external expertise is a critical element of enough”. Interviewee 11 also acknowledges
success in change management. Interviewee 5 planning and suggests, “with any project there
explains that they could have “engaged with should be time given to planning the project
research centre…to get more visibility”. Building on timelines”. In addition, considering that one of the
this comment, the interviewee suggests that it should core objectives was to streamline healthcare
be a national competence approach to similar processes, Interviewee 4 highlights their
projects and explains, “we need a centre such as a disappointment in that the project in question, “it is
medical software institute with wide stakeholder supposed to be paperless but it is not. Actually we
representation to oversee projects”. are using more paper and ink now.” Interviewee 6
Interviewee 2 highlights the usefulness of using a explains that going live presented some unexpected
change model such a Kotter’s and indicates that the issues: “the initial go live took longer and also the
eights steps is “what should be done…but plans can bedding in period took longer than expected and
change due to unexpected problems”. This suggests more patient lists should have been cancelled
that there may be a need to offer greater flexibility beforehand. So what happened were lots of people
or agility to change management models such as waiting two weeks so it was not patient load
Kotter’s. Interviewee 5 also suggests that models effective at the beginning”. Interviewee 6 goes on to
such as Kotter offer a good basis to manage change. explain that planning and vision are often
For example, interviewee 5 further explains, “for our problematic: “we plan things and it takes so long
system we were mobile and patient centric. We that by the time it’s implemented the projects are too
understood the people and their motivations. That is old.” Interviewee 6 also highlights some general
a platform for engagement and multi-disciplinary issues associated with change management in the
teams”. Adopting an improved structured approach public sector such as:
272
Uncovering Key Factors for a Hospital IT Change Strategy
x Not enough long-term strategic planning; The following steps were strongly identified by
x Many projects are abandoned; interviewees are being necessary during the
x Need be more proactive rather than reactive; implementation process:
x Need to avail of informed expert opinion on x Step 1: Urgency. Hayes and Richardson
change management. (2008) state that, the need for such a change
Interviewee 7 shares similar concerns and must be communicated to everyone in the
suggests, “better long-term and short-term planning organisation at the outset. This was
is needed”. Thus, there is a clear indication that confirmed by the interviewees, as there was
implementing change requires a structured approach, an inherent imperative requirement for
which communicates both the need and benefits of change to the current system in place.
supporting change. x Step 6: Plan. Change should have clear goals
and objectives and take place in small steps.
The interviewees stated that there were
5 DISCUSSION clearly defined goals and that the objectives
were all agreed on to be rolled out nationally.
This study demonstrates that the need to manage
x Step 8: Institutionalise. The interviewees
such change is widely recognized. The interviewees
remarked that the new approach is now part
confirm that management need to lead change.
of normal way of working and is “bedded in
Reviewing Kotter’s change model and eight phases
well”.
of change, we learn that not all eight phases were
necessary to successfully implement change in the The following steps were identified by
hospital system. We highlight these as Strong interviewees as being necessary during the
Evidence, Some Evidence and No Evidence as implementation process but would require a greater
detailed in Table 2. It also outlines the level of presence throughout the change process:
evidence of Kotter’s change model using the eight
phases, which we identified within our case study. x Step 2: Coalition. Kotter (2005)
Kotter’s Step 4 ‘Communicate the Vision’ stipulates recommends progressively involving
that communication of the vision should come from different members of the organisation in the
senior management. change to form a project team. This was seen
Therefore, staff were aware of relevant tasks to to be the case in one such project within the
be completed in the project and of their roles within hospital, which was ultimately successful.
the project. This was not identified by any of the Coalition was necessary as it involved
interviewees as a necessity, yet the hospital numerous team members in various
happened to successfully implement change and locations.
raises many questions as to how it could be Step 3: Vision. Kotter (2005) recommends that a
improved and what key factors were in play from an clear vision and plan for implementing change is
organisational change perspective. required.
While Step 5: Empower Others to Act on the
Table 2: Evidence of Kotter’s 8 Phases. Vision was not obvious from our interviews, Kotter
Kotter’s Eight Phases Evidence (2005) recommends that obstacles, such as
organisational structure should be removed. The
1. Establish a Sense of Urgency
interviewees confirmed this as a requirement. For
2. Form a Powerful Guiding Coalition example, while the interviewees mentioned the
3. Create a Vision various obstacles they would like to remove they
4. Communicate the Vision were not empowered to instigate change to act on
the vision.
5. Empower Others to Act on the
Overall our findings suggest that there is a clear
Vision
need to introduce a new model to support the
6. Plan for and Create Short-Term
implementation of change in a healthcare context.
Wins
While Kotter’s Steps 2, 3 and 7 were only partially
7. Consolidate Improvements and implemented in successful projects the aims of these
Produce Still More Change steps were achieved while carrying out other steps.
8. Institutionalise new approaches
273
HEALTHINF 2017 - 10th International Conference on Health Informatics
274
Uncovering Key Factors for a Hospital IT Change Strategy
the specific needs identified such as longer term Health Informatics (HEALTHINF), Rome, Italy,
strategic planning and more flexibility to manage February.
unexpected issues. In particular, we will include Cazzaniga, S., Fischer, S., 2015. How ICH Uses
Cost as the third element of the Iron Triangle. Organizational Innovations to Meet Challenges in
Healthcare Management: A Hospital Case Study. In
The HIT-CMM will be incorporated into a more Challenges and Opportunities in Health Care
detailed strategy model, which also examines the Management, Springer International Publishing, 355-
process of innovation in healthcare. Specifically the 361.
HIT-CMM has already supported us to uncover key Forte, G., 1997. Managing Change for Rapid
factors for a Healthcare Innovation Strategy and how Development, In IEEE Software 14(6), 114–123.
we could begin to explore innovation opportunities. Grbich, C., 1999. Qualitative Research in Health: An
Given the small sample size a more complete picture Introduction, Sage Publications. California.
will be facilitated by interviewing a larger number of Hayes, S., Richardson, I., 2008. Scrum Implementation
using Kotter’s Change Model, 9th International
participants.
Conference on Agile Processes and eXtreme
Programming in Software Engineering, Limerick,
Ireland, Lecture Notes in Business Information
7 CONCLUSIONS Processing 2008, vol 9, Part 6, 10th-14th June, 161-
171.
Hiatt, J. M., 2006. ADKAR: a model for change in
This study demonstrated that the need to manage
business, government and our community, Prosci
change is widely recognized. Different perspectives, Learning Center. Loveland.
methods and approaches (and the underlying Kissick, W., 1994. Medicine's Dilemmas: Infinite Needs
theories that drive them) that are aligned cannot versus Finite Resources, Yale University Press. New
guarantee to deliver the required change in the time Haven.
and on the scale necessary. Reviewing Kotter’s Kotter, J., 2005. Leading Change: Why Transformation
change model and eight phases of change, we learn Efforts Fail, Harvard Business School Press. Boston.
that not all eight phases are necessary to successfully Lewin, K., 1947. Frontiers in Group Dynamics: Concept,
implement change. Therefore a more tailored yet Method and Reality in Social Science; In Social
Equilibria and Social Change. Human Relations, June,
detailed framework was required. We present a
1(36).
mode suitable model to manage healthcare IT O'Leary, P., Carroll, N., Clarke, P. and Richardson, I.,
change through the introduction of our HIT-CMM. 2015. Untangling the Complexity of Connected Health
Evaluations. In International Conference on
Healthcare Informatics (ICHI), October, 272-281.
ACKNOWLEDGEMENTS IEEE.
Travers, M., Richardson, I., 2015. Medical Device
Software Process Improvement – A Perspective from a
We would like to thank all the participating Medical Device company, in 8th International
interviewees for their time and efforts. Conference on Health Informatics, (Healthinf),
This research is partially supported by Science Lisbon, Portugal, January.
Foundation Ireland (SFI) grant no 10/CE/I1855 to Yin, R. K., 2013. Case study research: Design and
Lero (http://www.lero.ie), by Enterprise Ireland and methods, Sage publications.
the IDA through ARCH – Applied Research in
Connected Health Technology Centre
(www.arch.ie), BioInnovate and by Science
Foundation Ireland (SFI) Industry Fellowship Grant
Number 14/IF/2530.
REFERENCES
Benjamin, R. I., Levinson, E., 1993. A framework for
managing IT-enabled change. In Sloan Management
Review, 34(4), 23-33.
Carroll, N., Travers, M. and Richardson, I., 2016.
Evaluating Multiple Perspectives of a Connected
Health Ecosystem. In 9th International Conference on
275
A Comparison of Statistical Linkage Keys with Bloom Filter-based
Encryptions for Privacy-preserving Record Linkage using Real-world
Mammography Data
Abstract: New EU regulations on the need to encrypt personal identifiers for linking data will increase the importance of
Privacy-Preserving Record Linkage (PPRL) techniques over the course of the next years. Currently, the use of
Anonymous Linkage Codes (ALCs) is the standard procedure for PPRL of medical databases. Recently, Bloom
filter-based encodings of pseudo-identifiers such as names have received increasing attention for PPRL tasks. In
contrast to most previous research in PPRL, which is based on simulated data, we compare the performance
of ALCs and Bloom filter-based linkage keys using real data from a large regional breast cancer screening
program. This large regional mammography data base contains nearly 200.000 records. We compare precision
and recall for linking the data set existing at point t0 with new incident cases occuring after t0 using different
encoding and matching strategies for the personal identifiers. Enhancing ALCs with an additional identifier
(place of birth) yields better recall than standard ALCs. Using the same information for Bloom filters with
recommended parameter settings exceeds ALCs in recall, while preserving precision.
276
Schnell, R., Richter, A. and Borgs, C.
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world Mammography Data.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 276-283
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world
Mammography Data
For such scenarios, only three approaches for link- Our Contribution. No previous publication com-
ing medical data have been used repeatedly for real- pared the performance of CLKs with the performance
word applications of large medical databases (Schnell, of the more traditional ALCs using real-world data.
2015): Using a third-party trustee, using encrypted Therefore, we report on a new study assessing the per-
identifiers1 and using Bloom-filters. formance of different variations of CLKs and ALC
If a third-party data trustee (Kelman et al., 2002) is variants using real-world data from a large regional
used, unencrypted patient pseudo-identifiers are trans- breast cancer screening program (Katalinic et al.,
ferred to a trusted third party, which links the pseudo- 2007). Furthermore, for the first time, we compare
identifiers and assigns a new identification number to the effect of including additional identifiers to linkage
the linked records. These newly constructed IDs are keys and Bloom filter encodings.
then used for linkage by a research group.
By far the most common approach in practical set-
tings is the use of encrypted pseudo-identifiers. Here,
the identifiers are concatenated into a single string 2 PREVIOUS WORK
which is then encrypted. The resulting encrypted string
is called an anonymous linking code (ALC, (Herzog Currently, only two different versions of encoding iden-
et al., 2007)). tifiers seem to be in practical use for PPRL: Anony-
Many of the more recent PPRL approaches (see mous Linkage Codes (ALCs) and Bloom filters. Both
(Vatsalan et al., 2013; Karapiperis et al., 2016) for will be described shortly.
reviews) have limited scalability, so they can not be
used with large datasets. For example, although techni- 2.1 ALC Variants
cally interesting, all homomorphic encryption methods
are computationally expensive and do not scale well
(Karakasidis et al., 2015). An exception are Bloom fil- ALCs are an encrypted single string formed by con-
ter approaches. (Schnell et al., 2009) first suggested the catenating substrings or functions of different pseudo-
use of Bloom filters for privacy-preserving record link- identifiers. These pseudo-identifiers should be stable
age. The approach is based on splitting each identifier over time and free of errors. Most often, first name,
into a set of substrings of length 2 (bigrams), which surname, date of birth and sex are used for construct-
are mapped into a binary vector for each identifier with ing ALCs. The resulting combination of identifiers
a linear combination of different cryptographic hash is encrypted using cryptographic hash functions. The
functions such as SHA-1 and MD-5. The similarity resulting hashed string is used as the linkage key. If
of these binary vectors (Bloom filters) approximates two ALCs match exactly, the corresponding records
the similarity of the pseudo-identifiers, which makes are classified as representations of the same real-world
Bloom filters attractive for error-tolerant PPRL. entity. Due to the cryptographic hash function, it is
Although using separate Bloom filters for each nearly impossible to decrypt the identifiers directly.
pseudo-identifier is the most common approach, the The most simple and widely-used ALC is con-
use of one common binary vector is harder to attack. structed in three steps (Herzog et al., 2007): all identi-
The use of a single Bloom filter for all identifiers fiers are preprocessed using a set of rules (for example,
has been first proposed in (Schnell et al., 2011) and removal of non-alphabetical characters from names,
has been explored further by (Durham, 2012). The removal of non-digits from dates, and capitalization
resulting composite Bloom filter is called a Crypto- of all characters). The resulting preprocessed identi-
graphic Long-term Key (CLK) in the original publica- fiers are then concatenated to form one single string,
tion or ‘record based Bloom filter’ (RBF) by (Durham, which is finally encrypted with a cryptographic hash
2012). CLKs have been used on real world data exten- function. Examples of applications of Basic ALCs are
sively (Randall et al., 2014; Schnell and Borgs, 2015; described by (Kijsanayotin et al., 2007; Schülter et al.,
Schmidlin et al., 2015). 2007; Johnson et al., 2010; Tessmer et al., 2011).
The design of the Basic ALC is not error-tolerant,
since even the replacement of a single letter will result
in an entirely different hash code. As spelling and ty-
1 Although data sets without direct personal identifiers,
pographical errors in patient identifiers are common,
many true record pairs will not be classified as matches.
but containing indirect identifying information such as date
of hospital admission and discharge are occasionally sug- Hence patients with variations in their respective iden-
gested (Karmel and Gibson, 2007) for record linkage, they tifiers might have different characteristics than patients
rarely contain enough discriminating information for unique with agreeing identifiers. Ignoring this problem can
linkage pairs. result in biased estimates (Ridder and Moffitt, 2007).
277
HEALTHINF 2017 - 10th International Conference on Health Informatics
Different approaches to constructing ALCs allow in the asymptotic false positive probability (Kirsch and
for some errors in identifiers. The Swiss Federal Of- Mitzenmacher, 2006). Therefore, the positional values
fice for Statistics asked the Cryptological Unit of the of the k hash functions are computed with the function
Swiss Military to develop a privacy-preserving link-
age method for medical patient data (Office fédéral de gi (x) = (h1 (x) + i · h2 (x)) mod l (1)
la statistique, 1997).To construct this ALC variation,
the Soundex code of surname and first name are cre- where i ∈ {0, . . . , k − 1} and l is the length of the bit
ated after some preprocessing. The Soundex codes are array. We use two different keyed hash message au-
concatenated with the date of birth and sex. The re- thentication codes (HMACs), namely, HMAC-SHA1
sulting string is encrypted using a cryptographic hash (h1 ) and HMAC-MD5 (h2 ) (Krawczyk et al., 1997) to
function (Office fédéral de la statistique, 1997). Appli- create the Bloom filters.
cations and reviews of the Swiss ALC are discussed
in (Borst et al., 2001; Holly et al., 2005; Eggli et al., 2.3 Composite Bloom Filters
2006; El Kalam et al., 2011).
Another approach to construct more error-tolerant For some applications, a single linkage key has to be
ALCs was invented by the Australian Institute of used. If separate Bloom filters are used, for these ap-
Health and Welfare (AIHW). Their solution uses sub- plications, the set of Bloom filters has to be combined
strings of first and last names instead of the full string. in a composite Bloom filter. Storing all of the identi-
(Ryan et al., 1999) tested several variations and con- fiers used in a single Bloom filter was first proposed by
cluded that the second, third, and fifth character of the (Schnell et al., 2011). This is called a Cryptographic
surname combined with the characters at the second Long-term Key (CLK), since they were intended for
and third position of the first name concatenated with use in a longitudinal study of offenders.
sex and date of birth performed best. The resulting For the construction of a CLK, each identifier is
string forms the Statistical Linkage Key (SLK) which is split into a set of n-grams. Each set is stored using
often included in data published by the AIHW (Karmel k hash functions using the same Bloom filter of the
et al., 2010). After applying a cryptographic hash func- length l for all n-gram sets of all identifiers used. This
tion to the SLK, the Encrypted SLK, sometimes also additive Bloom filter represents the CLK.
denoted as 581-Key is the ALC variant that is widely After preprocessing, first name and surname are
used in Australian data linkage (Taylor et al., 2014). split into bigrams, birth year into unigrams. In the
(Karmel et al., 2010) tested the effect of adding dif- second step, the first n-gram set (e.g. first name) is
ferent versions of state and postcode to the 581-Keys. stored in the Bloom filter. Each bigram is hashed k
In general, 581-Keys don’t seem to be considered as times. Bits having indices corresponding to the hash
state-of-the-art any longer (Randall et al., 2016). values are set to one. In the third step, the second n-
gram set (e.g. surname) is mapped to the same Bloom
2.2 Simple Bloom Filters filter. Finally, unigrams are mapped to the same bit
array.
Bloom filters have been used for calculating string
similarities in privacy-preserving probabilistic record 2.4 Cryptographic Attacks on ALCs
linkage (Schnell et al., 2009). A Bloom filter is an
array of data proposed by Howard (Bloom, 1970) for Frequency attacks on standard ALCs have not been
checking the set membership of records efficiently reported in the literature so far. Discussions about the
(Broder and Mitzenmacher, 2003). It is represented security of ALCs and 581-Keys up to now are hypo-
by a bit array with a length of l bits initially set to thetical, not empirical (Randall et al., 2016).
zero. For the mapping, k independent hash functions However, since the same password is used for all
h ∈ {h1 , . . . , hk } are used.To store the set of entities records, within a combination of sex and date of birth,
S = {x1 , x2 , . . . , xn } in the Bloom filter, each element the most frequent name/surname combination will
xi ∈ S is hashed using the k independent hash functions. also yield the most frequent ALC. Therefore, given a
The bit positions given by the hash functions are set to large random sample, the most frequent name/surname
1. If a bit was already set to 1, nothing is changed. combinations have a high risk of re-identification.
To store all elements of a set in Bloom filters, we Under the (unrealistic) assumption of uniformly dis-
apply the double hashing scheme proposed by (Kirsch tributed dates of birth, age and sexes, there are about
and Mitzenmacher, 2006). They show that using two 365 ∗ 100 ∗ 2 = 73.000 combinations possible. This
independent hash functions is sufficient to implement a way, in a database of 10.000.000 records, about 137
Bloom filter with k hash functions without an increase records per combination are expected. If the frequency
278
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world
Mammography Data
distribution of names is skewed, aligning the most fre- using random hashing, no successful attack method
quent name subsets could identify a large proportion is known. Of course, the number of records using the
of the records using this simple frequency alignment. same salt should not exceed the minimum required
for a frequency attack either on the whole pattern or
2.5 Cryptographic Attacks on Bloom the individual attributes mapped to the Bloom filter.
Based on experiments reported by (Schnell and Borgs,
Filters 2016), this minimum number seems to be about 300
records. In most medical applications, this number is
Bloom filter-based PPRL has been attacked by two only exceeded in national databases. For this, an ad-
different techniques: by applying a Constrained Satis- ditional salt has to be used. Given this condition, we
faction Solver (CSS) on frequencies of entire Bloom consider Bloom filter-based encodings as meeting the
filters (Kuzu et al., 2011; Kuzu et al., 2013) and by a in- requirements of the EU Protection Regulation (Coun-
terpreting the Bloom filter bit patterns as a substitution cil of European Union, 2016) for a pseudonymisation
cipher (Niedermeyer et al., 2014). method.
The first attack is a variant of a simple rank swap-
ping attack (Domingo-Ferrer and Muralidhar, 2016)
which used the estimated length of the encrypted
strings as additional information. (Kuzu et al., 2011) 3 METHODS
consider their attack on separate Bloom filters as suc-
cessful, but not their attack on composite Bloom filters Using real data from a German state-wide breast can-
(Kuzu et al., 2013). It should be noted that this CSS cer screening program (Katalinic et al., 2007), we com-
attack is based on the entire data set of Bloom filters, pared the CLK encryption with the Basic and Swiss
therefore it is no decoding, but an alignment. This ALCs and the encrypted SLK (581-Key).
way of attack is impossible if many groups of similar The test data consists of mammography records of
cases generates a new bit pattern, for example by us- patients in a German state, covering about 3.4% of the
ing salted encodings (Niedermeyer et al., 2014). In a total German population. File A consists of cases until
salted encoding, a stable identifier such as date of birth, the end of 2011 (with one record for each case) with
year of birth or place of birth is added to the password n = 138.131 records, file B encompasses cases after
determining the hash functions. 2011 (more than one record per case was possible)
The second attack attempted the actual revealing with n = 73.004 cases in 198.475 records.
of all identifiers as clear text by a cryptanalysis of The standard CLK is set up with a length of
individual bit patterns within the Bloom filters (Nie- l = 1000. First name and Surname were padded with
dermeyer et al., 2014). This attack is based on the spaces before being split into bigrams (Robertson
limited number of bit patterns generated by the lin- and Willett, 1998). The other identifiers were split
ear combination of two hash functions in the double- into unigrams. Each set of n-grams is hashed using
hashing scheme (Kirsch and Mitzenmacher, 2006) k = 10 HMACs (Hash functions) and a different cryp-
of the initial proposal. Exploiting this specific con- tographic key. Since CLKs allow for matching strate-
struction of the hash functions, (Niedermeyer et al., gies other than exact matching (Schnell et al., 2011),
2014) were successful with basic Bloom filters and following (Schnell, 2014), Multibit Trees with various
(Kroll and Steinmetzer, 2015) with CLKs/composite Tanimoto-thresholds were used. The statistical linkage
Bloom filters. Therefore, replacing the double-hashing keys were evaluated using exact matching.
scheme by random hashing should prevent the suc- The set of identifiers used consisted of first name,
cess of this attack on Bloom filters (Niedermeyer et al., surname, date of birth and sex. According to recent
2014). Random hashing is based on the idea of using studies, including more stable identifiers is desirable
bigrams as seeds for random number streams. This (Schnell and Borgs, 2015). Address information is very
could be implemented by a linear-congruential pseudo- volatile, since places of residence may change during
random number generator (LCG, (Stallings, 2014)), the course of a lifetime. Therefore, (Schnell and Borgs,
to generate a sequence X with the length k for each 2015) suggested using places of birth as an additional
n-gram.Random hashing increases the number of pos- identifier for Bloom filter-based PPRL. In the second
sible bit patterns (l = 1000, k = 15) for a given n- experiment, we did this by adding place of birth to the
gram from less than 106 to more than 6.8 · 1032 . There- set of identifiers for the CLKs and 581-Keys.
fore, the Niedermeyer-attack should fail for randomly Since the real-world data sets used here contained
hashed Bloom filters. This theoretical expectation has only current places of residence, we simulated the
been empirically verified by (Schnell and Borgs, 2016). place of birth according to German administrative pop-
In conclusion, for salted Bloom filter encodings ulation counts. We introduced artificial 10% address
279
HEALTHINF 2017 - 10th International Conference on Health Informatics
!" !"
#
!" #
!"
"!$% "!$%
Figure 1: Precision of the CLK and encrypted statistical Figure 2: Recall of the CLK and encrypted statistical link-
linkage key variants. Since the ALCs were matched exactly, age key variants. Since the ALCs were matched exactly,
their values are shown as constants, while several similarity their values are shown as constants, while several similarity
thresholds were used for CLKs. thresholds were used for CLKs.
screening program is considered as reflecting the true
!"#
matching status. Based on this classification, the com-
!"#
pared methods will yield true positive (TP), false posi-
tive (FP), true negative (TN) and false negative (FN)
classifications of record pairs.
This way, we can compare the methods using preci-
TP TP
sion (Precision = TP+FP ) and recall (Recall = TP+FN )
(Baeza-Yates and Ribeiro-Neto, 1999).
According to legal requirements, unencrypted iden-
Figure 3: Precision of the 581-Key and CLK with and with-
tifiers were processed only at the office of the data out inclusion of places of birth.
holder. ALCs, 581-Key and CLKs were generated with
Python 3, while R (R Core Team, 2016) was used for
the matching and statistical computation. CLKs show more (0.7% – 2.8%) true positives than
both standard ALC variants (see table 1), even out-
performing the 581-Key. However, given this set of
identifiers, the amount of false positives is consider-
4 RESULTS ably higher. Since CLKs should perform better if more
(stable) identifiers are included. Therefore, for the sec-
Figures 1 and 2 show the results of the standard CLK ond set of experiments, we included place of birth and
(k = 10 hash functions) against the encrypted linkage hashed it into the original CLKs. We did the same with
keys in terms of precision and recall. Lowering the the 581-Key, concatenating place of birth to the 581-
threshold improves the recall. Precision is stable until Key before hashing it again. Figures ?? and 4 show
the threshold approaches 0.88. Above this threshold, that the performance now exceeds the standard ALCs
precision drops considerably. Given this set of iden- in terms of recall while showing improved precision
tifiers, CLK does not exceed the performance of the values.
Swiss ALC and the 581-Key. Table 1 lists the detailed classifications in terms of
All in all, ALCs offer higher precision (less false true (TP) and false positive (FP) record pairs, as well
positives) compared to the CLK. However, the CLK as missed record pairs (false negatives (FN)) along
outperforms the ALCs in terms of recall as the simi- with recall and precision at a Tanimoto-threshold of
larity threshold is lowered below 0.88. At the recom- 0.85 for all ALCs, the 581-Key and the CLKs. Details
mended Tanimoto-threshold of 0.85 (Schnell, 2015), on the results for adding the simulated place of birth
280
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world
Mammography Data
Table 1: Classification results for all methods presented. CLK results are based on a Tanimoto-threshold of 0.85 using Multibit
Trees.
impact of linkage errors on substantial results can be
!"#$
!"#$ easily studied. Therefore, we consider the impact of
increased false positives as not limiting the application
of CLKs.
Precision and recall of CLKs will exceed ALCs
and 581-Keys if more stable identifiers can be used.
Recently, (Brown et al., 2016) showed that the optimal
choice of identifiers and parameters is critical for the
Figure 4: Recall of the 581-Key and CLK with and without performance of Bloom filter-based PPRL. Their results
inclusion of places of birth. vary, depending on the set of identifiers used. They also
showed the need for stable identifiers, as errors and
are shown as well. The CLKs consistently show more missing values (for example, in recent addresses) will
true positive classifications, while the ALCs and 581- reduce recall.
Key perform better in terms of precision (fewer false After fine-tuning parameters and identifier sets,
positives). PPRL linkage quality comparable to clear text link-
It has to be noted that adding the place of birth to age can be achieved with CLKs. Furthermore, using
the set of identifiers improves the precision for both Multibit Trees as suggested by (Schnell, 2014), PPRL
the 581-Key and the CLKs, while only decreasing re- using CLKs can be done (without additional blocking)
call marginally (likely due to the 10% errors simulated on standard hardware with two files containing 5 mil-
for the birth places). A CLK with birthplace informa- lion records each in a little over 4 days (Brown et al.,
tion stored in it outperforms all standard ALC variants 2016). If additional blocks such as date of birth are
and the 581-Key without additional identifiers in both used, linkage can be done in less than an hour (Schnell,
recall and precision. 2015).
Since the simulated birth places assumed a worst- Bloom filters can be used to represent other data
case setting of 10% errors in the data, real-world ap- than strings: (Vatsalan and Christen, 2016) demon-
plications using CLKs will benefit from including ad- strated the use of numerical and date information, (Far-
ditional stable identifiers. These results show the po- row and Schnell, 2017) tested the inclusion of distance-
tential of using Bloom filters for real-world privacy- preserving locational data. Both techniques will extend
preserving record linkage applications, especially if the number of possible applications for PPRL.
additional stable information is available. Currently, there is no known way of attacking
CLKs and state-of-the-art variants of single Bloom fil-
ters (Schnell and Borgs, 2016). Therefore, they might
be used to link files using personal identifiers accord-
5 DISCUSSION ing to the de-facto anonymity standard required by the
new EU regulation on data protection.
In this paper, we showed a real-world application of
the Cryptographic Long-term Key. Previously, ALCs
281
HEALTHINF 2017 - 10th International Conference on Health Informatics
282
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world
Mammography Data
Kroll, M. and Steinmetzer, S. (2015). Who Is Schnell, R., Bachteler, T., and Reiher, J. (2011). A novel
1011011111...1110110010? Automated Cryptanalysis error-tolerant anonymous linking code. Working Paper
of Bloom Filter Encryptions of Databases with Several WP-GRLC-2011-02, German Record Linkage Center,
Personal Identifiers. In Biomedical Engineering Sys- Duisburg.
tems and Technologies 2015, pages 341–356. Springer. Schnell, R. and Borgs, C. (2015). Building a national peri-
Kuzu, M., Kantarcioglu, M., Durham, E., and Malin, B. natal database without the use of unique personal iden-
(2011). A constraint satisfaction cryptanalysis of tifiers. In 2015 IEEE 15th International Conference
Bloom filters in private record linkage. In The 11th on Data Mining Workshops (ICDM 2015), pages 232–
Privacy Enhancing Technologies Symposium: 27–29 239., Atlantic City, NJ, USA. IEEE Publishing.
July 2011; Waterloo, Canada. Schnell, R. and Borgs, C. (2016). Randomized response and
Kuzu, M., Kantarcioglu, M., Durham, E. A., Toth, C., and balanced bloom filters for privacy preserving record
Malin, B. (2013). A practical approach to achieve pri- linkage. In 2016 IEEE 16th International Conference
vate medical record linkage in light of public resources. on Data Mining Workshops (ICDM 2016), Barcelona,
Journal of the American Medical Informatics Associa- Dec 12, 2016 - Dec 15, 2016. IEEE Publishing.
tion, 20(2):285–292. Schülter, E., Kaiser, R., Oette, M., Müller, C., Schmeisser,
Niedermeyer, F., Steinmetzer, S., Kroll, M., and Schnell, R. N., Selbig, J., Beerenwinkel, N., Lengauer, T., Däumer,
(2014). Cryptanalysis of basic bloom filters used for M., and Hoffmann, D. (2007). Arevir: A database to
privacy preserving record linkage. Journal of Privacy support the analysis of resistance mutations of human
and Confidentiality, 6(2):59–69. immunodeficiency. European Journal of Medical Re-
Office fédéral de la statistique (1997). La protection des search, 12(Supplememt III):10–11.
données dans la statistique médicale. Technical report, Stallings, W. (2014). Cryptography and Network Security:
Neuchatel. Principles and Practice. Pearson, New Jersey, 6 edi-
R Core Team (2016). R: A Language and Environment for tion.
Statistical Computing. R Foundation for Statistical Taylor, L. K., Irvine, K., Iannotti, R., Harchak, T., and Lim,
Computing, Vienna, Austria. K. (2014). Optimal strategy for linkage of datasets
Randall, S., Ferrante, A., Boyd, J., Brown, A., and Semmens, containing a statistical linkage key and datasets with
J. (2016). Limited privacy protection and poor sensi- full personal identifiers. BMC Medical Informatics and
tivity: Is it time to move on from the statistical linkage Decision Making, 14:85.
key-581? Health Information Management Journal, Tessmer, A., Welte, T., Schmidt-Ott, R., Eberle, S., Barten, G.,
45(2):71–79. Suttorp, N., and Schaberg, T. (2011). Influenza vaccina-
Randall, S. M., Ferrante, A. M., Boyd, J. H., Bauer, J. K., and tion is associated with reduced severity of community-
Semmens, J. B. (2014). Privacy-preserving record link- acquired pneumonia. European Respiratory Journal,
age on large real world datasets. Journal of Biomedical 38(1):147–153.
Informatics, 50:205–212. Vatsalan, D. and Christen, P. (2016). Privacy-preserving
Ridder, G. and Moffitt, R. (2007). The econometrics of data matching of similar patients. Journal of Biomedical
combination. In Heckman, J. J. and Leamer, E. E., Informatics, 59:285–298.
editors, Handbook of Econometrics, volume 6B, pages Vatsalan, D., Christen, P., and Verykios, V. S. (2013). A tax-
5469–5547. Elsevier, Amsterdam. onomy of privacy-preserving record linkage techniques.
Robertson, A. M. and Willett, P. (1998). Applications of Information Systems, 38(6):946–969.
n-grams in textual information systems. Journal of
Documentation, 54(1):48–67.
Ryan, T., Holmes, B., and Gibson, D. (1999). A national min-
imum data set for home and community care. Canberra,
AIHW.
Schmidlin, K., Clough-Gorr, K. M., Spoerri, A., and SNC
study group (2015). Privacy preserving probabilistic
record linkage (P3rl): a novel method for linking ex-
isting health-related data and maintaining participant
confidentiality. BMC medical research methodology,
15:46.
Schnell, R. (2014). An efficient privacy-preserving record
linkage technique for administrative data and censuses.
Journal of the International Association for Official
Statistics, 30(3):263–270.
Schnell, R. (2015). Privacy preserving record linkage. In Har-
ron, K., Goldstein, H., and Dibben, C., editors, Method-
ological Developments in Data Linkage, pages 201–
225. Wiley, Chichester.
Schnell, R., Bachteler, T., and Reiher, J. (2009). Privacy-
preserving record linkage using Bloom filters. BMC
Medical Informatics and Decision Making, 9(41).
283
A Modified All-and-One Classification Algorithm Combined with the
Bag-of-Features Model to Address the Food Recognition Task
Abstract: Dietary intake monitoring can play an important role in reducing the risk of diet related chronic diseases.
Automatic systems that support patients to count the nutrient contents, like carbohydrates (CHO), of their
meals, can provide valuable tools. In this study, a food recognition system is proposed, which consists of two
modules performing feature extraction and classification of food images, respectively. The dataset used con-
sists of 1200 food images split into six categories (bread, meat, potatoes, rice, pasta and vegetables). Speeded
Up Robust Features (SURF) along with Color and Local Binary Pattern (LBP) features are extracted from the
food images. The Bag-Of-Features (BOF) model is used in order to reduce the features space. A modified
version of the All-And-One Support Vector Machine (SVM) is proposed to perform the task of classification
and its performance is evaluated against several classifiers that follow the SVM or the K-Nearest Neighbours
(KNN) approach. The proposed classification method has achieved the highest levels of accuracy (Acc = 94.2
%) in comparison with all the other classifiers.
284
Dalakleidi, K., Sarantea, M. and Nikita, K.
A Modified All-and-One Classification Algorithm Combined with the Bag-of-Features Model to Address the Food Recognition Task.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 284-290
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
A Modified All-and-One Classification Algorithm Combined with the Bag-of-Features Model to Address the Food Recognition Task
the extracted features visual words, and by describing calculates pairwise statistics between local features
the image content with the distribution of these visual has been presented (Yang et al., 2010). These statis-
words (Wang et al., 2016). tics are accumulated in a multi-dimensional histo-
Another important aspect of the food recognition gram, which is then used as input to a SVM classifier.
task is that it is usually a multiclass classification Food images are taken from the Pittsburgh Food Im-
problem, as the used food datasets almost always con- age Dataset (PFID) (Chen et al., 2009). This system
tain more than two categories of food. There exist has also achieved high levels of recognition accuracy
many classification approaches in order to address the (80%).
multiclass recognition task, but the most prominent The use of the BOF model has been adopted in
ones, like the One-Against-All (OAA), the One- several food recognition systems recently, since food
Against-One (OAO) and the All-And-One (A&O) recognition does not presume any typical spatial ar-
(Pedrajas and Boyer, 2006) descend from the binari- rangement of the food elements. Based on the BOF
zation strategy, where the division of the initial mul- model, the Food Intake Visual and Voice Recognizer
ticlass problem to several binary class problems takes system which aims to measure the nutritional content
place (Galar et al., 2011). of a user’s meal (Puri et al., 2009) has been proposed.
Several attempts to implement automatic or semi- Given a set of three images of a user’s plate of food,
automatic systems for dietary intake monitoring have the system first asks the user to list food items through
been reported in the literature. A food identification speech, then attempts to identify each food item on
application called DietCam has been recently pre- the plate, and finally reconstructs them in 3D to meas-
sented (Kong and Tan, 2012), which consists of three ure their respective volumes. Food images are col-
parts: image manager, food classifier and volume es- lected by the developers of the system. Food classifi-
timator. Images taken by the users are fed to the im- cation is based on the combined use of color neigh-
age manager, then SIFT features are extracted, clus- borhood and maximum response features in a texton
tered into visual words and fed to a simple Bayesian histogram model, which resembles the BOF ap-
probabilistic classifier, which achieves high levels of proach. Adaboost is used for feature selection and
accuracy (92%). The food volume estimator calcu- SVM for classification, which achieves recognition
lates the volume of each food item recognized by the accuracy about 90%. Moreover, a food recognition
food classifier and then the calorie content of the food system for the classification of Japanese food images
is estimated. Another food recognition application has been introduced (Joutou and Yanai, 2009), based
has been recently proposed for the classification of on the combined use of BOF of SIFT, Gabor filter re-
fast-food images (Shroff et al., 2008). After segmen- sponses and color histograms, which are then fed to a
tation of the fast-food image, color, size, texture, multiple kernel learning classifier, which has
shape and context-based features are computed and achieved acceptable levels of accuracy (61,34%). The
fed to a feed-forward artificial neural network achiev- BOF model has been used in another automatic food
ing a 90% accuracy. Moreover, a food identification recognition system (Anthimopoulos et al., 2014). The
system has been presented which consists of the fol- system firstly computes dense local features using the
lowing modules: image segmentation, feature extrac- SIFT on the HSV (Hue Saturation Value) color space,
tion, food classification, and volume estimation (Zhu then builds a visual vocabulary of 10000 visual words
et al., 2010). Food description is based on a set of by using the hierarchical k-means clustering and, fi-
color and texture features, while classification is nally, classifies the food images with a linear SVM
based on a Support Vector Machine (SVM) classifier, classifier, which achieves high levels of accuracy
which has achieved high classification accuracy (78%).
(95,8%). An automated Food Intake Evaluation Sys- In the present study, a food recognition system is
tem (AFIES) has been reported (Martin et al., 2009), proposed which consists of two modules performing
which consists of reference card detection, food re- feature extraction and classification of food images,
gion segmentation, food classification and food respectively (Figure 1). Motivated by the ability of
amount estimation modules. The color RGB data are SURF to capture spatial intensity patterns and the sta-
used as feature vectors for classification, which is per- bility and distinctiveness provided by Color and Lo-
formed using the Mahalanobis distance of pixels from cal Binary Pattern (LBP) features, the combination of
food classes. The amount of calorie intake is esti- SURF, Color and LBP features is examined in this
mated based on the assumption that food area is line- study. Moreover, a novel modified version of the All-
arly proportional to the food volume. In another And-One (M-A&O) SVM classifier for multiclass
study, recognition of seven broad categories of food classification problems is proposed and its perfor-
based on a representation for food items that mance is assessed against classification methods
285
HEALTHINF 2017 - 10th International Conference on Health Informatics
based on SVM or the K-Nearest Neighbour ap- represented by the frequency of the codewords of the
proaches including the OAA SVM, the OAO SVM, visual dictionary. The visual dictionary is built with
the A&O SVM, the Weighted K-Nearest Neighbour the use of the k-means clustering algorithm. The clus-
(WKNN) classifier, the Dual Weighted K-Nearest ter centers of the feature points extracted in the first
Neighbour (DWKNN) classifier, and the K-Nearest step of the BOF approach are defined as visual words.
Neighbour Equality (KNNE) classifier. The visual dictionary is the combination of these vis-
ual words (Wang et al., 2016).
286
A Modified All-and-One Classification Algorithm Combined with the Bag-of-Features Model to Address the Food Recognition Task
287
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 2: The average accuracy (%) of the classifiers under closer to it in terms of CHO than with meat or vege-
comparison on the six food classes of the Food Image Da- tables. The best classification accuracy is achieved
taset. for vegetables (Acc = 100.0%), this is due to the dis-
Algorithm Acc (%) tinctive green color of vegetables.
WKNN 84.4
DWKNN 92.8
KNNE 93.9 4 CONCLUSIONS
OAA SVM 90.6
OAO SVM 93.9 Automatic food recognition systems can be used to
A&O SVM 90.3 estimate the content of a meal in CHO for patients
M-A&O SVM 94.2 with diet related chronic diseases, such as obesity and
diabetes mellitus. In this study, an attempt to address
Table 3: Confusion matrix of the M-A&O SVM for each the tasks of feature extraction and food image recog-
food class (Bread, Meat, Pasta, Potatoes, Rice and Vegeta- nition was made. The use of the SURF, Color and
bles) of the Food Image Dataset. LBP features in combination with the BOF model has
proven to be particularly effective in terms of average
Confusion Matrix classification accuracy. Several classification ap-
proaches for multiclass classification have been
Acc
Br M Pa Pot R Veg tested. The best classification accuracy (Acc =
(%)
94.2%) has been achieved by a modified version of
Br 93.3 0.0 0.0 0.0 6.7 0.0 the All-And-One SVM approach and is quite high as
95. compared to reported values of classification accu-
M 1.7 0.0 3.3 0.0 0.0
0 racy for food images in the literature (60%-96%). The
Pa 0.0 0.0 93.3 6.7 0.0 0.0 proposed system can be combined with an image seg-
mentation module and a volume estimation module
Pot 0.0 1.7 5.0 93.3 0.0 0.0
towards the development of an automatic food recog-
90. nition system. Moreover, several other classifiers,
R 0.0 0.0 6.7 3.3 0.0
0 like AdaBoost, Random Forests and Convolutional
100. Neural Networks, can be used in the future for com-
Veg 0.0 0.0 0.0 0.0 0.0
0 parison purposes in the classification module.
In Table 2, the average accuracy of the classifiers
under comparison on the six food classes is presented.
The size of the vocabulary of the BOF method for
SURF and Color features is 1000, thus a total number
of 2059 features is used for the classification. Ten k-
nearest neighbours are used for the WKNN, DWKNN
and KNNE. As it can be observed in Table 2, the low-
est average accuracy (Acc = 84.4%) is achieved by
the WKNN classifier, whereas the highest average ac-
curacy (Acc = 94.2%) is achieved by M-A&O SVM.
The second best average accuracy is achieved by the
OAO SVM and KNNE algorithms. The superiority of
M-A&O SVM can be explained by the fact that it
combines two very powerful strategies, the OAA Figure 1: Block diagram of the proposed system.
SVM and the OAO SVM, for multiclass classifica-
tion.
In Table 3, the classification accuracy of M-A&O
SVM for each food class is shown in the form of the
confusion matrix. It can be observed that the lower
classification accuracy (Acc = 90.0%) is achieved for
the class of rice. This is due to the fact that rice is
mingled with several sauces which can be very differ-
ent in color and texture. It is important to note that Figure 2: Example of images from each of the six categories
rice is misclassified to potatoes and pasta which are of the Food Image Dataset.
288
A Modified All-and-One Classification Algorithm Combined with the Bag-of-Features Model to Address the Food Recognition Task
289
HEALTHINF 2017 - 10th International Conference on Health Informatics
290
Static and Dynamic Approaches for Pain Intensity Estimation using
Facial Expressions
Keywords: Regression, LBP-TOP, 3D-SIFT, LBP, DSIFT, Feature Extraction, Facial Expression Analysis.
Abstract: Self-report is the most conventional means of pain intensity assessment in clinical environments. But, it is not
an accurate metric or not even possible to measure in many circumstances, e.g. intensive care units. Continu-
ous and automatic pain level evaluation is an advantageous solution to overcome this issue. In this paper, we
aim to map facial expressions to pain intensity levels. We extract well-known static (local binary pattern(LBP)
and dense scale-invariant feature transform (DSIFT)) and dynamic (local binary patterns on three orthogonal
planes (LBP-TOP) and three dimensional scale-invariant feature transform (3D-SIFT)) facial feature descrip-
tors and employ the linear regression method to label a number between zero (no pain) to five (strong pain) to
each testing sequence. We have evaluated our methods on the publicly available UNBC-McMaster shoulder
pain expression archive database and achieved average mean square error (MSE) of 1.53 and Pearson cor-
relation coefficient (PCC) of 0.79 using leave-one-subject-out cross validation. Acquired results prove the
superiority of dynamic facial features compared to the static ones in pain intensity determination applications.
291
Zebarjadi, N. and Alikhani, I.
Static and Dynamic Approaches for Pain Intensity Estimation using Facial Expressions.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 291-296
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
292
Static and Dynamic Approaches for Pain Intensity Estimation using Facial Expressions
3.1.2 DSIFT
293
HEALTHINF 2017 - 10th International Conference on Health Informatics
3.3 Performance Measurement Table 2: The best performance of all methods on UNBC-
McMaster shoulder pain expression archive database. Sub-
scripts are the parameters of each descriptor explained in
The construction of feature vectors is followed by lin- section 4.
ear regression using SVR machine (Chang and Lin,
2011). The systems are trained using predefined Feature descriptors MSE PCC
OPI labels corresponding to each sequence pain level, LBP8,2,8,7,5 1.81 0.76
ranging from zero (no pain) to five (extreme pain). DSIFT8,4,4,6 2.33 0.45
We have considered leave-one-subject-out cross val- LBP − T OP8,2,8,6,6 1.53 0.74
idation technique and thus, the system is iteratively 3DSIFT8,3,3,10 1.74 0.61
trained using all except one subject’s data and is LBP8,2,10,7,5 2.12 0.77
tested on the excluded sample subject’s data. The DSIFT8,4,4,10 2.40 0.48
performance is then computed by mean squared er- LBP − T OP8,2,10,7,5 1.70 0.79
ror (MSE) and Pearson correlation coefficient(PCC), 3D − SIFT8,4,4,10 1.80 0.64
which are given in the following equations:
1 n case of PCC measure for LBP-TOP model. How-
MSE(X,Y ) = ∑ (Y − X)2 ,
n i=1
(4) ever, optimal parameters of LBP-TOP model based
on these two metrics are not the same.
From the least MSE point of view, dynamic fea-
1 n Xi − μX Yi − μY tures, including LBP-TOP and 3D-SIFT surpass the
PCC(X,Y ) = ∑ ( σX )( σY ),
n − 1 i=1
(5) static feature descriptors, including LBP and DSIFT.
Nevertheless, considering acquired PCC values, LBP
where X and Y are the true OPI labels and estimated family leads to superior outcome compared to the
pain intensity level, respectively. n is the number of SIFT family.
sequences, μ and σ correspond to the mean and stan- Interestingly, with respect to either of the met-
dard deviation of their subscript vectors. rics, temporal feature descriptors in either of the fea-
ture families outperform the static feature descrip-
tors of the same family. The reason is that, there is
4 EXPERIMENTAL RESULTS useful temporal information present in the sequences
which boosts the performance of regression machine
In this section, the results of proposed approaches are and this information might not be used by employing
provided. Parameter adjustment should be conducted static feature descriptors. Although our obtained re-
for all feature descriptors. Reasonably wide range of sults are limited to UNBC-McMaster shoulder pain
parameters are experimented to find efficient values expression archive database, they are in agreement
for feature block sizes and SVR parameters. MSE with (Zhao and Pietikainen, 2007; Scovanner et al.,
and PCC of some tested parameters for all descrip- 2007) in this context.
tors are depicted in Figures 5 and 6, respectively. The Comparing 3D descriptor performances attained
minimum MSE and maximum PCC are marked by in our experiments, by either of the metrics, LBP-
triangles in each sub-figure. TOP gives superior results than 3D-SIFT. The same
Table 2 represents the best MSE and PCC re- statement can be proposed for the corresponding 2D
sults of all static and dynamic descriptors on UNBC- descriptors. This outcome shows the advantage of
McMaster shoulder pain expression archive database. LBP family on the facial expression assisted pain in-
Best parameters of the features are provided as sub- tensity estimation applications and is correlated with
scripts in this table. Parameters for both LBP and the results obtained in many papers contributed in fa-
LBP-TOP are number of neighboring points around cial expression applications such as (Kaltwang et al.,
each central pixel (P), radius around each central 2012).
pixel (R), number of divisions in row, in column and
in time, respectively. In 2D and 3D-SIFT, parameters
are the size of the extracted descriptor, number of bins 5 CONCLUSION
along x axis, y axis and time divisions.
According to Figure 5 and the first four rows Self-reported pain intensity level is not a reliable and
of Table 2, with respect to obtained MSE values, always possible means of pain evaluation. Estima-
LBP − T OP8,2,8,6,6 outperforms other models by 0.21 tion of a patient’s pain intensity using alternative so-
unit compared to the second best model. This result lutions such as facial expression analysis is a func-
is in agreement with the acquired performance in the tional and reliable indicator and this information can
294
Static and Dynamic Approaches for Pain Intensity Estimation using Facial Expressions
2.4 2.4
2.2 2.2
MSE
MSE
2 2
1.8 1.8
1.6 1.6
1.4 1.4
6x6x5 7x7x4 7x9x6 8x6x4 8x7x5* 8x10x6 9x6x4 9x9x6 10x7x5 2x2x4 3x3x4 4x4x4 2x2x6 3x3x6 4x4x6 2x2x10 3x3x10 4x4x10
Figure 5: Acquired MSE over a different number of blocks. For each feature extraction technique(LBP, SIFT, LBP-TOP,
3D-SIFT), the minimum MSE is highlighted by a triangle. The x-axis tick labels are corresponding to row divisions (number
of bins in x-axis) × column divisions (number of bins in y-axis)× time divisions regarding to LBP (DSIFT) and LBP-TOP
(3D-SIFT). In the x-axis of left sub-figure, * corresponded to 8x6x6 for LBP-TOP and 8x7x5 for LBP.
0.7 0.7
0.65 0.65
PCC
PCC
0.6 0.6
0.55 0.55
0.5 0.5
0.45 0.45
0.4 0.4
6x6x5 7x7x4 7x9x6 8x6x4 8x7x5 8x10x6 9x6x4 9x9x6 10x7x5 2x2x4 3x3x4 4x4x4 2x2x6 3x3x6 4x4x6 2x2x10 3x3x10 4x4x10
Figure 6: PCC over a different number of blocks. For each feature extraction technique(LBP, DSIFT, LBP-TOP, 3D-SIFT),
the maximum PCC is accentuated by triangle. The x-axis labels are corresponding to row division (number of bins in x-axis)
× column division (number of bins in y-axis)× time division with respect to LBP (DSIFT) and LBP-TOP (3D-SIFT).
be used for many clinical applications, e.g. drug dose and PCC values, respectively.
management and monitoring. This solution is par-
ticularly advantageous for those patients who are not
able to communicate reliably, including severely ill REFERENCES
elder patients or immature patients. In this study, we
employed four different feature sets, containing two Ahonen, T., Hadid, A., and Pietikäinen, M. (2004). Face
static (LBP and DSIFT) and two dynamic descriptors recognition with local binary patterns. In Computer
(LBP-TOP and 3D-SIFT) in the application of pain vision-eccv 2004, pages 469–481. Springer.
intensity estimation from facial expressions. We have Ahonen, T., Hadid, A., and Pietikainen, M. (2006). Face
evaluated our models on the UNBC-McMaster shoul- description with local binary patterns: Application to
der pain expression archive database using SVR ma- face recognition. Pattern Analysis and Machine Intel-
ligence, IEEE Transactions on, 28(12):2037–2041.
chine. Our experimental results underline the supe-
Ashraf, A. B., Lucey, S., Cohn, J. F., Chen, T., Ambadar,
rior performance of dynamic models compared to the Z., Prkachin, K. M., and Solomon, P. E. (2009). The
static ones. In addition, LBP family offers more de- painful face–pain expression recognition using active
scriptive information of facial expressions than SIFT appearance models. Image and vision computing,
family descriptors. LBP-TOP provides the most ac- 27(12):1788–1796.
curate results of regression by 1.53 and 0.79 as MSE Chang, C.-C. and Lin, C.-J. (2011). Libsvm: a library for
295
HEALTHINF 2017 - 10th International Conference on Health Informatics
support vector machines. ACM Transactions on Intel- In Proceedings of the 18th ACM international confer-
ligent Systems and Technology (TIST), 2(3):27. ence on Multimedia, pages 1469–1472. ACM.
Kaltwang, S., Rudovic, O., and Pantic, M. (2012). Con- Zhao, G. and Pietikainen, M. (2007). Dynamic texture
tinuous pain intensity estimation from facial expres- recognition using local binary patterns with an appli-
sions. In Advances in Visual Computing, pages 368– cation to facial expressions. Pattern Analysis and Ma-
377. Springer. chine Intelligence, IEEE Transactions on, 29(6):915–
Khan, R. A., Meyer, A., Konik, H., and Bouakaz, S. (2013). 928.
Pain detection through shape and appearance features.
In Multimedia and Expo (ICME), 2013 IEEE Interna-
tional Conference on, pages 1–6. IEEE.
Krig, S. (2014). Computer Vision Metrics: Survey, Taxon-
omy, and Analysis. Apress.
Lowe, D. G. (2004). Distinctive image features from scale-
invariant keypoints. International journal of computer
vision, 60(2):91–110.
Lucey, P., Cohn, J. F., Matthews, I., Lucey, S., Sridharan,
S., Howlett, J., and Prkachin, K. M. (2011a). Auto-
matically detecting pain in video through facial action
units. IEEE Transactions on Systems, Man, and Cy-
bernetics, Part B (Cybernetics), 41(3):664–674.
Lucey, P., Cohn, J. F., Prkachin, K. M., Solomon, P. E.,
Chew, S., and Matthews, I. (2012). Painful moni-
toring: Automatic pain monitoring using the unbc-
mcmaster shoulder pain expression archive database.
Image and Vision Computing, 30(3):197–205.
Lucey, P., Cohn, J. F., Prkachin, K. M., Solomon, P. E.,
and Matthews, I. (2011b). Painful data: The unbc-
mcmaster shoulder pain expression archive database.
In Automatic Face & Gesture Recognition and Work-
shops (FG 2011), 2011 IEEE International Confer-
ence on, pages 57–64. IEEE.
Neshov, N. and Manolova, A. (2015). Pain detection
from facial characteristics using supervised descent
method. In Intelligent Data Acquisition and Ad-
vanced Computing Systems: Technology and Appli-
cations (IDAACS), 2015 IEEE 8th International Con-
ference on, volume 1, pages 251–256. IEEE.
Ojala, T., Pietikäinen, M., and Harwood, D. (1996). A com-
parative study of texture measures with classification
based on featured distributions. Pattern recognition,
29(1):51–59.
Ojala, T., Pietikäinen, M., and Mäenpää, T. (2002). Mul-
tiresolution gray-scale and rotation invariant texture
classification with local binary patterns. Pattern Anal-
ysis and Machine Intelligence, IEEE Transactions on,
24(7):971–987.
Rathee, N. and Ganotra, D. (2015). A novel approach for
pain intensity detection based on facial feature defor-
mations. Journal of Visual Communication and Image
Representation, 33:247–254.
Roy, S. D., Bhowmik, M. K., Saha, P., and Ghosh, A. K.
(2016). An approach for automatic pain detection
through facial expression. Procedia Computer Sci-
ence, 84:99–106.
Scovanner, P., Ali, S., and Shah, M. (2007). A 3-
dimensional sift descriptor and its application to ac-
tion recognition. In Proceedings of the 15th inter-
national conference on Multimedia, pages 357–360.
ACM.
Vedaldi, A. and Fulkerson, B. (2010). Vlfeat: An open
and portable library of computer vision algorithms.
296
WorkUp: A Mobile Application to Support Health Guidelines
Abstract: Objective: This paper presents a model of mobile application to assess patients and prescribe physical exer-
cises offering interaction among health professionals and patients. Methods: The project is based on mobile
platform and implemented using client-server architecture and cloud computing for data synchronization in
different devices. Results: Health professionals and patients tested our application and answered question-
naire. The results indicate that the functionality and usability are satisfactory adhesion to our app design.
Conclusion: Our approach may be a candidate model to government agencies to support in prevention of
obesity and improve the health indicators of the patient to a healthier life.
297
Santos, V., Shishido, H., Junior, F. and Eler, G.
WorkUp: A Mobile Application to Support Health Guidelines.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 297-304
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
The remaining part of the paper proceeds as fol- WorkUp, as other studies, has shown interest and
lows: we discussed about related studies in second adherence on the part of those involved. Some authors
section. Section three presents the technologies, de- demonstrated that the success level of health services
velopment process, software architecture, and tests depends on the level of user acceptance and adoption
and validation methods. In section four, the project (Sezgin and Yıldırım, 2014). Additional research is
implementation is presented. The fifth section is pre- needed to explore several hypotheses. For example, if
sented a qualitative evaluation about our design ac- more engaging user interfaces, including easier nav-
ceptance through users interview. Finally, we present igation, simpler layouts, and refined aesthetics can
our conclusion and limitations of our study in the sec- contribute to the adherence of mHealth apps. Then,
tion six. from this point of research design, the emerging stud-
ies should include more qualitative approaches and
longitudinal studies in order to effectively understand
the user’s needs (Kaplan and Maxwell, 2005), which
2 RELATED WORK can strengthen the qualitative research conducted for
the WorkUp.
Studies in several countries show success in com-
bating obesity using physical activity together with
combined interventions: changes to food/diet, in-
creased physical activity, and behavioral strategies 3 METHODS
(Jebb et al., 2011; Turner et al., 2012). Face-to-face
approaches are effective, but they are relatively ex- For the application’s development, the system plan-
pensive to implement, difficult to scale up, and do not ning, design, and implementation were performed.
suit those who work or live far from venues. The addi- Later, an evaluation of usability was applied in pa-
tion of mHealth apps in everyday life offers a practical tients and health professionals.
and potentially cost-effective solution to the barriers
of face-to-face approaches (Waterlander et al., 2014). 3.1 Technologies and Tools
Researches demonstrated strong support for a
mHealth weight management intervention; with 75% We adopted Android platform due to its highly used
saying they would use a mobile app for weight man- technology, its ability to support wide hardware com-
agement intervention (Gorton et al., 2011). Another patibility, and to offer many components that provide
study showed that the widespread use of information a good user interaction. The codification is based on
and communication technology tools offers an inno- Java and eXtended Markup Language (XML) files de-
vative and potentially beneficial avenue to increase scribe in the user interface. The Android Develop-
the level of physical activity in Heart Failure (HF) pa- ment Toolkit (ADT) was adopted for application test
tients (Franklin, 2015). through the use of its virtual device emulator.
A survey performed in 2012, shows 50 applica- The artefacts and requirements were modelled in
tions available in Brazil within the health field, of Unified Modelling Language (UML) to design sys-
which 20 belong only to the Android platform, 19 to tem diagrams using Astah Community Edition. The
the iOS platform, 6 on the Windows Phone platform, database was designed in BrModelo software that
1 supporting the three platforms (Diet and Health), generates database script commands. SQLite was the
and 4 common to Android and iOS platforms (SUS system database employed for data persistence due to
Procedures, SAESP, Measure One and Emagrecen- its native support for Android, good performance and
tro). They are mostly free (32 apps), but the Android low resources usage. In Android Development Tools
platform leads to greater amount of paid applications. (ADT) contains a manager for SQLite databases in
The content of more than half of these applications is order to handle data manually during development.
aimed at professionals. The applications targeting the WorkUp data is stored on the cloud to get a wide
consumer public deal primarily with issues related to geographic access and allow users access to their syn-
diet and physical conditioning (Bonome et al., 2012). chronized data, regardless of the device. Web service
But still, comprehensive applications that enable a technology was chosen to synchronize the local data
range of information about the patient and that allow with the cloud, as it works as a neutral technology that
the participation in the evolution process of his gen- can transmit data and be easily adapted to any other
eral state of health and weight are necessary. This is technology.
why we purposed and developed the WorkUp, based
on users’ needs becoming part of a National Policy
for Health Promotion.
298
WorkUp: A Mobile Application to Support Health Guidelines
3.2 Data Synchronization physical educator can create a training set based on
patient’s physical needs and send it to him. The exe-
The application server was deployed on Amazon EC2 cution of exercises is registered by the patient on app,
Services. The operating system was Linux Ubuntu and it can be visualized by the physical educator. Ac-
14.04, Java 8, and MySQL database to store all data cording to health program policy, there is an option to
through web services. the HP schedule classes with patients individually or
When our application is installed on a mobile de- in groups. If the patient agrees with proposed sched-
vice, it starts a service that periodically communicates ule, he can accept it. Otherwise, the patient can mes-
with the data synchronization web service. Clients sage his health professional asking another available
perform a query to check available updates in cloud time.
database. The communication model is represented
in Figure 1. If there is an update, the appropriate rou- 4.1 Profile Management and User
tine will be started automatically to synchronize the
data.
Communication
The security of data communication can be treated
in three ways. Firstly data is encrypted before it will Local data persistence and guidelines to allow com-
be sent to server or retrieved from it. Before the data munication between the mobile app and web service
transmission to cloud, data is encrypted and its in- to validate login (F1) were some of the features imple-
tegrity is checked when arrives on the other side. In mented. The Facebook API was integrated to provide
local SQLite database, there are libraries to encrypt access to the app using a Facebook account (F2). A
data such as SQLCipher and SQLiteCrypt. notification and synchronization service (F16) had to
be created in order to keep communication between
the patient and the professional. We have also de-
veloped functions such as search user (F5), with the
option of adding other users to the contact list. As
stated earlier, a professional can establish connection
with several patients. When clicking on a patient, the
professional can manage his patients through an inter-
face that allows access to assessments, training pre-
Figure 1: Data synchronization model of WorkUp. scriptions, class schedule, and the removal of the pa-
tient (F6) from his list. The concern of the third sprint
was the implementation of the interfaces for personal
4 PROJECT RESULTS data handling through control panels, where the user
has access to information and can update it as desired
This section describes our app structure and use-flow. (F7).
Our application has two user types: health profes-
sional (HP) and patient (P). Each one performs differ- 4.2 Management of Assessments
ent activities on app. Both user type share functionali-
ties such as account activities and view patient assess- The second module deals with the management of as-
ment, training set and class schedule. However, there sessments. It was concerned in keeping some char-
are particular functions, which each user type can ac- acteristics in data collection, such as the interfaces
cess. Health professional are able to create patient understanding, separation of each type of evaluation,
assessments, create or reuse training sets and manage upload to web server, and both view and delete as-
class schedules. These functionalities are organized sessments.
in modules, which are detailed in Table 1. The patient assessment tool (F8) was divided into
The basic use-flow consists in both user types cre- four parts: a) verification of goals with the new
ate an account on app. After, health professional training routine and verification of cardiorespiratory
should add a relationship with his respective patients. health through the maximum blood pressure during
The patients list of a health professional must be de- exercise and blood pressure at rest, as shown in Fig-
fined by the health unit. The patient must accept the ure 2a; b) questionnaire of medical history through
request for relationship with the health professional. Pfeiffer questionnaire, which detect if there is any
For each patient, the health team can schedule an as- history or risk involving cardiorespiratory shortcom-
sessment in order to verify patient health indicators. ings, pain, recurrent chronic problems in implement-
This assessment can be performed periodically in or- ing physical activity, loss consciousness, coronary
der to track the patients’ health progress. Then, the problems or some other risk factors (Figure 2b); c)
299
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Functionalities of each use-case allowed for Health Professional (HP), Patient (P), and System (S).
Use Case ID Functionality HP P S
(F1) Standard login X X -
(F2) Facebook login X X -
(F3) Create a standard account X X -
Manage Profile (F4) Request relationship to professional X - -
(F5) Search a user X X -
(F6) View assessments, training set, schedule of patient X X -
(F7) Update account X X -
(F8) Create a new patient assessment X - -
Perform Assessment (F9) Send collected data to server - - X
(F10) Notify patient if new assessment is available - - X
(F11) Create a training set X - -
Training Management (F12) Send completed exercise to server - - X
(F13) Reuse a training set X - -
(F14) Schedule a new class X - -
Class Schedule
(F15) Confirm a class schedule - X -
Non-functional (F16) Notification and synchronization service - - X
the body fat assessment through a variety of skin- professional needs Internet access to send the col-
fold methods; and, d) perimetry assessment, which lected data (F9) and automatically notify the patient
enables log measures of body parts. Beyond the nu- (F10) that there is a new assessment available.
merical evaluation functionality was integrated using
the smartphone camera for photographic record of the 4.3 Training Management
evaluated body members.
The training has two types of exercises, which can
be created by the own professional. Some rules were
added to the application to improve system usability.
After, it was marked by the inclusion of functionality
to create a training list (F11) according to the purpose
of the patient, inserting both aerobic and anaerobic
exercises. Only the professional can mount the train-
ing set, leaving the patient with the exercises only.
Following the conclusion of training, the patient’s col-
lected data are sent to a web database (F12) and will
be available for professional access to track the pa-
tient’s evolution.
These functionalities were developed and are
shown in Figure 3. The training sessions that have al-
ready been created can be reused by the professional
(F13), as shown in Figure 3a. In order to add a new
(a) (b)
training, it is necessary to enter a name, add exer-
cises by clicking on the +1 button (Figure 3b), and
Figure 2: Evaluation management screens: (a) Objectives view the registered exercises classified between aer-
and blood pressure; (b) Questionnaire (QPAF); (c) Body fat
calculation. obic and anaerobic (Figure 3c), with name, duration,
repetition times, and rest duration (Figure 3d).
Existent apps adopt a unique skinfold method.
However, each professional need a specific applica- 4.4 Class Management
tion, according to the physical characteristics of the
patient. So, in this sense, WorkUp has a variety of This module allows the application to control the class
skinfold methods to calculate body fat. We have im- scheduling (F14) to improve communication between
plemented both Jackson Pollock 3 and 7-site, and patient/professional. To use it, the patient needs to
Guedes methods. At the end of each assessment, the bound to the professional, so the patient can schedule
300
WorkUp: A Mobile Application to Support Health Guidelines
5 EVALUATION
In order to validate our purpose, we adopted the quali-
tative research approach because it reveals a target au-
dience’s range of behaviour and perceptions. It uses
in-depth opinions of small groups of people to sup-
port the construction of hypotheses through descrip-
tive statements. The categories extracted from the
answers of the participants were: a) effective regis-
tration method; b) ability to monitor more patients;
c) accessibility of information; d) information distor-
tion; and, e) interface and restrictions.
(c) (d) Sixteen participants, including health profession-
Figure 3: Training management screens: (a) My trainings; als and patients in both Cornélio Procópio and Ser-
(b) Edit training; (c) Registered exercises; (d) Characteris- taneja cities, located in south Brazil, tested our appli-
tics of exercises. cation.
Several interfaces were sketched and tested by
a new class and the health professional can accept it or four health professionals and twelve patients. The app
not. For a confirmation of a new class (F15), it is nec- validation was performed by 17 questions focused on
essary that both agree and confirm the date and time. usability of the system. Participants were divided into
If there are any changes, both users will be notified by HP1 to HP4 (Health Professional) and P1 to P12 (Pa-
the system. tients). Participants were asked to download the ap-
For the scheduling of a new class, the interface plication in order to explore and test the app func-
displayed in Figure 4a was built, requiring the pa- tionality. Next, the participants were requested to an-
tient/professional to select a date and time, with the swer the questionnaire. All data, comments, sugges-
ability to verify if the selected time is available. Users tions and detected problems were analyzed and used
are notified to change the status of the class to con- as a source of information to evaluate the system. Re-
firmed, registering the schedule of classes. (Figure sponses were categorized and described19-21 as: a)
4b). effective registration method for physical educators;
In addition, we have considered good practices for b) ability to monitor more patients; c) accessibility of
interface design in order to assist the user of our ap- information; d) information distortion; and, e) inter-
plication. face and restrictions.
• Effective registration method As main results,
301
HEALTHINF 2017 - 10th International Conference on Health Informatics
participants emphasized that the control of phys- Table 3: User experience reports about ability to monitor
ical activity is important for physical educators. more patients.
Interviewed professionals highlighted the need to User experience report
establish goals and analyze if the results obtained HP 2: “... I have on hand an easy way to record
have achieved them. According to the answers, it the data of my patients, which this training should
is difficult to investigate the causes of inefficiency follow. In addition, the
in the physical training because of the lack of ef- schedule allows better distribution of times so I
fective registration methods to collect the patient’s can organize myself.”
exercise routine. Table 2 presents the users reports HP 3: “It bothers me not keeping up with the pa-
referring to the registration method. tients, and not even knowing their workout for that
day, because I cannot handle
Table 2: User experience report about effective registration looking at the previous training and make the out-
method from Health Professionals (HP). line of the next.”
User experience report
HP 1: “It is difficult to monitor patients efficiently Table 4: User experience report about accessibility of infor-
without a digital record. Most of the time there mation.
is only an initial assessment and a pre-prepared User experience report
program for the patient to conduct over a period HP 1: “... I have on hand an easy way to record
of time without a complete record of case histories the data of my patients, which this training should
and prescribed activities.” follow. In addition, the schedule allows better dis-
HP 2: “You need an environment where the tribution of times so I can organize myself.”
teacher can record all information, such as HP 2: “It bothers me not keeping up with the pa-
lessons, exercises and schedules, in order to effec- tients, and not even knowing their workout for that
tively monitor the patient. In addition, through the day, because I cannot handle looking at the previ-
systematization of information, you can organize ous training and make the outline of the next.”
and visualize where the gaps are in training.” P4: “I think the data is very specific and under-
HP 3: “It is necessary to check how the patient’s standing it is complex.”
training was in relation to the time for without this P11: “At first sight, the need for data is difficult to
analysis, all is vague.” understand, but once it is properly explained it is
HP 4: “I need to know if the patient is actually easy to understand its importance.”
losing weight with the training, and if the tracing
objective is being achieved.”
where patients find unnecessary to fill out per-
sonal data in the application. The patient gener-
• Ability to monitor more patients It is common for ally has no idea of the importance of evaluation
a health professional to track multiple patients at for the prescription of activities.
the same time. This scenario is unfavorable for
the quality of training provided to patients. Some Table 5: User experience report about distortion of informa-
interviewees pointed out that our app could help tion.
professionals to follow a larger number of patients
User experience report
with high quality. Table 3 shows the discourse of
HP 1: “There are some points that can be filled in-
users that have tested the application, analyzing
correctly, which can work as a motivation to create
the resources to follow multiple patients.
new ways to reduce distortions.”
• Accessibility of information Among the ques- HP 2: “The system as presented does not have
tions, the accessibility of the information required methods that can prevent inconsistencies, for ex-
for patients’ assessment was mentioned. The ample, a patient who does not perform the exer-
health professionals noted that some data are rela- cises correctly.”
tively complicated to extract, but are necessary for P7: “We cannot guarantee that the data entered by
the proper development of activities, as described the patients during the execution of exercises are
in Table 4. really reliable.”
• Information distortion The professionals point out P10: “This app would be of little use because I’m
that, in some cases, patients promote distortions not used to perform this type of control.”
in data collection, omitting important information
about their health status (Table 5). There are cases • Interface and restrictions When participants were
302
WorkUp: A Mobile Application to Support Health Guidelines
asked about the interface, system language, ef- interface. The system is not integrated to sensors.
ficiency in performing the activities, arrange- Thus, for future work the integration of these tech-
ment of dialog boxes, error messages, and system nologies will be accomplished to provide better con-
iconography, there were no serious abnormality trol of physical activities.
highlighted. But the health professionals pointed
out that a more restrictive system would be inter-
esting for more effectiveness in achieving results
(Table 6). ACKNOWLEDGEMENTS
Table 6: User experience report about interface and appli- The authors acknowledge the support of UTFPR.
cation restrictions.
User experience report
HP 3: “The application is very pleasing to the eye REFERENCES
and easy to understand.”
HP 4: “It would be interesting if there was a way Al Ayubi, S. U., Parmanto, B., Branch, R., and Ding, D.
to make it easier for patients to access the training (2014). A persuasive and social mhealth application
to be carried out.” for physical activity: A usability and feasibility study.
P6: “The interface is pretty nice and does not JMIR mHealth and uHealth, 2(2).
show navigation problems.” Bonome, K. d. S., Di Santo, C., Prado, C., Sousa, F.,
P9: “I found no serious problems.” and Pisa, I. (2012). Disseminação do uso de aplica-
tivos móveis na atenção a saúde. In XIII Congresso
P12: “Some data is complicated to collect and un-
Brasileiro de Informática em Saúde.
derstand, it needs an improved interface.”
Capilheira, M. F., Santos, I. S., Azevedo Jr, M. R., and
Reichert, F. F. (2008). Risk factors for chronic non-
communicable diseases and the carmen initiative: a
population-based study in the south of brazil. Cader-
6 CONCLUSION nos de Saude Publica, 24(12):2767–2774.
da Saúde, M. (2014). Strategies for the care of the per-
Physical evaluation software has been developed to son with chronic disease: Obesity. Departamento de
desktop computers. However, with popularization of Atenção Básica.
mobile technologies, the adoption of mobile apps is Franklin, N. C. (2015). Technology to promote and increase
undoubtedly a useful solution. For health profession- physical activity in heart failure. Heart failure clinics,
11(1):173–182.
als, the advantage of portability overcomes some bar-
Free, C., Phillips, G., Felix, L., Galli, L., Patel, V., and Ed-
riers and allows the tracking of training, improving
wards, P. (2010). The effectiveness of m-health tech-
professional-patient communication, and allowing the nologies for improving health and health services: a
follow-up of training guidelines with more effective- systematic review protocol. BMC Research Notes,
ness. 3(1):250.
The WorkUp can be a model to support health Gorton, D., Dixon, R., Maddison, R., Mhurchu, C. N., and
agencies to promote a healthier life and keep record of Jull, A. (2011). Consumer views on the potential use
the patient physical assessments. The application also of mobile phones for the delivery of weight-loss inter-
provides users with the ability to keep tracking im- ventions. Journal of Human Nutrition and Dietetics,
24(6):616–619.
portant health indicators that show the patient’s evo-
Jebb, S. A., Ahern, A. L., Olson, A. D., Aston, L. M.,
lution. As pointed out earlier, mobile technology is
Holzapfel, C., Stoll, J., Amann-Gassner, U., Simpson,
constantly evolving in the applications market, that A. E., Fuller, N. R., Pearson, S., et al. (2011). Primary
is, every day there are new startups focusing on health care referral to a commercial provider for weight loss
and exercise routines. Therefore, WorkUp has to add treatment versus standard care: a randomised con-
up to this scenario, providing important information trolled trial. The Lancet, 378(9801):1485–1492.
for health professionals. This information can assist Kaplan, B. and Maxwell, J. A. (2005). Qualitative re-
professionals to achieve better results and improve the search methods for evaluating computer informa-
quality of life of their patients. tion systems. In Evaluating the organizational im-
pact of healthcare information systems, pages 30–55.
A limitation of this study relates to the perfor- Springer.
mance of physical activities, as WorkUp currently re-
Knight, E., Stuckey, M. I., Prapavessis, H., and Petrella,
stricts to patients the ability to perform physical ac- R. J. (2015). Public health guidelines for physical ac-
tivities proposed by a professional. However, these tivity: is there an app for that? a review of android and
mechanisms are dependent on the use of the correct apple app stores. JMIR mHealth and uHealth, 3(2).
303
HEALTHINF 2017 - 10th International Conference on Health Informatics
304
Automatic Visual Detection of Incorrect Endoscope Adaptions in
Chemical Disinfection Devices
Keywords: Computer Vision, Feature Detection, Surf, Sift, Registration, Machine Learning, Supervised Learning,
Endoscopes, Disinfection.
Abstract: This paper presents a complete analyzing system for detecting incorrect endoscope adaptions prior to the
use of chemical disinfection devices to guarantee hygienic standards and to save resources. The adaptions
are detected visually with the help of an image registration algorithm based on feature detection algorithms.
On top of the processing pipeline, we implemented a k-nearest neighbor algorithm to predict the status of
the adaption. The proposed approach shows good results in detecting the adaptions correctly.
305
Brune, T., Brune, B., Eschborn, S. and Brinker, K.
Automatic Visual Detection of Incorrect Endoscope Adaptions in Chemical Disinfection Devices.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 305-312
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
Chapter 2.2.5. Finally we show promising of the camera. So it is possible to adjust the aperture,
experimental results on the accuracy of our the ISO-value and the white balance. The white
automatic error detection prototype in Chapter 3. balance is analogically set to 6000 °K. The other
values were set empirically , so that there is no over-
exposure and therefore no loss of information. We
2 PROCEDURE use Canon EOS 750D cameras with a resolution of
24 Megapixel. A high resolution is essential for an
accurate detection.
2.1 Hardware Setup
To accomplish the tasks of detecting errors in the
adaption, a complete prototype was built. The
system consists of a loading station wherein the
detection occurs and the integrated software which is
responsible for the processing pipeline of the
detection. As a basis for our image processing are
four images taken by four high-resolution cameras
from four different perspectives in order to capture
images without occlusions of relevant parts with a
high probability. Figure 1 shows an example of an
image which was taken by one of the cameras.
For optimal image processing it is important that
the scene is illuminated using controlled light
conditions (Bader, 2002). Because of that the Figure 2: Prototype.
detection system is sealed in a cube to prevent
diffuse light entering the system. We enlighten the We consider the task of detecting adaption errors
detection system with a planar LED-Panel. for a variety of different endoscopes and adapters. In
Camera sensors take 50% of the information order to detect which endoscope is used, it is tagged
from the green interval of the spectrum. Green light with an RFID chip. We use an RFID-reader, also
transfers approximately 72% of the luminance and is connected via a serial interface to differentiate
there-fore most important for contrast and resolution between them through their integrated RFID-tags.
(Fukanaga, 1975) Because of that we chose an LED- On the basis of the detected endoscope the software
Panel with a color temperature of 6000 °K. determines which and how many adapters should be
According to Wiens Law, the maximum radiation is connected to the respective endoscope. The user gets
at 482.95 nm for 6000 °K which is within the green visual information on how to attach these adapters to
part of the spectrum. the detected endoscope. Figure 2 shows the general
setup of our prototype. At the front there is a door
which is not visible in the image.
306
Automatic Visual Detection of Incorrect Endoscope Adaptions in Chemical Disinfection Devices
307
HEALTHINF 2017 - 10th International Conference on Health Informatics
1
Eucledean
0,8
Distance
0,6
0,4
0,2
0
Figure 6: Correspondence pairs between the reference
0 0,5 1 image and the template image to detect the rough position
Number of Correspondences of the adapter.
308
Automatic Visual Detection of Incorrect Endoscope Adaptions in Chemical Disinfection Devices
309
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Correct adaptions, generated with SURF as pre- Table 3: Correct adaptions, generated with SIFT as pre-
processor. processor.
Interest Points Correspondences Interest Points Correspondences
Maximum #
Maximum #
Maximum #
Maximum #
Minimum #
Minimum #
Minimum #
Minimum #
Per Pixel
Per Pixel
Per Pixel
Per Pixel
Adapter
Adapter
Mean #
Mean #
Mean #
Mean #
824 3.4 139 5.8 402 1.7 80 3.3
a 764 995 105 189 a 391 407 54 91
േͻͲ E-3 േʹͷ E-4 േͷ E-3 േͳ͵ E-4
367 2.1 97 5.0 135 8.0 46 2.6
b 331 382 81 115 b 121 140 38 51
േʹͶ E-3 േͳʹ E-4 േͺ E-4 േͷ E-4
349 1.0 52 1.6 157 5.0 14 1.0
c 339 357 23 65 c 140 170 7 26
േͺ E-3 േͳ͵ E-4 േͳ͵ E-4 േͷ E-5
572 1.,9 53 1.7 321 1.0 23 7.0
d 561 586 45 63 d 278 336 15 33
േͳʹ E-3 േ E-4 േʹͲ E-3 േ E-5
107 1.9 17 3.0 52 9.0 9 1.5
e 106 117 9 43 e 41 58 5 13
േ͵ E-3 േͳͲ E-5 േͺ E-4 േ͵ E-4
111 697 2.0 208 6.3
114 3.4 142 4.0 f 206 776 191 220
f 6 883 114 114 േͳͺͷ E-3 േͳͲ E-4
2 E-3 േʹͳ E-4
േͺʹ 238 1.0 17 7.0
g 199 339 10 28
441 2.0 26 1.1 േͶͲ E-3 േͷ E-5
g 371 465 18 35
േ͵͵ E-3 േ E-4
In the following we outline the results of SIFT
Table 2: Incorrect adaptions, generated with SURF as pre- for the same adapter set. The statistical values of
processor. correct adaptions are shown in Table 3. Compared to
Interest Points Correspondences the SURF algorithm it attracts attention that SIFT
detects less interest points and correspondences than
Maximum #
Maximum #
Minimum #
Minimum #
Per Pixel
Adapter
Mean #
Mean #
310
Automatic Visual Detection of Incorrect Endoscope Adaptions in Chemical Disinfection Devices
the SIFT algorithm. If we have too few corres- Table 4: Confusion matrix of the classifications with
pondences it is possible that the RANSAC algorithm SURF as pre-processing.
cannot filter the correspondence errors. The result is SURF CORRECT INCORRECT
an incorrect transformation matrix. Quantitatively ADAPTIONS ADAPTIONS
the SURF algorithm has to be preferred. PREDICTED
CORRECT TP = 64 FP = 4 P’ = 68
ADAPTIONS
1200 PREDICTED
900 INCORRECT FN = 6 TN = 66 N’ = 72
ADAPTIONS
Count
600
P = 70 N = 70 ൌ ͳͶͲ
300
0 Fawcett explains another possibility to evaluate
a b c d e f g classifications (Fawcett, 2006). So called receiver
Interest Points - SURF
Interest Points - SIFT operating characteristics (ROC) graphs can be used
to evaluate and visualize the quality of a
Figure 11: Comparison of the detected interest points and classification. We divide the results of our experi-
correspondences. ments in four groups: true-positive (TP), true-
negative (TN), false-positive (FP) and false-negative
Now we will focus on the quality and precision (FN). These groups can be written in a so-called
of the classification. As outlined before we use a k- confusion matrix (Fawcett, 2006), as one can see in
nearest neighbor Algorithm for the binary Table 4 and Table 6.
classification. The Euclidean distance of the
projection pairs and the number of correspondences Table 5: Incorrect adaptions, generated with SIFT as pre-
are the features of the algorithm. Experiments with processor.
validation data gave us an optimal value for ݇ ൌ ͷ.
Interest Points Correspondences
A first estimation of the quality of the processes
delivers the classification rate. In Figure 12 one can
Maximum #
Maximum #
Minimum #
Minimum #
Per Pixel
Per Pixel
Adapter
Mean #
Mean #
see the classification rate per adapter for both
algorithms as pre-processing. All rates were
determined on test data experiments.
339 1.7 40 1.6
a 397 409 24 51
100% േͷ E-3 േͻ E-4
classification
311
HEALTHINF 2017 - 10th International Conference on Health Informatics
312
MATCHuP: An mHealth Tool for Children and Young People Health
Promotion
Beatriz López1 , Sreynoch Soung2 , Natalia Mordvanyuk1 , Albert Pla3 , Pablo Gay1
and Abel López-Bermejo4
1 University
of Girona, Girona, Spain
2 Institute
of Technology of Cambodia, Phnom Penh, Cambodia
3 University of Oslo, Oslo, Norway
4 Biomedical Research Institute of Girona, Girona, Spain
Keywords: Decision Support Systems, Telemedicine, Nursing Informatics, Wearable Health Informatics, eHealth
Applications.
Abstract: The kids of European and occidental countries are threatened by obesity. They are potential persons to become
chronic patients. mHealth technology can help them to change their nutrition and physical activity habits. This
paper presents MATCHuP, a platform that involves several agents (kids, parents, healthcare providers) that
collaborate and compete by games in a social network in order to create a enjoyable environment to promote
a behavioural change towards a healthier life.
313
López, B., Soung, S., Mordvanyuk, N., Pla, A., Gay, P. and López-Bermejo, A.
MATCHuP: An mHealth Tool for Children and Young People Health Promotion.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 313-318
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
Physical Activity
stydy on the English Apps from which 26,864 where
consumer/patient and only 8,965 apps were related
to healthcare providers. Our app includes health-
Nutrition
care providers as well as consumers, and it is multi-
Food
language, currently in English, Spanish and Catalan.
Regarding apps for kids, Table 1 shows a list of App Name
several apps. The elements that configure a mHealth Easy Eater 2 x x
success regarding nutritional habits, as for example, Eat and Move-O-Matic x x v,t
sugar ingesta, have been studied in (Sanders et al., Healthy Heores x x
2009).The key issues to have success tools involves Perfect Picnic x x
how the information is delivered. In that regards, sev- Smash Your Food x x
eral agents are identified in order to improve the lit- Veggie Circus Farm x x
eracy on health: caregivers, health systems, family Body Quest - Food of the Warrior. x x
health literacy skills, the educational system and the Grow It-Know It x x
community system. In our work, we involve most Catch the Carrot x x
of such actors: caregivers (endocrinologists), family Snack Planet x x v
(parents), and the community. Work It Off x x t
Max’s Plate x x
Frutas y verduras para nios x
3 PLATFORM DESCRIPTION Hora de Comer x x v
Emma breakfast - KIDS x x
EduKitchen-Kids Educational x x
The goal of MATCHuP is to improve nutrition and
Veggie Bottoms Lite x x
exercise habits of obese kids from 5 to 16 years.
Sopa Hacedor x
To that end, the platform gathers information about
Awesome Eats x x
kids meals and physical activity, and according to
Cocomong Season 2 x x
the healthy quality of the data entered, kids awarded
with some points, that are translated in skill scores
regarding a virtual game. The game is not played
in isolation but in teams. Therefore, kids should
collaborate among her mates in order to have a
competitive team that beats their adversaries. On the
314
MATCHuP: An mHealth Tool for Children and Young People Health Promotion
315
HEALTHINF 2017 - 10th International Conference on Health Informatics
Healthcare professionals are in charge of setting up On the other hand, collaboration arises in two di-
the nutrition and exercise targets for the kids. They rections:
can also follow the kid progresses thanks to a visu-
• Help team mates to achieve their healthy targets
alisation screen that shows the distance between the
(see Figure 8)
target and the achieved results, in a colour code (see
Figure 5). • Validate food photos from other users (see Figure
Healthcare professionals access to the platform 7)
has been designed as a web service, instead of an mo- Regarding the validation of photos,
bile app because this facilitates the integration of the
tool in the current Healthcare Information Systems of • 25% of the photos of a kid are validated by mem-
our region. bers of the same team
• 50% of the photos of a kid are validated by mem-
3.4 Social network bers of other teams of the same sport
• 25% of the photos of a kid are validated by mem-
The community of users is managed by means of a bers of other sports
social network, where collaborative and competitive
events take place. • 50% of the photos of a kid are validated by par-
Regarding competition, users in the network are ents, selected at random
identified according to their sportive preferences (soc- Therefore, the number of validations obtained per
cer, basket, dance, etc.), and her healthy status. This photo is expected to be higher than 1. The worse case
316
MATCHuP: An mHealth Tool for Children and Young People Health Promotion
scenario would be when no validation is achieved for (see Figure 9). The team score (defined in ℑ)is ob-
a given photo. In that situation, the photo is scored tained by the aggregation of the healthy state values
neutral. Future work should include a monitoring of all of its members.
module to facilitate the assessment and control such
situations.
The validation feedback can help to understand
the kid about the real contents of the meals, and learn
about nutrition.
4 FIRST VERSION
Figure 7: Food validated by the community.
The system has been developed using the Spring Java
environment. The mobile application is deployed in
Android (Figure 10). The first version deployed with
all of the involved agents, but physical activity en-
ter manually. Current languages are English, Spanish
and Catalan.
The design goals of MATCHuP are simplicity and
easy to use. Thus, photos favours usability and collab-
orative validation is simply. Of course, some image
processing engines could be used to obtain nutrition
components from photos, for example, but the state
of the art of such engines are still under research for
such purpose.
Next step will consider the inclusion of the exer-
cise activities by means of a smartwatch or activity
Figure 8: Chat functionalities for kid collaboration. band. Other technological advances that are ready to
use and that could be incorporated in a near future
3.5 Games are Artificial Intelligence techniques to handle prefer-
ences to set up teams, as well as to aggregate infor-
In the social networks, there are n games, according mation.
to the kids sportive preferences, although it depend
on the number of users, too. For example, there could
be a soccer game, or a skate game (see Figure 6). For 5 CONCLUSION
each game, there are a given number m of sport teams.
Once a weak (e.g.Sunday),all teams play a match. Obesity is a main issue for many people, specially
Ideally, the match should correspond to a market children. It is becoming a big concern in European
available game integrated in the platform. For exam- and occidental countries. Obese persons are not con-
ple, there are soccer games which teams could be con- sidered patients (as diabetic persons are), and there-
figured by the user. However, in the first approach of fore, they are very difficult to motivate for bring-
MATCHuP, the game is a simple rank of scores: the ing them to healthier states. This paper presents the
winner of the match is the team with the highest score MATCHuP platform with the aim of helping obese
317
HEALTHINF 2017 - 10th International Conference on Health Informatics
REFERENCES
Ainsworth, B. E., Haskell, W. L., Herrmann, S. D., Meckes,
N., Bassett, D. R., Tudor-Locke, C., Greer, J. L., Vez-
ina, J., Whitt-Glover, M. C., and Leon, A. S. (2011).
2011 Compendium of Physical Activities: a second
update of codes and MET values. Medicine and sci-
ence in sports and exercise, 43(8):1575–81.
Ainsworth, B. E., Haskell, W. L., Leon, A. S., Jacobs, D. R.,
Montoye, H. J., Sallis, J. F., and Paffenbarger, R. S.
(1993). Compendium of physical activities: clas-
sification of energy costs of human physical activi-
ties. Medicine and science in sports and exercise,
25(1):71–80.
Aitker, M. (2015). Patient Adoption of mHealth. Use, Ev-
idence and Remainding Barriers to Mainstream Ac-
Figure 10: Home page for kids. ceptance. Technical Report September.
Blenner, S. R., Köllmer, M., Rouse, A. J., Daneshvar,
children and young persons (under 16) to reach a N., Williams, C., Andrews, L. B., J, W., and AM,
healthier state with the supervision of healthcare prac- B. (2016). Privacy Policies of Android Diabetes
titioners, families, and other users in a similar situa- Apps and Sharing of Health Information. JAMA,
315(10):1051.
tion.
Herrero, P., Lopez, B., and Martin, C. (2016). Pepper:
Along the paper, the system has been described, Patient empowerment through predictive personalised
and the first version of MATCHuP presented. Next decision support. In ECAI Workshop on Artificial In-
steps include the integration of smartwatches or sim- telligence for Diabetes, pages 8–9.
ilar wearable able to automatically detect the physi- Hevner, A. R., March, S. T., Park, J., and Ram, S. (2004).
cal activity, as well as artificial intelligence tools to Design science in information systems research. MIS
improve the aggregation methods and additional ad- Quarterly, 28(1):75–105.
vices for further personalization and fast adaptation. López, B., Coll, J., Gamero, F., BargallLó, E., and López-
Moreover, a the evaluation of the tool in for medical Bermejo, A. (2013). Intelligent systems for support-
ing premature babies healthcare with mobile devices.
evidence is also required. In Mobilemed, page 4 pages.
In that regard, the main challenge is to keep kids
Sanders, L. M., Shaw, J. S., Guez, G., Baur, C., and Rudd,
engaged in the platform. Clinicians argue that about 6 R. (2009). Health literacy and child health promotion:
month of using the platform could be sufficient for ob- implications for research, clinical care, and public pol-
taining some behaviour change. However, some stud- icy. Pediatrics, (124 Suplement 3):306–14.
ies have shown that having a kid engaged in a game Tate, E. B., Spruijt-Metz, D., O’Reilly, G., Jordan-Marsh,
more than 3 months is a great success. The long trial M., Gotsis, M., Pentz, M. A., and Dunton, G. F.
of the tool will provide inputs to that concern, and (2013). mHealth approaches to child obesity preven-
tion: successes, unique challenges, and next direc-
work for alternative artifaxts (Hevner et al., 2004) . tions. Translational behavioral medicine, 3(4):406–
A secondary, technological challenge, is the fact that 15.
sensitive data is stored in mobiles. The recent study
(Blenner et al., 2016) highlights the necessity of con-
sider privacy implications before using health apps.
ACKNOWLEDGEMENTS
This project has received funding from the grant of
the University of Girona 2016-2018 (MPCUdG2016),
ans has been developed with the support of
the research group SITES awarded with distinc-
tion by the Generalitat de Catalunya (SGR 2014-
2016). Sreynoch Soung received financial support
from the European Commission (Erasmus Mundus
project Techno II, ref. 372228-1-2012-1-FR-ERA
MUNDUS-EMA21).
318
Statistical Analysis of Window Sizes and Sampling Rates in Human
Activity Recognition
Keywords: Actigraph g3x+, Analysis of Variance, Body-worn Accelerometers, Data Mining, Human Activity Recogni-
tion, Random Forests, Sampling Rate, Weighted Least Squares, WEKA, Window Size.
Abstract: Accelerometers are the most common device for data collection in the field of Human Activity Recognition
(HAR). This data is recorded at a particular sampling rate and then usually separated into time windows be-
fore classification takes place. Though the sampling rate and window size can have a significant impact on the
accuracy of the trained classifier, there has been relatively little research on their role in activity recognition.
This paper presents a statistical analysis on the effect the sampling rate and window sizes on HAR data classi-
fication. The raw data used in the analysis was collected from a hip-worn Actigraphy G3X+ at 100Hz from 77
subjects performing 23 different activities. It was then re-sampled and divided into windows of varying sizes
and trained using a single data classifier. A weighted least squares linear regression model was developed and
two-way factorial ANOVA was used to analyze the effects of sampling rate and window size for different ac-
tivity types and demographic categories. Based upon this analysis, we find that 10-second windows recorded
at 50Hz perform statistically better than other combinations of window size and sampling rate.
319
Niazi, A., Yazdansepas, D., Gay, J., Maier, F., Ramaswamy, L., Rasheed, K. and Buman, M.
Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 319-325
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
2013 and 2014. Data was collected from a single hip- research.
worn triaxial accelerometer, an ActiGraph GT3X+, at Section 2 details the literature available in this do-
a sampling rate of 100Hz. By artificially downsam- main. Section 3 describes the data collection and pre-
pling the data and creating differently sized windows, processing done to the data to obtain our data sets.
we have obtained datasets at a cross section of 6 win- Section 4 gives the results of our classification and
dow sizes and 5 sampling rates. Multiple classifiers statistical analysis of these results. Finally, Section
were tested out and random forests was selected as 5 states what we conclude from this work and how
the standard classifier for this study. We used our these conclusions can be implemented in HAR data
standard classifier to train these datasets with 10-fold classification.
cross-validation and statistically observed the trends
using repeated measures two-way ANOVA. We then
further divided these datasets to observe how these ef-
fects change due to activity type or demographic fea- 2 RELATED WORK
tures of the subject.
It should be noted that this study, by necessity, While a considerable amount of research has been
takes into account only certain aspects of HAR clas- done in HAR using accelerometers, there has been
sification process. For example, we are utilizing data a lack of consensus on the methodology of collect-
from a single hip-worn accelerometer, as opposed ing and preprocessing data and thus this topic has
to other or multiple placements. Similarly, we use largely remained unanalyzed (Preece et al., 2009).
only time- and frequency-based features with a sin- Lara and Labrador (2013) note that sampling rates in
gle classifier (Random Forests) to further standardize HAR studies vary from 10Hz to 100Hz while win-
our tests. While feature sets and classifier selection dow sizes range from less than 1 second to 30 sec-
certainly play a role in the outcomes of HAR classi- onds. While there are some domain-related justifica-
fication research (Preece et al., 2009), to account for tions for such decisions, there is a lack of standardiza-
all of them would lead to an significant increase in tion which likely impacts replicability.
complexity which could be better examined in future Lau and David (2010) attempted a study similar
320
Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition
to ours, in the sense that multiple data sets of dif- initialized to sample at a rate of 100hz. Accelerometer
fering window sizes (0.5, 1, 2 and 4 seconds) and data was downloaded and extracted using Actilife 5.0
sampling rates (5, 10, 20 and 40 Hz) were gener- software (ActiGraph LLC, Pensacola, FL). The sub-
ated from raw accelerometer data (gathered from a jects performed a number of activities which can be
pocketed smart phone) and the effects studied. While observed in Table 1.
they claim that these lower values are sufficient for Data from 77 subjects (53 female and 24 male)
good performance, their setup consisted of a single was used to train the classifiers. The 77 subjects were
test subject performing 5 activities. Maurer et al. taken from a larger group of 310 subjects who partici-
(2006), using 6 subjects, state that recognition accu- pated in the study. They were chosen for their relative
racy does not significantly increase at sampling rates diversity in both demographics and the activities they
above 15-20Hz when their biaxial accelerometer is performed. Table 1 describes the activities performed
used in conjunction with 3 other sensors (light, tem- while Table 2 provides demographic information on
perature and microphone). Bieber et al. (2009) calcu- the subjects.
late that 32Hz should be the minimum sampling rate
given human reaction time. Tapia et al (2007) varied Table 2: Subject Demographics.
window length from 0.5 to 17 seconds and tested the Mean Standard Deviation Range
data sets with C4.5 decision tree classifiers, conclud- Age (Years) 33.2 9.7 18.2 - 63.2
ing that 4.2 seconds was the optimum window size for Height (cm) 167.9 7.9 152.6 -188.9
Weight (kg) 72.1 12.1 48.3 - 105.5
their needs. Banos et al (2014) created data sets with BMI 25.6 3.9 17.7 - 35.4
window sizes ranging from 0.25 to 7 seconds at inter-
val jumps of 0.25. They found that 1-2 seconds is the
best trade-off speed and accuracy for online training. 3.2 Generating Datasets
Larger windows were only needed if the feature set
was small. As noted earlier, the raw data was collected at a sam-
Statistical analysis of classifier performance ap- pling rate of 100Hz. From this, 30 data sets with
pears infrequently performed. Most studies, such varying window sizes (of 1, 2, 3, 5 and 10 seconds)
as the ones cited above, simply state a performance with sampling rates (5, 10, 20, 25, 50 and 100Hz)
measure (often accuracies and f-measures) but do were created. To create data sets for sampling rates
not present any statistical evaluation. Demsar (2006) < 100Hz, we downsampled from the original data
comments on the lack of statistical analysis of classi- sets, e.g., 50Hz is generated by using every 2nd ac-
fier performance and prefers non-parametric tests for celerometer record (100/50), 25Hz using every 4th
comparing classifiers over parametric ones. The pa- record (100/25), etc. The number of records in a win-
per also notes that replicability is a problem for most dow then depends on the sampling rate as well as the
experiments machine learning domain, hence experi- window size. E.g., A 1-second window at 100 Hz
ments should be tested on as many data sets as possi- contains 100 records (100x1), a 3-second window at
ble. 25Hz contains 75 records (3x25), and so on. As sum-
marized in Table 3, the window size affects the num-
ber of records in the data set, a fact that will become
significant during analysis.
3 DATA COLLECTION, It should also be noted that, in some situations,
PREPROCESSING AND partial windows are formed; in these, not enough data
METHODOLOGY exists to form a complete window. Such partial win-
dows were discarded in order to provide the classifier
a data set with a uniform format.
3.1 Collecting Data
Table 3: Number of Records in the Datasets.
The data used in the present study was collected in
Window Size (s) No. of Records
Phoenix, AZ from volunteers recruited through Ari-
zona State University. Participants were fitted with an 1 175284
ActiGraph GT3X+ activity monitor positioned along 2 88557
the anterior axillary line of the non-dominant hip. The 3 59666
monitor was fixed using an elastic belt. The Acti- 5 36533
Graph GT3X+ (ActiGraph) is a lightweight monitor 10 19186
(4.6cm x 3.3cm x 1.5 cm, 19g) that measures triaxial
acceleration ranging from -6g to +6g. Devices were
321
HEALTHINF 2017 - 10th International Conference on Health Informatics
322
Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition
The 10s/50Hz data set has the highest expected pling rate should be more than 32Hz for ambulatory
value (EVmax ) for accuracy (in bold underline in Ta- activities.
ble 6) in this experiment. Next we determine if other
accuracy EVs are significantly different than the max- 4.4 Demographics
imum EVmax . As the alternate hypothesis is that other
combinations will have lower EV s, we use a 1-sided For the next round of experiments, data was separated
t-test with a 95% confidence interval. into demographic groups to observe any significant
effects. The data sets were then used to classify all 23
activities.
√ W Smax W Sk
¯ − X̄k = t290,0.95 ∗ MSE ∗
Xmax + (1) Division by gender, female (53 subjects) and male
nmax nk (24 subjects) (Tables 13 and 14 respectively) display
Equation 1 is used to find the critical distance similar results. EVmax is at 10s/50Hz for both experi-
when the sample sizes are unequal but the variance is ments and there are very similar spreads in significant
assumed equal. As each EV represents 10 folds, we results. This indicates that there is an insignificant dif-
have 290 degrees of freedom. The value of t290,0.95 ference in HAR for genders and activity classification
is found as 1.651. The MSE value is obtained from should be generalized for both cases.
ANOVA. W S represents window size of EVmax while Data was then divided into 4 age groups; 18 − 25
W Sk and n is the number of observations which in our (24 subjects), 26 − 32 (24 subjects), 33 − 44 (21 sub-
case is always 10. Having found the critical distance, jects) and 49−63 (8 subjects). The results of these ex-
we can observe which EV values fall inside the mar- periments are recorded in Tables 15-18, respectively.
gin. There is a visible trend of decreasing window size
In this experiment, the 10s/25Hz value (in bold with increasing age. The spread of significant values
in Table 6) is less than the critical distance away from gets larger as well.
EVmax . Hence, it can be concluded that it is statisti- Similar patterns are noted when the data is divided
cally as accurate as EVmax with 95% confidence. according to Body Mass Index (BMI) categories;
The procedure elaborated in this section is repli- Normal (40 subjects), Overweight (28 subjects) and
cated for all of the following experiments. Obese (9 subjects) (Tables 19-21). As BMI increases,
the significance of the EVmax decreases along with the
window size. Subjects with lower BMIs fare better
4.3 Activity Groups
with larger windows than those with higher BMIs.
This can suggest a correlation between age and BMI
In Table 7, ambulatory activities were separated - elderly people are less likely to be active than young
from non-ambulatory activities while in Table 8 they people and are thus more likely to have high BMIs.
were classified as walking, running or stairclimb- This hypothesis is supported in Figure 1 which shows
ing activities. Both experiments represent a macro- that the proportion of normal weighted people de-
classification and as such exhibit similar patterns to creases with age in the dataset.
Table 6 — the 10s/50Hz has EVmax .
Tables 7-12 show the results of experiments on
4.5 Summary of Analysis
different activity group classifications. These groups
were divided as shown in Table 4.
Viewing all experiments together suggests that
However, classifications at a micro-level, within
10s/50Hz is the optimal combination of window size
these activity groups, exhibit different results. Classi-
and sampling rate, especially if the subjects of the
fying between ascending and descending stairs (Ta-
study are young, able-bodied and physically active.
ble 9) achieves EVmax of 97% at 2s/50Hz. How-
Most high significant EV are spread around high
ever, statistically significant EV s for the experiment
sampling rates and window sizes, although there is
are spread across a wide range of window sizes and
enough evidence to suggest there is not a very signifi-
sampling rates. Interestingly data at lower sampling
cant loss in accuracy if the sampling rate is decreased
rates are also deemed significant for larger window
to 25Hz or window size is decreased to 2s.
sizes. Statistical values for non-ambulatory activities
(Table 10) show similar patterns. For walking and
running activities, the spread is smaller and concen-
trated towards higher sampling rates, though there is
a lot of variation in window size. Running in partic-
ular prefers smaller windows. This is in agreement
with the claim by Bieber, et al (2009) that the sam-
323
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 7: Ambulatory vs. Non-Ambulatory Activites. Table 15: Age: 18-26 Years
Sampling Rate (Hz) Sampling Rate (Hz)
5 10 20 25 50 100 5 10 20 25 50 100
1 0.6408 0.7295 0.8228 0.8369 0.8559 0.8590 1 0.6207 0.7174 0.8094 0.8236 0.8432 0.8457
2 0.6812 0.7735 0.8521 0.8634 0.8754 0.8730 2 0.6662 0.7620 0.8362 0.8488 0.8588 0.8553
Window Window
3 0.7016 0.7957 0.8605 0.8688 0.8791 0.8725 3 0.6857 0.7824 0.8443 0.8559 0.8629 0.8551
Size (s) Size (s)
5 0.7319 0.8127 0.8656 0.8727 0.8796 0.8634 5 0.7196 0.8024 0.8484 0.8542 0.8623 0.8424
10 0.7792 0.8419 0.8805 0.8876 0.8913 0.8537 10 0.7633 0.8292 0.8627 0.8717 0.8753 0.8250
324
Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition
REFERENCES
25
2 2 ActiGraph. Actisoft analysis software 3.2 user’s manual.
20 fort walton beach, fl: Mti health services.
6 3
8 Banos, O., Galvez, J.-M., Miguel Damas, H. P., and Ro-
# of subjects
325
Laboratory Information Management System for NGS Genomics Labs
jitao.yang@gmail.com
Abstract: The goal of genome sequencing is to unravel the ordered sequence of nucleic acids that form the DNA or RNA
of a given sample. Genome sequencing lab requires the ability to select and track a large amount of samples
through many experimental steps. Therefore, laboratory information management system (LIMS) is needed
to provide a way of automating the laboratory experimental procedures and track the samples. LIMSs have
been proposed and developed for many years, but still remain difficult for labs to implement successfully. In
this paper, we demonstrate our genomic next generation sequencing (NGS) LIMS solution. We developed a
web-based LIMS with flexible configuration and customization for NGS laboratories, and can help laboratories
track samples and optimize experimental procedures and business workflows. We also describe our solution of
integrating LIMS with the existing enterprise business information systems. Finally, we share our experience
for the implementation of a successful LIMS.
326
Yang, J., Zhu, S., Xu, G. and Han, C.
Laboratory Information Management System for NGS Genomics Labs.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 326-333
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Laboratory Information Management System for NGS Genomics Labs
likely causes for a failed LIMS and share our experi- in logistics process, the recipients and senders can
ence for the implementation of a successful LIMS. response quickly to take steps to minimize the
The rest of the paper is structured as follows: Sec- losses.
tion 3 introduces the design of LIMS, while Section 4
• Sample Assessment and Processing. Depends on
describes the implementation of LIMS, and Section 5
sample attribute, sample sheet, sample number,
presents the integration of LIMS with existing infor-
test type or more factors, the samples arrived at
mation systems. Section 6 discusses the implemen-
company can be divided to different processing
tation of a successful LIMS. Section 7 concludes the
directions including rejection, resampling, stor-
paper and outlines future work.
age, or flow to the experiment steps. Sample re-
cipients, experiment operators and genomic ana-
lysts can choose the processing directions and op-
2 RELATED WORKS erate in the system.
Some commercial and open source LIMSs (Bath • Experimental Management. Experimental man-
et al., 2011; PerkinElmer, 2016; Grimes and Ji, 2014; agement is the most important and complicated
Progeny, 2016; Illumina, 2016) are available but typ- part of LIMS. Based on sample type, test type,
ically require extensive modification and extension to previous processing result and operator’s subjec-
address the specific needs of NGS genomics labs. We tive judgment, the samples will experience multi-
therefore developed a web-based LIMS, which is ro- ple experimental steps such as plasma isolation,
bust and flexible for managing the samples and the nucleic acid extraction, molecular library con-
NGS processes. struction, molecular library quality control, and
etc. Our system is also flexible to support the con-
figuration of different experimental processes.
327
HEALTHINF 2017 - 10th International Conference on Health Informatics
Quality Control
Management Interpretation Analysis Samples
System Management
• Report Management. The genetic interpretation ule provides powerful functions of advanced data
result will be classified by the report management query and visualized multidimensional data statis-
module and transferred into different report gen- tic and analysis. Instead of querying through mil-
eration pipelines of the reporting system. lions of data items to find meaningful results in
• Quality Control Management. Quality control experimental workflows, researchers can quickly
exists in the whole NGS work flows, including identify the information of their interests through
experiment steps quality control, reagents qual- this module.
ity control, sequencing data quality control, ge- • System Management. System management mod-
nomic analysis quality control, genetic interpre- ule provides the features of user management, role
tation quality control, and etc. Different quality management, privilege management, department
control processes can also be configured in sys- management, business management, organization
tem. management. A user’s role and his privileges
• Master Data Management. Master data manage- could configured flexibly.
ment module includes tens of thousands of fun-
damental data for the operation of LIMS, such as
the details data for experiment templates, barcode 4 SYSTEM IMPLEMENTATION
rules, agent information and so on. This module
is usually maintained by department manager or Our LIMS is written in Java using the Spring (Piv-
system administrator, because master data include otal, 2016), SpringMVC, Mybatis (Goodin et al.,
very important and sensitive data of the company. 2016) web application framework and implementa-
• Instrument Management. Instrument manage- tion is platform-independent. Our web servers run
ment module not only records instrument prop- Linux/CentOS and we use the MySQL relational
erty information like barcode, type, number, loca- database management system. The system architec-
tion, status, application methods and so on, but ture of LIMS is described in Figure 2.
also associates instruments to a certain experi- The web interface is designed to handle a variety
ment step. An experiment step including its as- of functions in a modular format. The left column
sociated instruments could be exported as a detail includes the function category of business process.
guide which is very helpful for the operators. The top navigation bar provides advanced manage-
ment and analysis functions.
• Project Management. Project management mod- We have more than one hundred data tables in the
ule provides the functions for project managers system, Figure 3 shows part of our database schema
a convenient way to manage and monitor the for data tables.
projects, including project defining, project status HTTPS (Hypertext Transfer Protocol Secure) is
monitoring, process intervening, and so on. supported and is implemented for the system. User’s
• Query and Statistics. Query and statistics mod- access to functionality is controlled via user roles
328
Laboratory Information Management System for NGS Genomics Labs
Business DAO
Android Service
HTTP
Spring
JSP
MVC
WAP
Web File
Service Process I/O
File
PC System
Web Service
which are defined and managed by the system man- and etc.
agement module. Project Management (PM) system serves primar-
Our LIMS currently supports the following Il- ily our technical services, including the research area
lumina NGS sequencing platforms: HiSeq X Ten, of genomics, transcriptomics, epigenetics, and etc.
MiSeq, HiSeq, HiSeq 4000, HiSeq2500, NextSeq PM includes the functions of sample information
500/550AR, and could be configured for other type enrollment, contract management, project schedule
of NGS instruments. management, project establishment, job order man-
agement, quality control, research achievement man-
agement, and etc.
5 INTEGRATION WITH Logistics system provides the management func-
tions of express package, express company, alert time,
EXISTING SYSTEMS receipt time, samples, logistics tracking, and etc.
All the information related to NGS experiments
Implementation of a LIMS requires a good degree of and analysis will be synchronized into LIMS, there-
integration with the existing business information sys- fore, the sample information could be enrolled
tems in enterprise. We integrate LIMS to our two ex- through:
isting business system platforms as demonstrated in
• CRM web portal, or
Figure 4 and Figure 5.
• CRM mobile app, or
5.1 Integrating with Company Systems • PM web portal, or
• PM mobile app, or
Figure 4 describes the business process in our com-
pany. • LIMS directly.
Customer Relationship Management (CRM) sys- The sequencing result data will be stored in Net-
tem serves primarily our clinical and health ser- work Attached Storage (NAS) system, and then fil-
vices, including Personal Genome Test, NIPT (Non- tered and classified to be analyzed by hundreds of dif-
Invasive Prenatal DNA Testing), Cancer Gene Ther- ferent genomic analysis pipelines.
apy, and etc. CRM supports sample information The genomic analysis result data will then flow to
collection, hospital information management, agent the reporting system, which can produce hundreds of
management, product management, sales manage- different areas of professional reports automatically.
ment, sample management, doctor management, fi- The reporting system will finally distribute the
nancial management, customer reports management, user reports to CRM and PM, then the user can receive
329
HEALTHINF 2017 - 10th International Conference on Health Informatics
6DPSOH,QIR
VDPSOH&RGH YDUFKDU 3ODVPD6HSDUDWLRQ
WHVW7\SH YDUFKDU WDVN/,VW&RGH YDUFKDU
VDPSOH7\SH YDUFKDU 8QER[&KHFN
UHFLSLHQW YDUFKDU
KRVSLWDO YDUFKDU XQER[&RGH YDUFKDU GDWH5HFHLYHG GDWH
RXWSDWLHQW&RGH YDUFKDU GHVFULSWLRQ YDUFKDU EORRG&RGH YDUFKDU
EORRG7LPH GDWH FRXULHU1XPEHU YDUFKDU H[SHULPHQWDO1XPEHU YDUFKDU
SDWLHQW1DPH YDUFKDU UHFLSLHQW YDUFKDU SODVPD&RGH YDUFKDU
DJH YDUFKDU GDWH5HFHLYHG GDWH QH[W)ORZ YDUFKDU
ZHLJKW YDUFKDU VWDWXV YDUFKDU YROXPH YDUFKDU
JHVWDWLRQDO:HHNV YDUFKDU UHVXOW YDUFKDU
SKRQH1XPEHU YDUFKDU
PDLOLQJ$GGUHVV YDUFKDU
ODVW0HQVWUXDWLRQ YDUFKDU
E8OWUDVRXQG YDUFKDU
WULVRPH YDUFKDU
LQVSHFWLRQ'RFWRU YDUFKDU
GLDJQRVLV YDUFKDU 7HVW
LQVSHFWLRQ6KHHW YDUFKDU /LEUDU\&RQVWUXFWLRQ
PHGLFDO+LVWRU\ YDUFKDU WDVN&RGH YDUFKDU WDVN/LVW&RGH YDUFKDU
FRPPDQGHU YDUFKDU FRPPDQGHU YDUFKDU
RUGHU7LPH GDWH RUGHU7LPH GDWH
IORZ YDUFKDU SODVPD1XPEHU YDUFKDU
OLEUDU\1XPEHU YDUFKDU H[SHULPHQWDO1XPEHU YDUFKDU
H[HFXWLRQ1XPEHU YDUFKDU OLEUDU\1XPEHU YDUFKDU
VWRUDJH/RFDWLRQ YDUFKDU RULJLQDO6DPSOH1XPEHU YDUFKDU
XVHU YDUFKDU XVHU YDUFKDU
EDWFK1XPEHU YDUFKDU
IUDJPHQW/HQJWK YDUFKDU
TXDOLW\ YDUFKDU
UDWLR YDUFKDU
RULJLQDO6DPSOH1XPEHU YDUFKDU
PRODOLW\ YDUFKDU
3ROOLQJ
WDVN&RGH YDUFKDU
FRPPDQGHU YDUFKDU 43&57HVW
RUGHU7LPH GDWH WDVN&RGH YDUFKDU
VHTXHQFLQJ7\SH YDUFKDU FRPPDQGHU YDUFKDU
VHTXHQFLQJ3ODWIRUP YDUFKDU RUGHU7LPH GDWH
VHTXHQFLQJ5HDG/HQJWK YDUFKDU IORZ YDUFKDU
VHULDO1XPEHU YDUFKDU OLEUDU\1XPEHU YDUFKDU
OLEUDU\1XPEHU YDUFKDU H[HFXWLRQ1XPEHU YDUFKDU
H[HFXWLRQ1XPEHU YDUFKDU VWRUDJH/RFDWLRQ YDUFKDU
VWRUDJH/RFDWLRQ YDUFKDU XVHU YDUFKDU
RULJLQDO6DPSOH1XPEHU YDUFKDU EDWFK1XPEHU YDUFKDU
1*6
PL[LQJ5DWLR YDUFKDU IUDJPHQW/HQJWK YDUFKDU
FRQYHUVLRQ)DFWRU YDUFKDU WDVN&RGH YDUFKDU PDVV&RQFHQWUDWLRQ YDUFKDU
FRQYHUWHG&RQFHQWUDWLRQ YDUFKDU FRPPDQGHU YDUFKDU UDWLR YDUFKDU
GLOXWLRQ5DWLR YDUFKDU RUGHU7LPH GDWH RULJLQDO6DPSOH1XPEHU YDUFKDU
GLOXWHG&RQFHQWUDWLRQ YDUFKDU )&1XPEHU YDUFKDU PRODOLW\ YDUFKDU
PL[LQJ9ROXPH YDUFKDU UHDJHQW1DPH YDUFKDU
LQVWUXPHQW1XPEHU YDUFKDU
VHTXHQFLQJ7\SH YDUFKDU
SRROLQJ1XPEHU YDUFKDU
OLEUDU\9ROXPH YDUFKDU
+\E9ROXPH YDUFKDU
GLOXWHG&RQFHQWUDWLRQ YDUFKDU
GHJHQHUDWHG&RQFHQWUDWLRQ YDUFKDU
GHQDWXUHG6DPSOH9ROXPH YDUFKDU
H[SHFWHG'HQVLW\ YDUFKDU
1*6RSHUDWH'DWH GDWH
1*66WRS7LPH GDWH
their reports through our mobile app or web portal. 5.2 Integrating with Hospital Systems
We have also constructed a hybrid cloud comput-
ing platform SolarGenomics (SolarGenomics, 2016), Figure 5 describes the business process in our collab-
because our business can produce around 10 TB se- orating hospitals.
quencing data everyday, both the local computing
We collaborate with more than 2000 hospitals. In
cluster and the local distributed storage can not pro-
some of the hospitals, we set up NGS laboratory and
vide computing and storage resources sufficiently and
install our NGS instrument there so that the hospitals
elastically.
will have the abilities of NGS experiments, sequenc-
330
Laboratory Information Management System for NGS Genomics Labs
web
PM
web app
NGS Genomic Reporting
Logistics
L LIMS
Instruments Analysis System
app web
CRM
app
reports
Cloud
HIS data
Manual data
Head
Quarter
reports
ing, genomic analysis, and genetic interpretation. in the laboratory of hospital and then be sequenced by
The samples in our collaborating hospitals could the NGS instrument placed in the hospital.
be enrolled to LIMS either manually or synchronized Further, the sequencing data will be:
from the hospital information system (HIS). The sam- • analyzed by our genomic analysis pipelines in-
ples will be processed by multiple experimental steps stalled in the local hospital computing servers, or
331
HEALTHINF 2017 - 10th International Conference on Health Informatics
332
Laboratory Information Management System for NGS Genomics Labs
333
Acquisition of Confidential Patient Data Over Shared Mobile Device
Keywords: Client-server, Data Acquisition, Mobile Application, Patient Data, Security, Shared Mobile Device, Smart-
phones, Tablets.
Abstract: Mobile devices have already been designed for many applications. Smartphones and tablet computers are
modern, widespread and affordable solutions used for various purposes. Nowadays mobile devices are widely
used in telemedicine. It is usually assumed, that the device is owned and used by a single person. We focus
on security concerns and constraints from a different point of view – when the device is shared. In this paper,
we are proposing a novel approach to prevent leakage of patient’s confidential data when the device is used by
multiple patients at the hospital’s clinic or department. We present a prototype application and discuss its use
case and designed workflow.
334
Vcelak, P., Kryl, M., Racak, L. and Kleckova, J.
Acquisition of Confidential Patient Data Over Shared Mobile Device.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 334-339
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Acquisition of Confidential Patient Data Over Shared Mobile Device
On the other side, security and privacy issues are Disadvantages of shared devices are especially the
serious topics. Authors Baig et al. discussed mobile need to solve the issue of patient’s privacy. Is it really
healthcare applications and its critical issues and chal- a disadvantage though? Sensitive or protected data
lenges. As they said in (Baig et al., 2015), mobile must not be available to the next patient/personnel us-
phones were becoming important in monitoring and ing the device. We have to prevent data leaks when
even in delivering of healthcare interventions. Re- someone steals the shared device. Of course, data
sults of testing mobile health applications on Android transfer have to be secured. What about other health
platform was discussed in (Knorr and Aspinall, 2015) mobile applications? Any kind of health application
where a number of serious vulnerabilities were dis- has to secure its data as a prevention to data leak, oth-
covered in the most popular applications. Dehling et erwise it leads to security and privacy infringements.
al. (2015) did an overview of security and privacy Well, the data privacy have to be solved with any kind
infringements in mobile health applications on An- of application that works with patient health infor-
droid and iOS. They discovered that the majority of mation. The difference for shared device approach
apps (95.63%, 17,193/17,979; of apps) had posed at is, that we are absolutely sure the application will be
least some potential damage through information se- used by multiple users, therefore it has to be secured
curity and privacy infringements. There were 11.67% better.
(2,098/17,979) of apps that scored the highest assess-
ments of potential damages. (Dehling et al., 2015) 3.2 Architecture
These results lead to belief that private or confidential
information stored in a mobile device/application are We have chosen client-server architecture where
at a risk. client will be responsible for a user interaction. The
business logic will be on the server side only, eg.
form definition and description, form source/input
3 SHARED DEVICE APPROACH data and produced output. Client-server communica-
tion is based on REST API with public and private
3.1 General Information key-pairs encrypted messages. The HTTPS protocol
is recommended.
An obtaining data at own mobile device is an usual 3.2.1 Client
approach. Unfortunately, this may not be a safe way.
Unlike the usual situation where everyone has their
Client, as a mobile application, will provide direct in-
own mobile phone, we start from the opposite as-
teraction with users. User can be a staff member or a
sumption. We consider the use of device that is not
patient itself. We prefer to make client application as
owned by the patient. It is only borrowed at a given
simple as possible. In the figure 1 you can see use case
moment. We refer to this as a shared device (SD).
diagram. We expect no local configuration stored in
The patient has to fill new information or update ex-
a shared device with the exception of the URL server
isting data (delivered to/from the information system
address. Security details are described in a separate
of the hospital or medical doctor) by the shared de-
section 3.4. Basically, the client application is pre-
vice.
pared when URL address of the server is set. The
An advantage of the SD approach is the ability to
shared device can operate in two modes:
fully control its system and customise it. We can set
up the environment and install all necessary tools, in- user have to authenticate by username and password
cluding our own custom applications. Through our knowledge,
custom application we can provide personalising. It
delegated no user authentication; server sends avail-
can be determined in advance what information or
able forms and identifies retrieved data by device
questionnaire needs to be filled by particular patient.
ID.
Different type and extent of data might be desired for
different departments, patients, diagnosis or type of In user mode, there is no list of available users on
visit. SD for a user authentication. Instead an encrypted re-
After the registration at the desk/office/nurse, pa- quest (with username and password) is sent to server
tient can get pre-configured shared device, and can for authentication. After a user is authenticated, forms
immediately begin checking and filling the form. Op- (only available to the user) are downloaded , and the
tionally, patient may be allowed to switch to other ap- user can choose either to be filled. At the same time
plications, eg. read news or play some simple games, the user can also choose to continue filling up an un-
while still waiting for examination. finished form, that has not been uploaded yet. Client
335
HEALTHINF 2017 - 10th International Conference on Health Informatics
Server
Logout
Login Get server’s
Staff Patient A Patient B public key
Client
User User
Store filled
(not logger) (logged)
data online
Get list of availaible Get list of availaible
forms (per device) forms (per user)
Store filled
Get list of incomplete Get list of incomplete
data offline
forms (per device) forms (per user)
Temporarily store
form data Administrator Manage forms Put form data Other
Send filled form data Store filled form data
to server locally in the device
System
336
Acquisition of Confidential Patient Data Over Shared Mobile Device
server. We need to ensure that data in the client appli- Request is denied if the salt differs or the user does
cation is protected against unauthorised access (read) not exist on the server. A password hash stored on
or modification at the device or during transmission to the server is compared with the one received from the
the server. For this reason, we describe how user lo- client. The client’s public key C pub is stored in case
gin process works on mobile devices. You can see the of the same password hashes. Client is notified that
login model in the figure 3. Based on the model, en- the user has logged in successfully and shows list of
cryption is enabled for stored data on client and com- possible forms. Otherwise, client is informed of the
munications between client and server. error and remains on the login screen.
As we mentioned in 3.2.1 and 3.2.2 sections, The salt (CS) is device-dependent. User’s key-pair
client application can login in two ways. (C priv , C pub ) depends on a username U and device ID
User does not need any username or password D. Each pair of user (as username U) and device ID
in the delegated mode, unique device ID is used in- D has its own key-pair because of the same key reuse.
stead. Private and public keys are required on the
device. New key-pair (C priv and C pub ) is generated
and stored in an internal memory of mobile device
when no key-pair exist. Both, device ID D and public
4 IMPLEMENTATION AND
key C pub are sent to the server. The client may see RESULTS
a list of currently-fill forms if the server successfully
processes the request, so device identification and its As the proof of concept we have created software
public key are stored on a server. If communication corresponding to designed client-server architecture
with server fails, the client is informed of the error (3.2) and supporting the user authentication model
message and remains on the login screen. (3.4). Server is a service-oriented Java web applica-
A user login using username U and password P tion with REST API and running over HTTPS pro-
method need to have a public key of the server S pub. tocol. The server needs Java Cryptography Extension
Client application asks for server’s public key S pub. (JCE) Unlimited Strength Jurisdiction Policy Files in-
Server immediately sends an existing key or generates stalled. We chose the Android platform, the world’s
a new key pair by a configured algorithm. A crypto- most popular mobile operating system, for the client
graphic salt (CS) is sent together with the public key application. The implementation is based on Android
S pub . Client stores both in an internal memory. Au- version 7.0 with code name Nougat (API level 24).
thentication then follows. Client application encrypts The five screenshots are shown on the figure 4.
username U and password P by server’s public key The client application running on a shared device
S pub and salt (CS) added. Server receives data and de- does not have any complicated setting, and provides
crypts them by its own S priv key. Server checks that only a few basic functions. The only configuration
the received salt matches the salt sent to the device. attribute is the server URL address. Mobile applica-
337
HEALTHINF 2017 - 10th International Conference on Health Informatics
Figure 4: Mobile application (client) screenshots: (1) login screen, (2) configuration – set server URL address, (3) menu of
actions in the delegated mode, user can fill-in per device forms or not finished ones, (4) list of available forms and (5) simple
form/questionnaire generated and menu how to submit a result is shown.
tion has to download corresponding definitions of the An another attack is by modifying request to ob-
forms that the user can fill in on the shared device. tain data access. It can happen on an unsecured net-
User cannot directly access data of any hospital infor- work or when a shared device is infected by malware.
mation systems. Shared device is managed indirectly Attacker can spoof the device ID via malware and re-
by the staff through the server. Staff member can as- quest forms available for spoofed ID. Server sends
sign a form type to the specific device or patient on the forms belonging to someone else, however, they are
server. Client application downloads these form defi- not accessible, because the private key on attacker’s
nitions and present an automatically generated forms device cannot de-crypt them. Attacker would need to
to its user. possess private key of the device that is being imitated
Retrieved, transmitted and permanently stored by spoofed device ID.
data on the shared device are encrypted. Only the pa- An entire request could be alternated by attacker,
tient himself can see his own data in a readable way. not only the device ID. Server process every request
Form content is encrypted immediately, when form if its format is valid. Attack would be discovered, be-
is validated and submitted. Online transmission is cause server attempts to verify the electronic signa-
the preferred way of data transmission, but encrypted ture using the sender’s public key. This verification
data can be stored locally when no network access is would fail. Either electronic signature and request
available. Data encryption is based on an asymmet- content or public and private key-pair will differ.
ric method using private and public key-pairs that are We also consider the case of identity theft. At-
generated on the server or on the shared device. tacker can monitor requests and reuse the message to
repeat sending of that request with own fake public
key. This situation is prevented by changing cryp-
5 DISCUSSION tographic salt, which is always used to encrypt user
name and password. Accordingly, the resulting ci-
We discuss the results and especially the security of pher names and passwords vary because of the differ-
the proposed shared device approach in this chapter. ent cryptographic salt.
The most common and possible attacks include eaves- Our, originally naive, solution of form defini-
dropping or modification of data and identity theft. tion/description proved to be very flexible. The
Client-server communication is designed to en- form is dynamically generated on the mobile device
crypt the whole communication, including form def- (client), according to these definition. It is possi-
initions, because it can contain personal information. ble to dynamically create personalised form definition
The only unencrypted content is server’s public key, on the server which contain patient-oriented data (eg.
client’s public key and device ID. An attacker can different options per age groups or genders).
get access to communication content on an unsecured Mobile devices also have drawbacks. The client
network (eg. public Wi-Fi, HTTP protocol), but it is application needs to be online when loading the form
not possible to abuse this, because of the way asym- definition. There are also issues with battery life, net-
metric cryptography works (private key is needed for work availability, breakage or damage of borrowed
decryption). Eavesdropping is therefore not possible. device by patients. Network availability is important
338
Acquisition of Confidential Patient Data Over Shared Mobile Device
when submitting form data to the server, but we can West Bohemia, project Data and Software Engineer-
use offline data storage to temporarily alleviate con- ing for Advanced Applications (No. SGS-2016-018).
nection problems.
At the testing phase, we identified an issue (oc-
curred only once) with locally stored encrypted form REFERENCES
content. There is a possibility of data loss, when user
logs out of application and logs in again, because key- Baig, M. M., GholamHosseini, H., and Connolly, M. J.
pair has to change and server does not store history of (2015). Mobile healthcare applications: sys-
previously used keys. Our approach, originally de- tem design review, critical issues and challenges.
vised to prevent attacks, may therefore lead to data Australasian Physical & Engineering Sciences in
loss on this occasion. Medicine, 38(1):23–38.
The mobile application has fully satisfactory and Bastawrous, A. and Armstrong, M. J. (2013). Mobile health
use in low-and high-income countries: an overview
fluent response when connected via Wi-Fi. Only of the peer-reviewed literature. Journal of the royal
when using large forms (e.g. 1 000 items in select society of medicine, 106(4):130–142.
box) the response time worsened – increased time Bisio, I., Lavagetto, F., Marchese, M., and Sciarrone, A.
needed to download form definition and to render the (2015). A smartphone-centric platform for remote
form. health monitoring of heart failure. International Jour-
nal of Communication Systems, 28(11):1753–1771.
Dehling, T., Gao, F., Schneider, S., and Sunyaev, A. (2015).
Exploring the far side of mobile health: information
6 CONCLUSIONS security and privacy of mobile health apps on ios and
android. JMIR mHealth and uHealth, 3(1):e8.
In this article we proposed an approach for secure Hayes, D. F., Markus, H. S., Leslie, R. D., and Topol, E. J.
health data acquisition using shared mobile devices. (2014). Personalized medicine: risk prediction, tar-
The data are confidential in general. The primary geted therapies and mobile health technology. BMC
medicine, 12(1):37.
goal was gathering personal data and updating health
status using form-oriented application. The security Knorr, K. and Aspinall, D. (2015). Security testing for
android mhealth apps. In Software Testing, Verifica-
problems were discussed. We evaluated risk of data tion and Validation Workshops (ICSTW), 2015 IEEE
leak and designed data workflow for mobile devices Eighth International Conference on, pages 1–8. IEEE.
that are shared across patients. Manjoo, F. (2015). A murky road ahead for android, despite
We designed a prototype and evaluated it as the market dominance. ISSN 0362-4331. (May 27, 2015)
real application on Android device. We identified that Retrieved Oct 17, 2016.
this workflow is properly secured. The discovered Melillo, P., Orrico, A., Scala, P., Crispino, F., and Pecchia,
disadvantage is a possible data loss in special case L. (2015). Cloud-based smart health monitoring sys-
when data were encrypted and key-pair changed be- tem for automatic cardiovascular and fall risk assess-
ment in hypertensive patients. Journal of medical sys-
fore data was delivered to the server. tems, 39(10):1–7.
Obtaining data via electronic forms is easily cus- Stradolini, F., Riario, S., Boero, C., Baj-Rossi, C., Tau-
tomisable and extensible. There is a potential dis- rino, I., Surrel, G., De Micheli, G., and Carrara, S.
advantage of impersonal approach. Though, patients (2015). Wireless monitoring of endogenous and ex-
waiting for medical examination are usually feeling ogenous biomolecules on an android interface. IEEE
bored, and this interactive form might be therefore ap- Sensors Journal, 16(9):3163–3170.
preciated by them. Tang, X., Hu, C., and Lin, W. (2015). Android bluetooth
In the future we plan to expand the types of data multi-source signal acquisition for multi-parameter
health monitoring devices. In Information and Au-
that can be sent via secure forms and the presented ap- tomation, 2015 IEEE International Conference on,
proach. The logical extension is to support wearable pages 1790–1794. IEEE.
electronics, sensors and other accessories connectable
with a mobile device that will also acquire more data
types in this way.
ACKNOWLEDGEMENTS
This work was supported by the project PUNTIS (No.
LO1506) of the Ministry of Education, Youth and
Sports of the Czech Republic and by University of
339
A Business Model for Digital Healthcare Environments: An Organic
Approach and a Use Case for Handling Cognitive Impairment
Andrea Pistorio1, Paolo Locatelli2, Federica Cirilli2, Luca Gastaldi1 and Simona Solvi1
1
Department of Management Engineering, Politecnico di Milano, Milan, Italy
2
Fondazione Politecnico di Milano, Milan, Italy
{andrea.pistorio, luca.gastaldi, simona.solvi}@polimi.it, {paolo.locatelli, federica.cirilli}@fondazione.polimi.it
Keywords: Healthcare Services, Business Models, Service Models, Digital Solutions, Cognitive Impairment.
Abstract: Ageing has significant impacts on the organization of healthcare systems and on social inclusion—especially
for elderly people affected by Cognitive Impairment (CI). These people are significantly exposed to
undeniable risks that can affect their health and wellbeing (falling, malnutrition, hygiene issues, etc.) –
especially when living alone. This paper defines a Business Model (BM) allowing independent living for
elderly people affected by CI. This BM include: (i) an up-to-date, modular, flexible and scalable
organizational model describing the activities to be accomplished by regulators and service suppliers; and (ii)
a digital platform based on innovative and easy-to-replicate information and communication technologies.
The organic approach to the development of the BM is then focused in an Italian use case as a part of “DECI”,
a “Horizon 2020” project with four pilot projects in Israel, Italy, Spain and Sweden.
340
Pistorio, A., Locatelli, P., Cirilli, F., Gastaldi, L. and Solvi, S.
A Business Model for Digital Healthcare Environments: An Organic Approach and a Use Case for Handling Cognitive Impairment.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 340-347
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
A Business Model for Digital Healthcare Environments: An Organic Approach and a Use Case for Handling Cognitive Impairment
within specific local healthcare systems and real-life steps that allowed to obtain, starting from the general
environments in Israel, Italy, Spain and Sweden. BM developed through the first phase, the BMCanvases
The overall research process followed to develop and, then, the Service Models (SMs) depicted in
the BM as well as the related processes encompassed Figure 1. BMCanvases represent the Country-specific
three subsequent phases that are depicted in Figure 1 subsets of the elements included within the general
and described in the following paragraphs. BM. SMs contain configurations mainly focused on
value propositions in all the considered Countries–
with an emphasis on common aspects to be exploited.
BM General The first step is made through two tools: (i) the
Business Model Environment (BME) (Osterwalder &
Pigneur 2010); (ii) a Coherence Matrix (CM). On the
one hand, these tools have been used to reduce the
Coherence BM multitude of elements proposed in the general BM.
Matrix Environment On the other hands, they allow prioritizing the
BM Canvases
required activities for the implementation of the pilot
projects—distinguishing among relevant and
irrelevant elements.
The BME organizes and describes the key
contextual variables useful to synthetically
General Service Specific Service characterize each Country involved in the research,
Model Models according to the four macro-areas: (i) key trends; (ii)
macro-economic forces; (iii) industry forces; (iv)
market forces.
The CM has been developed by the research
Application of group and is characterized by the following five
Service Models
dimensions: (i) country; (ii) customer segment; (iii)
Business Process functionalities; (iv) actions to address the needs of the
Reengineering
patient and of the overall system; (v) relevance of the
Figure 1: Research process. specific need. The CM describes the underlying
interrelations among these dimensions and allows
discerning between: (a) coherent and incoherent pairs
2.1 First Phase functionality-action to address the need (i.e. need of
the patient or of the overall system); (b) relevant and
A literature review has been conducted to identify the
not relevant pairs functionality-action to address the
most relevant articles dealing with the state of the art,
need; (c) Country-specific and common among
good practices and trends related to the digital
Country pairs functionality-action.
solutions for assisting elderly people with CI. The
The second step allows switching from BMCanvases
analysis of these articles allowed producing a general
to SMs. It reduces the complexity of the vast number
BM to focus the main variables that increase the
of elements of the BMCanvases focusing on the key
likelihood of providing effective digital services.
building blocks of value proposition and customer
Web of Science™ and Google Scholar™ have
segments. The path between BMCanvases and SMs
been used to research the articles. The literature has
requires to select the common value propositions
been analysed according to two complementary
among all considered Countries (general SM), and to
frameworks.
consider also the peculiar aspects of the contexts
Initially, we relied on the STOF framework
(Country-specific SMs). All the functionalities,
(Bouwman et al. 2008), which provides an overall
related to the pairs functionality-action have been
picture of a BM from four interrelated perspectives—
clustered according to two levels: the main target of
service, technology, organization and finance.
the solutions (i.e. patient, care provider, care pathway
Next, we progressively deepened each insight
plan) and technological functionalities.
through the Business Model Canvas (BMC) frame-
work (Osterwalder and Pigneur, 2010), which
allowed focusing on key design elements.
2.3 Third Phase
SMs are implemented within the third phase of the
2.2 Second Phase research project following a Business Process
Reengineering (Hammer, 1990; Champy, 2002)
The second phase of the research was based on two
341
HEALTHINF 2017 - 10th International Conference on Health Informatics
approach that includes the following phases: (1) 5. Revenue streams deal with the cash generated
design of the care process model, which firstly from every customer segment. Following Stroetmann
defines the macro-phases of a general care process for et al. (2003), the main revenues for a digital solution
CI patients. (2) analysis of the AS-IS process models in CI domain are the following: (i) service paid by
in each pilot site; (3) design of the TO-BE process insurance funds; (ii) service paid by governments;
models in each pilot site, underlining the difference (iii) service paid by the patient or by his
between AS-IS and TO-BE process models. Conside- relatives/caregivers through out-of-pocket expenses.
ring also digital solutions (Locatelli et al. 2014). Three groups of people or organizations pay for the
digital solution: (a) Business to Consumer (B2C): the
service is sold directly to the patient or his caregiver.
3 RESULTS (b) Business to Public (B2P): the service is sold to
public entities i.e. local authorities, NHSs and
housing associations; (c) Business to Business (B2B):
This paragraph describes the results of the research.
the service is sold to private companies and, in some
Firstly, the outcomes of the literature analysis and the
countries, most of them are private medical insurance
evidences related to the STOF framework are
companies. Furthermore, there could be the following
grouped into the 9 building blocks of the BMC
types of transactions between the provider of digital
framework. Secondly, the results related to the
solutions and the healthcare organization: (1)
application of the BME and CM are presented.
healthcare organization purchases the entire system
(one-time capital investment); (2) healthcare
3.1 General Business Model organization pays a license fee for each patient
connected to the system.
The general BM is characterized by the following 9 6. Key resources are the essential assets necessary
building blocks. For each of them we report the main to create and offer the value proposition. From the
results of the analysis of the literature accomplished. perspective of the patient suffering from CI, human
1. Customer segments are convenient set of clients resources that will be crucial in the establishment of
with common needs, behaviours or attributes. Follo- the BM are health professional and caregivers (or the
wing Petersen (2004), the main customer segments to social worker if the patient has not relatives that
be considered in CI are the following: (i) patients with support her) (Robert et al. 2013). The human resource
dementia; (ii) patients with amnestic Mild CI (a- that is vital in the establishment of the BM is the
MCI); (iii) patients with non-amnestic Mild CI (na- specialist of digital services through which assisting
MCI). people with CI (Kapadia et al. 2015). From the
2. Value proposition is the reason why a customer standpoint of physical assets required to provide the
chooses one product and/or service. In CI domain, a service, technologies play a key role both for the
tool adopted to assess the various needs is the patient and for the overall system (Kerssens et al.
Camberwell Assessment of Need for the Elderly 2015; Robert et al. 2013; Bharucha et al. 2009). Other
model (CANE) (Reynolds et al. 2000). The key resources are patents, licenses and copyrights.
application of the model highlights that patients with 7. Key activities are actions that have to be
dementia have more care needs than MCI patients. performed in order to create and offer a value
Furthermore, there are several solutions for the proposition. From the patient standpoint, the key
various actors involved into the care process. activities are related to her involvement: (i)
3. Channels are the interfaces used to interact with engagement of the patient; (ii) maintenance of the
the customers in order to deliver a value proposition. relationship with the patient. From the stand point of
Literature shows that the main channels by which the actors involved in the care process, key activities
care services are delivered to elderly people with CI are related to the creation and sustainment of the
are the following: (i) caregiver; (ii) general physician; relationships among these key actors: (a) create the
(iii) healthcare specialist; (iv) healthcare structure. connection between healthcare specialist and
4. Customer relationships regards how relating caregiver/social worker; (b) maintenance of the
with customer segments. Patients suffering from CI relationship between healthcare specialist and
tend to communicate with their caregivers or social caregivers/social workers. Following Ógáin and
workers. These two support patients in adopting and Mountain (2015), these activities can be supported
using any digital solution for providing enhanced through the contributions of governmental actors in
services. From the viewpoint of the actors involved in terms of: (c) national/regional awareness campaigns;
the care process, many companies maintain online (d) financial incentives to healthcare organizations;
most of their relationships with caregivers. (e) financial incentives to healthcare specialist for the
342
A Business Model for Digital Healthcare Environments: An Organic Approach and a Use Case for Handling Cognitive Impairment
diagnosis of MCI and dementia; (f) financial In addition to BME, the implementation of the
incentives to healthcare specialists and healthcare CM returns different combinations of coherent,
organizations for the adoption of digital solutions to relevant and Country-specific technological
treat MCI and dementia. Following Robert et al. functionalities and actions to address patients’ needs.
(2013), the key activities in the BM related to the The tool allows highlighting the value propositions to
technology adopted are the following: (1) production focus the attention on while designing BMCanvases. The
of the equipment and sensors; (2) selection of the synthesis of the findings related to BME and CM
most appropriate technology/sensor; (3) installation allows defining the BMCanvases. The latter, though
of technologies in patients’ home; (4) calibration of grounded on already established frameworks (e.g.
the sensors. Business Model Canvas, BME, etc.), take advantage
8. Key partnerships refers to the network of of the flexibility of the tools adopted to build them,
suppliers useful to improve the BM. Literature on CI thus making them adaptable to the various possible
suggests that some key partnership for the BM could contexts (i.e. specificities of the various countries) or
be: (a) government; (b) research center/university; (c) other patients’ clusters different from those adopted
local regional community (Kapadia et al. 2015); (d) in this research.
private organizations (König et al. 2015); (e)
networks between the providers of digital solutions 3.3 Service Models
and healthcare organizations.
9. Cost structure deals with relevant costs In order to design a general SM able to encase a value
characterizing a feasible BM. Literature suggests that proposition common to all the four countries involved
the main costs for a digital solution in the CI domain in DECI, the needs marked by clinicians as extremely
are the following (Kapadia et al. 2015): (i) training relevant have been highlighted and clustered as follow:
costs; (ii) personnel costs; (iii) installation and N1. Diagnosis and assessment: (i) overall medical
maintenance costs; (iv) purchasing and condition; (ii) behavior and mood; (iii) assess the risk
manufacturing costs; (v) customer service costs. of malnutrition; (iv) Activities of Daily Living
(ADL); (v) risk for falls.
3.2 Business Model Canvases N2. Patient psychological needs: (i) cognitive
stimulation; (ii) online cognitive training.
The next steps of the research allowed to move from N3. Clinical team needs: (i) coordination of care;
the general BM to BMCanvases through the BME and (ii) clinical team information sharing; (iii) improve
CM. BME allows to describe the context in which diagnosis method; (iv) advising on deciding course of
BM will be implemented, considering the following action; (v) better access to and relevance of non-
4 macro areas: pharmacological therapies; (vi) standardized care
1. Key trends: (a) national socio-healthcare pathway.
system overview; (b) general government N4. Follow-up: (i) monitoring overall condition;
expenditure on health; (c) private expenditure on (ii) measurement of adherence and compliance of
health; (d) “Out-of-pocket” expenditure; (e) per- patients to treatment; (iii) assess timely changes
capita total expenditure on health (WHO 2015); evolving needs for social care support.
2. Macro-economic forces: (a) payment Starting from these clusters, it is possible to
mechanisms; (b) policies regarding the sources of cluster also the technological functionalities that
revenue and financial flow; allow meeting these needs, and which are common to
3. Industry forces: (a) balance between public and all Countries. Regarding the patient layer, the
private healthcare; (b) centralization vs. following 5 clusters have been identified
decentralization (c) main actors of the NHS; (d) (technological functionality in brackets):
number of health and social care integration hospitals TFP1. Patient’s status (monitoring): (i) automatic
per 100.000 population (e) number of psychiatric remote-based measurement of patient’s blood
beds per million population (WHO 2015); pressure; (ii) automatic remote-based measurement
4. Market forces: (a) percentage of population of patient’s O2 saturation; (iii) automatic provision
aged > 60 years compared to the overall population; and submitting of questionnaires (of various nature,
(b) life expectancy at age 60 (WHO 2015); (c) including patient’s health status and to support
estimated prevalence of dementia per 1.000 change detection) to care-involved subjects; (iv)
population (OECD 2015; Prince et al. 2013); (d) gathering on non-structured information on patient’s
percentage of population living in urban areas (WHO health status from informal caregivers or social
2015); (e) population ICT readiness; (f) tendency to caretakers; (v) evaluation and monitoring of cognitive
informal care (Lupianez et al. 2013).
343
HEALTHINF 2017 - 10th International Conference on Health Informatics
skills and monitoring of decay curves and other guidelines/protocols and data gathered as part of care
trends. activities;
TFP2. Patient’s status (alert): automatic provision TFS4. Care pathway/treatment plan (sharing
of feedbacks and alerts on patients’ progresses or information): sharing of a treatment plan among
deterioration. caregivers, doctors and family members (or some of
TFP3. Patient’s status (communication-cognitive these).
stimulation): (i) cognitive games/exercises to Combining the clusters of common relevant needs
stimulate patients to preserve cognitive/ executive with the clusters of common relevant functionalities,
functions; (ii) tele-consultation (tele-presence) it is possible to point out the match between the two
functionalities allowing patients and professionals to as number of notable crossings, in order to highlight
communicate to each other visually. packages of SM common to all four countries.
TFP4. Patient’s Activities (alert): (i) automatic
provision of remote real-time feedback on patients’ 3.4 Italian Service Model
activities, including non-pre-scheduled activities; (ii)
automatic provision of remote real-time patient- An example of the intersection between the two
tailored motivational messages based on patients’ clusters and of the specificities of a Country is
activities, including non-pre-scheduled activities; (iii) provided regarding the Italian context. Starting from
automatic provision of remote feedback on patients’ the value proposition common to all the 4 countries,
activities, building on long-time data analysis on the general SM is enriched with further specificities
patients’ status. related to the Italian Customer Segments.
TFP5. Patient’s Activities (monitoring): activity Given Italian specific needs, further specific
monitoring through accelerometer for elderly elements of the Italian SM are available: (i)
monitoring (also outdoor, with batch data download immobility detection for elderly monitoring at home
once reconnected to base station): stand / sit / walk / (indoor) for patient physical needs; (ii) fall detection
steps + intensity of activity; GPS-based patient for elderly monitoring at home (indoor) for patient
monitoring and structured health-based data physical needs; (iii) trend analyses performed on data
gathering for outdoor step counting or activity gathered from various patients’ monitoring activities
monitoring (including detection of falls); registering for diagnosis and assessment & for caregivers needs;
of pre-scheduled activities performed by the patient (iv) registering of pre-scheduled activities performed
(who is monitored real-time by sensors when by the patient (patient is formally required to provide
performing the activity). a yes/no answer) for patient environmental needs &
TFP6. Patient’s status (storage and sharing for patient physical needs; (v) automatic reminder to
information): (i) activity monitoring through patients for the performing of a scheduled activity for
accelerometer for elderly monitoring (also outdoor,
patient environmental needs & for patient physical
with batch data download once reconnected to base
needs; (vi) availability of personalized and adaptable
station): stand / sit / walk / steps + intensity of
remote-based training programs automatically
activity; (ii) GPS-based patient monitoring and
tailored on individual patient’s characteristics for
structured health-based data gathering for outdoor
patient physical needs; (vii) drug management for
step counting or activity monitoring (including
patient physical needs.
detection of falls); (iii) Registering of pre-scheduled
The functionalities clusters are enriched, for the
activities performed by the patient (patient is
monitored real-time by sensors when performing the Italian case, as follow:
activity). Patient's status (monitoring): (i) Immobility
detection for elderly monitoring at home (indoor); (ii)
Regarding the actors involved in the care process, Fall detection for elderly monitoring at home
the following 4 clusters have been identified: (indoor);
TFS1. Care providers (communication): informal Patient's activities (monitoring): (i) Trend
communication (messaging) among various actors analyses performed on data gathered from various
(e.g.: family members and doctors); patients’ monitoring activities; (ii) Registering of pre-
TFS2. Care providers (teamwork): enablement of scheduled activities performed by the patient (patient
multidisciplinary teamwork across care providers, is formally required to provide a yes/no answer);
doctors and informal caregivers (or some of these); Patient’s Activities (alert): (i) Provision of
TFS3. Care pathway/treatment plan (monitoring): automatic reminder to patients for the performing of
coherence check between clinical a scheduled activity; (ii) Availability of personalized
and adaptable remote-based training programs
344
A Business Model for Digital Healthcare Environments: An Organic Approach and a Use Case for Handling Cognitive Impairment
automatically tailored on individual patient’s Process Models in each pilot site, and finally (3) the
characteristics; design of the TO-BE Process Models in each pilot
Care pathway/Treatment plan (monitoring): drug site, starting from the Service Model resulted from
management. literature analysis.
These packages complete the general SM, shaping 3.5.1 Design of the Care Process Model
the Italian specific one.
The other building blocks are grouped as follows: The analysis highlighted four common phases to
upstream building blocks (Key partners, Key every care process for people with CI (Figure 2).
activities and Key resources), downstream building
blocks (Customer Relationships, Customer Segments
and Channels), and cost and revenues (Cost Structure
and Revenue Streams). The main impacts are:
Upstream building blocks: (i) Italian clinicians
Figure 2: Care Process Model for patients affected by CI.
consider the diagnosis and assessment crucial (GPs
should be involved for an early detection); (ii) given
A. Noticing Symptoms and First Detection: this
clinical team needs, it is important to provide the
phase includes the access point of the patient with CI
technological functionalities to the local health
in the care process and it considers the first
authorities to the municipalities and to the case
identification of the patient with suspected CI.
service providers; (iii) the monitoring of the patient’s
B. Assessment and Diagnosis: clinical activities
status and activities meet all the 7 clusters of needs;
aimed at the assessment and diagnosis of the CI in the
(iv) to provide automatic reminders to patients for the
patient identified in the previous phase. The phase
performing of a scheduled activity is important to
includes: a first basic assessment of CI that can be
personalize the service; (v) from the point of view of
owned by the GP, the socio-health care provider or
the actors involved in the care process, is crucial to
external specialized physicians; and then, a
enable multidisciplinary teamwork across local
comprehensive assessment that is usually owned the
health authorities, municipalities, case service
socio-health care provider, although some of the
providers, informal caregivers and voluntary
requested exams are provided by external physicians.
associations.
C. Treatment and Care Service Definition:
Downstream building blocks: (1) from clinical
analysis of the patient needs, both clinical (emerged
standpoint, patient physical needs, caregiver needs
from the clinical assessment delivered in the previous
and the ones regarding the patient environment are
phase) and social needs (usually analysed with the
considered relevant; (2) the caregiver has a central
patient and the family with a social assistant). When
role and must be engaged and informed about the
needs are defined, the care service is designed.
evolution of symptoms and disease; (3) personal
D. Service Delivery and Maintenance: delivery of
assistance based on human interaction should be
the care service designed and continuous monitoring
preferred to meet the patient psychological needs.
of the patient’s status.
Cost and revenues: (a) Revenue Streams should
be a B2P and B2C mix: (a.i) B2P: some
3.5.2 Analysis of the as-IS Process Models
functionalities, for example the ones for the storage
and sharing to external EMR or other care We will describe in detail the Italian process model,
management tools, should be funded from general in Palazzolo Institute of Fondazione Don Carlo
taxation; (a.ii) B2C: some services should be sold Gnocchi Onlus in Milano, following the four macro-
directly to the patient or his caregiver, for example phases.
the ones for monitoring the patient’s status or for the A. Noticing Symptoms and First Detection: the
cognitive stimulation; (b) Considering the central process starts though a first meeting between patients
role of the caregivers, their training costs must be and physicians, like a check-up visit, or after an acute
considered also to meet their needs. episode in a long term care facility. The visit can be
owned by the GPs or specialized physicians (both
3.5 Application of the Service Models within Palazzolo Institute as well as external). Once
patients with certain kind of characteristics have been
This paragraph is focused on the application of the identified during a physician’s visit, their path
SMs in the Italian pilot site, through three steps: (1) continues in the care process.
the design of a general Care Process Model for
patients affected by CI; (2) the analysis of the AS-IS
345
HEALTHINF 2017 - 10th International Conference on Health Informatics
B. Assessment and Diagnosis: in case there are through the DECI platform and plan together a
symptoms of CI, a basic assessment can be revision of the medication and treatment plan, and
performed. Note that usually the GP points out the schedule visits. The program can alternate sessions in
patient to specialists (at Palazzolo Institute or physical presence of the physiotherapist with tele
externally). This initial assessment consists of a basic rehabilitation sessions. Some cognitive stimulation
examination of the patient with suspected CI, aimed and rehabilitation exercises could be done also at
at understanding more regarding patients’ health home through the online platform. The platform can
conditions and social situation. In case the basic also be used by the case manager to communicate
assessment strengthens the initial suspicion of CI, a with the patient or the caregiver.
comprehensive assessment follows. At Palazzolo
Institute, for a comprehensive assessment, patients
can be referred to a specialized geriatrics unit, which 4 CONCLUSIONS
starts the assessment protocol aimed at reaching the
diagnosis. The approach adopted to design the BM is relevant
C. Treatment and Care Service Definition: in because: (i) it adopts already established frameworks
Italy, it is common that patients’ relatives or (e.g. Business Model Canvas); (ii) it highlights
caregivers take the responsibility for organizing the common traits and differences among the Countries
care pathway of the patient. The care pathway can be within the DECI project; (iii) it allows distinguishing
managed through the activation of home-based and firstly between coherent and not coherent elements,
facility-based services, whose activation is discussed then between high-priority and low-priority ones; (iv)
together with the family. it provides information about the impact of the
D. Service Delivery and Maintenance: Palazzolo various digital solutions; (v) it is applicable in other
Institute delivers an integrated socio-healthcare contexts (i.e. Countries) therefore it can overcome the
service to patients affected by CI. During the service boundaries of the DECI project thanks to its
delivery the patient is continuously monitored by the scalability; (vi) it supports decision-making processes
professionals of the Institute. also after the pilot phases because, once the first most
relevant needs are addressed, it will be possible to
3.5.3 Design of the to-BE Process Models
proceed with the actions to address the needs with a
As regards the TO-BE process models, we will lower relevance.
describe in detail the differences between the Italian Furthermore, the approach was validated and
AS-IS and the TO-BE process model. The refined also through a Scientific Advisory Board with
fundamental differences from AS-IS and the TO-BE the involvement of external stakeholders. Finally, the
process models are linked to some new technologies, approach is aimed to support the definition and
which ensure the sharing of information among the implementation of a comprehensive and multifaceted
various actors enabling independent living. BM in a complex and continuously evolving context.
A. Noticing Symptoms and First Detection: during The next steps of the DECI project are: (1) the
the visit, physicians visualise the patient’s medical implementation of the Pilot site (Italy, Sweden, Israel
records on the DECI platform connected with the and Spain) adopting the proposed SMs and (2) the
databases of local hospitals and GP. evaluation of key performance indicators considering
B. Assessment and Diagnosis: data collected by different perspectives (e.g.: economics, social, etc.) in
the specialized geriatrics unit are entered in a tablet order to highlight the potential benefits of the
and immediately shared (through a cloud service) designed approach.
with the other stakeholders of the care network.
C. Treatment and Care Service Definition: A first
needs analysis can be performed by the ACKNOWLEDGEMENTS
patient/caregiver filling in on-line questionnaire on
the DECI platform. Then a visit could confirm the The authors would like to thanks the whole
results of the questionnaire. Consortium of the DECI project: Fondazione
D. Service Delivery and Maintenance: A Politecnico di Milano, Consoft Sistemi SpA,
wearable sensor could be used to detect abnormalities Fondazione Don Carlo Gnocchi Onlus (Italy), Centre
in the level of activity and send alert messages to for Healthcare Improvement – Chalmers University
family members or assistance operator. The GP and of Technology, Västra Götalandsregionen (Sweden),
specialists can share the information collected Hospital Universitario de Getafe - Servicio de
346
A Business Model for Digital Healthcare Environments: An Organic Approach and a Use Case for Handling Cognitive Impairment
Geriatría (Spain), Maccabi Healthcare Services sectional survey. BMC Health Services Research, 13,
(Israel), Roessingh Research and Development (The pp. 43.
Netherlands). OECD, 2015. Addressing Dementia. In Health at a Glance
2015. OECD Health Policy Studies. OECD.
Osterwalder, A., Pigneur, Y., 2010. Business Model
Generation (pp. 1–288). Hoboken, New Jersey: John
REFERENCES Wiley & Sons, Inc.
Ógáin, E.N., Mountain, K., 2015. Remember me. pp.1–33.
Alexander, M., Perera, G., Ford, L, Arrighi, H. M., Foskett, Petersen, R.C., 2004. Mild cognitive impairment as a
N., Debove, C., Novak, G., and Gordon, M. F., 2015. diagnostic entity. Journal of Internal Medicine, 256(3),
Age-Stratified Prevalence of Mild Cognitive pp.183–194.
Impairment and Dementia in European Populations: A Prince, M. et al., 2013. The global prevalence of dementia:
Systematic Review. Journal of Alzheimer’s Disease, A systematic review and metaanalysis. Alzheimer's &
48, pp. 355–359. Dementia, 9(1), pp.63–75.e2.
Alzheimer’s association, 2016. 2016 Alzheimer's disease Reynolds, T. et al., 2000. Camberwell Assessment of Need
facts and figures. Alzheimer's & dementia, volume 12, for the Elderly (CANE) Development, validity and
issue 4, pp. 459–509. reliability. British Journal of Psychiatry, 176(5),
Bharucha, A.J. et al., 2009. Intelligent Assistive pp.444–452.
Technology Applications to Dementia Care: Current Rizzi, L., Rosset, I., Roriz-Cruz, M., 2014. Global
Capabilities, Limitations, and Future Challenges. The epidemiology of dementia: Alzheimer's and vascular
American Journal of Geriatric Psychiatry, 17(2), types. Biomed Res Int. 2014; 2014:908915.
pp.88–104. Robert, P.H. et al., 2013. Recommendations for ICT use in
Bouwman, H., de Vos, H., Haaker, T., 2008. Mobile Service Alzheimer's disease assessment: Monaco CTAD Expert
Innovation and Business Models, Springer-Verlag Meeting. The Journal of Nutrition, Health Aging, 17(8),
Berlin Heidelberg. pp.653–660.
Champy, J., 2002. X-Engineering the Corporation: Stroetmann, K.A., Stroetmann, V.N. & Westerteicher, C.,
Reinventing Your Business in the Digital Age, Warner 2003. Implementation of TeleCare services: benefit
Business Books. New York. assessment andorganisational models. Studies in Health
Hammer, M., 1990. Re-engineering work: don’t automate, Technology and Informatics, 97, pp.131–141.
obliterate. Harvard Business Review, 68(4):104-112. WHO, 2015. World health statistics 2015, WHO Press,
Kapadia, V. et al., 2015. Emerging ICT implementation Geneva.
issues in aged care. International Journal of Medical
Informatics, pp.1–9.
Kerssens, C. et al., 2015. Personalized Technology to
Support Older Adults With and Without Cognitive
Impairment Living at Home. American Journal of
Alzheimer's Disease and Other Dementias, 30(1),
pp.85–97.
König, A. et al., 2015. Automatic speech analysis for the
assessment of patients with predementia and
Alzheimer's disease. Alzheimer's & Dementia:
Diagnosis, Assessment & Disease Monitoring, 1(1),
pp.112–124.
Locatelli, P., Restifo, N., Cirilli, F., Moser, R., 2015. DECI:
Digital Environment for Cognitive Inclusion -
Improving Elderly Citizens’ Quality of Life Through an
ICT-enabled Patient-Centric Home Environment.
Proceedings of the International Conferences on e-
Health 2015- Part of the Multi Conference on
Computer Science and Information Systems 2015,
IADIS.
Lupianez, F., Maghiros, I. & Abadie, F., 2013. Strategic
Intelligence Monitor on Personal Health Systems,
Phase 2 Citizens and ICT for Health in 14 European
Countries: Results from an Online Panel F. Abadie et
al., eds.,
Miranda-Castillo, C., Woods, B. & Orrell, M., 2013. The
needs of people with dementia living at home from user,
caregiver and professional perspectives: a cross-
347
Voiceguard: Using mHealth Technology for Vocal Health Promotion
Christina Cesar Praça Brasil1, José Eurico de Vasconcelos Filho2, Daniele de Araújo Oliveira Carlos1,
Thiago de Oliveira Magalhães2 and Raimunda Magalhães da Silva1
1
Pós-Graduação em Saúde Coletiva, Universidade de Fortaleza, Fortaleza-CE, Brazil
2
Laboratório de Inovação Tecnológica - NATI, Universidade de Fortaleza, Fortaleza-CE, Brazil
danii_joly@yahoo.com.br, {thiago, euricovasconcelos, rmsilva, cpraca}@unifor.br
Abstract: This study aims to describe the development of an app for mobile devices to assist voice professionals in the
management of vocal health. The research was held in two phases, from November 2014 to December 2015:
1) literature review and app stores search and 2) laboratory design, development and usability test. The
multimedia feature was chosen for the app design and development, since it favours a motivating and dynamic
environment. Teachers, when participating in the usability test, handled the tool for a few hours and issued
their opinions. Data were analysed based on content analysis in the thematic mode. The results show the
feasibility of the tool development to support and assist professionals in the care of their voice and open new
perspectives to show that, in health promotion, technology can create new alternatives for health education
and care, empowering the users.
348
Brasil, C., Filho, J., Carlos, D., Magalhães, T. and Silva, R.
Voiceguard: Using mHealth Technology for Vocal Health Promotion.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 348-353
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Voiceguard: Using mHealth Technology for Vocal Health Promotion
providers during routine visits or emergency For the development of the tool, it was adopted a
procedures. In addition, the technology has been methodology in Human Computer Interaction area,
widely used by health professionals in health the participatory interaction design (Preece et al.,
promotion strategies. 2013), which was chosen because it focuses on the
The high frequency of voice disorders in teachers user´s needs and in its continued participation during
and the lack of public policies for the vocal health of the process. The interaction design is divided into
these professionals (Brazil, 2015), show that the four activities (Figure 1): identify user´s needs and
creation of technologies that empower the teacher to establish requirements (for the system), conceive the
take care of the voice can contribute to health solution design and (when necessary) the redesign,
promotion, improving quality of life and occupational build an interactive version (working prototype) and
conditions of this population. evaluate the version produced with users.
Given the above, it was thought in a technological Once established the requirements and based on
feature that allows the teachers and professionals who them, the activity of design began. At this moment,
intensively use the voice, to monitor vocal health drawings of system interfaces were built, in order to
(even in real time), creating an interface between the achieve the requirements, as well as usability and
users and the environment. This way, the aim of this aesthetics. These drawings were understood by all the
study was to develop a technology for mobile devices members of the staff, allowing reviews with the
as a tool for promoting the teacher's vocal health. participation of potential users of the proposal.
Finalized the revisions (design and redesign) of
the artefact, it was started the construction phase of
2 METODOLOGY the interactive version. In this phase, the
programming/coding of technological artefact was
A study of exploratory and experimental type was made. For this activity, the team used the best
conducted, from November 2014 to December 2015 practices and tools of the areas of Human-Computer
in the Application Center for Information Technology Interaction and Software Engineering. The platform
of University of Fortaleza - UNIFOR in the state of chosen for the application was Android, since it
Ceará - Brazil. dominates more than 80% of the Brazilian market for
The project, is still in development with two mobile devices.
concluded phases – 1) literature review and app stores The last activity of the laboratory process
search and 2) laboratory design, development and corresponded to application usability evaluation
usability test. (Barbosa and Silva, 2010). This evaluation aims to
In the first phase, after listening to the difficulties determine whether the application is understandable,
faced by the voice professionals (future users of the easy to use and generates a good user experience.
app) due to the needs to take care of their voices, it This assessment, however, does not evaluate the
was carried out a literature review on the subject and content or if the artifact produced, reaches the
context proposed, allowing the research team a better proposed objectives, leaving this evaluation to the
understanding of concepts, methodologies and tools next stage of the methodology. In this activity, 6
of the involved areas. The review included a survey female teachers, from Yolanda Queiroz Elementary
of the existing applications dedicated to vocal health. School participated. They received smartphones with
The team investigated the existing vocal health the app installed a script of activities to be performed
technologies through a survey conducted in the app in the app, the activities were associated with the
stores on the web, on the Android (Google Play) and main system functions: register in the system, make a
iOS platforms, using the following terms: vocal vocal analysis and check the result, set the "water
health, voice management and voice (in Portuguese time" function and get tips on vocal health. In
addition to the script, a form (answered individually
and English). As a result, we identified, among
by each participant) so that impressions and opinions
others, four applications directed to vocal health,
on the user experience could be registered.
which approached the purpose of this study; besides
As result of the usability evaluation, positive
VoxMetria tool, that is a specific software for voice
evidence was obtained, since the teachers considered
analysis and voice quality.
the application easy to handle, they used it in the
The second phase, held in laboratory,
proper way and had a good user experience, despite
contemplated the development of the application,
some minor changes that have been suggested.
with the participation of a multidisciplinary team of
speech pathologists, computer engineers and graphic
designers.
349
HEALTHINF 2017 - 10th International Conference on Health Informatics
4 DISCUSSION
Throughout the research process, it was identified the
lack of applications dedicated to vocal health. Thus,
the VoiceGuard application brings new possibilities
and helps professionals in the healthy use of this
important tool that is the voice.
It is clear that technological advances have
allowed the improvement of the media and bring to
people the communicative interaction. Currently, the
Figure 1: Interaction Design (Preece et al., 2013).
world has experienced the era of communication and
health is one of the areas benefiting from the
integration of these resources in the daily life of the
population.
3 RESULTS The VoiceGuard application fills a gap in the
context of care to vocal health, giving users
A first result of the project, from the literature review monitoring and self-management of vocal health
and the meetings with voice professionals (users) is through information, testing and alarm, setting an
the identification of the features/functions to be interface with the user. The application consists of a
developed. A second result was the evaluation of the main menu covering six areas - voice analysis, sound
applications identified in the app stores based on the level meter, time of water, results, tips and vocal
selected criteria. With this analysis, it was observed heating - which unfolds in 16 interfaces, as outlined
that the identified applications addressed the subject in Figure 1.
by focusing on specific points and did not offer
features for managing, monitoring or a full self-care Each application area will be presented in detail in
of vocal health, as can be seen in Table 1. the following subsections:
Based on the requirements and in the fact that
there is no tool that would meet all these
requirements, emerged VoiceGuard, a tool for mobile
devices to the individualized support of the use of
voice. The application is composed of 16 interfaces,
each of them with a specific function. Table 2 shows
the most relevant.
Table 1: Evaluation summary of the applications studied based on the proposed requirements.
Vocal Warm me up
FEATURES / SYSTEMS Saúde Vocal Vocal Ease VoxMetria
WarmUp for singers
Vocal warm-up X - X X X
Care history - - - - X
Legend: Symbol "X" mark the existence of the function in the application.
350
Voiceguard: Using mHealth Technology for Vocal Health Promotion
4.1 Register and Access Functions operation that occurs on the interface that executes
the test used to check the maximum phonation time -
There are seven interfaces that correspond to the TMF (Table 2-6) and that presents the result of the
functions for: the presentation of the application, test with explanation.
login in the application (Table 2-1), user registration Regarding the voice analysis, we used the test to
(Table 2-2), user classification (Table 2-3), data measure the Maximum Phonation Time (TMF). TMF
sharing, predisposition classification to vocal risk is widely used to verify the voice quality, using,
(Table 2-4) and main menu (Table 2-5). among others, the fricative phonemes / s / and / z /
Other system functionalities and associated (Behlau et al., 2001).
interfaces are explained below. The test is performed as follows: the user, by
issuing the phoneme /s/ in a sustained manner after a
4.2 Vocal Analysis single exhalation, have the time of issue timed by the
application. After finalize the issue of the first
The first interface to support Vocal Analysis, presents phoneme, other phoneme (/z/) should be required.
an explanatory text on the operation of functionality. The use of phonemes /s/ and /z/ establish the link
This explanation has its origin from users questions, that checks the condition of glottal closure. Thus, the
recorded during testing, and shows to user the test based on parameters validated by experts
351
HEALTHINF 2017 - 10th International Conference on Health Informatics
(Miglioranzi; Cielo; Smith, 2012), provides data on appearance of vocal disorders (Baring & Murgel,
the dynamics of vocalization, being quite reliable in 2005; Brazil, 2015).
the evaluation of glottal efficiency. It is noteworthy A study of Guidini et al. (2012) shows that,
that the normal range of s / z ratio is estimated at according to NBR 10,152, the acceptable noise level
approximately 1 second (Gelfer; Pazera, 2006). in the classroom must remain 40dB to 50dB (A).
If the result of this test is less than 0.8, it indicates Thus, the application presents the following
excessive coaptation of the vocal folds, which harms parameters to alert the user to the level of
the vocal health of teachers, because it is perceived environmental noise: audible alarm - generates
excessive effort to speak. Results from 0.8 to 1.2 is acoustic signals when the noise exceeds 50dB,
indicative of normality, suggesting that there is a conditioning students to reduce the parallel
normal operation of the vocal folds. Finally, the result conversation or remain silent during the class; and
of more than 1.2, indicates soprosity, i.e., there is an visual alarm - reinforces the idea of the loud noise
air leak between the vocal folds during phonation through the issuance of lights and aids in listeners
(Christmann et al., 2012). behavior conditioning.
The presented feature enables check and provide
an overview of the glottal operation of each user, 4.4 Water Time
helping them in self-monitoring of vocal glottal
efficiency. These results may alert about the signs of The "water time" is another application function that
possible changes in the glottal closure, serving as a helps professionals to condition themselves to drink
warning to seek expert help. The application also water during vocal use. For this, the interfaces of
allows sharing the results in real time, with the speech "water time" (e.g. Table 2-8) are available.
therapist and/or physician, who are accompanying the The device enables the user to program the times
teacher. for water intake over the work shifts. The application
Another function is that, after the indication of the signals through visual and audible alarms the time for
result of this test, the application presents the water intake, reminding the professional this as an
individual explanations of the identified condition, important action for continued hydration and
the interface results. With this, the user can access the maintenance of vocal health. It is also possible that
tips interface where he/she will learn about the the user reports how many glasses of water he/she
preservation of vocal health. It is clear that drank during the working day (Table 2-8).
technology can influence and change the way of Hydration is recommended in both the prevention
living and acting of people, even when these issues and treatment of voice disorders. It is known that the
go through the care and health promotion context. benefits of hydration are many, such as: reducing the
Thus, it confirms the importance of incorporating viscosity of mucus in the larynx and facilitating
advanced technologies in scenarios of assistance to mucus-wave motion. Thus, a more hydrated mucosa
vocal health as it implies a redefinition of self-care provides greater flexibility to the vibration of the
(Silva; Ferreira, 2009) vocal folds, increasing vocal resistance and reducing
the sensations related to vocal effort (Medaglia et al.,
4.3 Decibelimeter 2008).
352
Voiceguard: Using mHealth Technology for Vocal Health Promotion
interface, the user can perform simple exercises of Guidini, R. F. et al. Correlações entre ruído ambiental em
voice heating and cool-down, before and after voice sala de aula e voz do professor. Revista da Sociedade
use, respectively. Brasileira de Fonoaudiologia, São Paulo, dez. 2012.
Behlau, M.; Madazio, G., Feijó, D.; & Pontes P. Avaliação
de voz. (2001). In: Behlau M. organizador. Voz: o livro
do especialista. vol 1. Rio de Janeiro: Revinter; 85-172.
5 CONCLUSION Miglioranzi SL, Cielo CA, Siqueira MA. Capacidade Vital
e Tempos Máximos de Fonação de /E/ áfonos e de /S/
The VoiceGuard application was designed in order to em Mulheres Adultas Rev. CEFAC. 2012.
Medaglia, N.C. et al. Sintomas vocais relacionados à
facilitate the improvement of the management of
hidratação monitorada. IV Mostra Interna de Trabalhos
vocal health, aiming the adoption of habits and de Iniciação Científica, 2008. Centro Universitário de
behaviors able to maintain healthy voice, which is Maringá, Paraná - Brasil
consistent with the health promotion strategies. Behlau, M.; Pontes, P. Higiene Vocal: cuidando da voz. 4.
As the mobile technology is present in everyday ed. Rio de Janeiro: Revinter, 2009. 70p.
society, use it as a resource in health care can be a Brasil. Censo Escolar 2009. Brasília: Ministério da
quick, easy and inexpensive strategy to achieve a Educação, 2009.
considerable number of people. Therefore, we believe Brasil. Conselho Nacional de Saúde. Diretrizes e normas
that the mobile application as a tool for vocal health regulamentadoras de pesquisas envolvendo seres
humanos. Resolução 466, de 12 de dezembro de 2012.
promotion is a necessary resource and a new
Brasil, C.C.P. A voz da professora não pode calar: sentidos,
possibility for professional voice in the current ações e interpretações no contexto da integralidade em
context. saúde. 2015. 232 f. Tese – UECE, UFC e UNIFOR,
The usability testing gives us a positive and Fortaleza, 2015.
preliminary indication of acceptance and positive Free, C. et al. The effectiveness of M-health technologies
impact of the tool. All invited users were able to meet for improving health and health services: a systematic
the proposed activities in an average time considered review protocol. BMC Res Notes, v.14, n.5, p.2-7, Out.
good, without doubts about the interaction with the 2010.
tool and with some good suggestions (embraced by Gonçalves, C.G.O; Penteado, R.Z.; Silvério, K.C.A.
Fonoaudiologia e saúde do trabalhador: a questão da
the staff) to change some terminologies and the
saúde vocal do professor. Saúde em Revista,
location of information in the interfaces. Piracicaba, v. 7, n.15,Jan. / Abr.2005.
A third phase will be conducted after the Riley, et al. Health behavior models in the age of mobile
development of the VoiceGuard, in which it will be interventions: are our theories up to the task?
validated with experts in voice and a larger number of TranslBehav Med , v.1, n.1Mar. 2011.
elementary school teachers, in order to be available Roy, N. et al. Prevalence of voice disorders in teachers and
for free in the app stores. the general population. Journal of speech, language,
and hearing research, Rockville, v. 47, n. 2, p. 281-293,
Apr. 2004.
Preece, J. et al. Design de Interação: além da interação
REFERENCES homem-computador. 3.Ed. Porto Alegre:Bookman,
2013.
Fabricio, Mariana Zerbetto; Kasama, Silvia Tieko; Silva, R.C.; Ferreira, M. A. A tecnologia em saúde: uma
Martinez, Edson Zangiacomi. Qualidade de vida perspectiva psicossociológica aplicada ao cuidado de
relacionada à voz de professores universitários. Rev. Enfermagem. Esc. Anna Nery Rev. Enferm., Rio de
CEFAC, São Paulo , v. 12, n. 2, p. 280- Janeiro, v.13, n.1, p: 169-173, Jan./Mar., 2009.
287, Apr. 2010 Whittaker, R. Issues in mHealth: findings from key
Sarno F, Canella DS, Bandoni DH. Mobile health e excesso informant interviews. J Med Internet Res, Pittsburgh, v.
de peso: uma revisão sistemática. Rev Panam Salud 14, n 5, p.129, Oct. 2012.
Publica. 2014;35(5/6):424–31.
Christmann, M. K.; Scherer, T. M.; Cielo, C. A.;
Hoffmann, C. A.. Tempo máximo de fonação de futuros
profissionais da voz. Rev. CEFAC, São Paulo 2012.
Baring, J. G. & Murgel, E. Cuidado! Barulho demais faz
mal à saúde. Revista Nova Escola, n. 179, p. 29,
janeiro/fevereiro.2005.
Barbosa, S. D. J.; Silva, B. S. Interação Humano-Computador.
Série SBC, Editora Campus-Elsevier, 2010.
353
Identifying Key Components of Services in Healthcare
in the Context of out-Patient in Norway
Eunji Lee
SINTEF, Oslo, Norway
eunji.lee@sintef.no
Abstract: This paper discusses components of service in healthcare. Four components of a service (service customer,
service worker, service setting and service process) were introduced. Yet these components have not been
explored in healthcare cases. We identified the key components through our case study with out-patient
histories, involving electronic health record systems. Based on our analysis we propose a set of components
to be considered for designing stakeholder-centred services in healthcare. The result of this study might be
useful to the health informatics researchers to better understand the service interactions in today’s healthcare
in a more analytic and holistic way by taking the service engineering perspective, at the same time to the
service engineering or design researchers to have a deeper insight of the services in healthcare and the
components to be considered when designing the services.
354
Lee, E.
Identifying Key Components of Services in Healthcare in the Context of out-Patient in Norway.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 354-361
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Identifying Key Components of Services in Healthcare in the Context of out-Patient in Norway
355
HEALTHINF 2017 - 10th International Conference on Health Informatics
Figure 2: Communications between the health information systems in the first out-patient case.
3.2 Data Analysis Process involved stakeholders, the places where the events
happened, and the contexts of the events. We found
Based on the data collected in the researcher’s notes, that the stakeholder is either service customer or
audio files, and photos taken, we constructed each worker, and that the place is the service setting. We
patient’s journey using excel spreadsheet. We learnt the events can be recognised as small units
identified key components of services in healthcare constituting the entire service provision. Therefore,
by improving the templates of the journeys in an we call the context of the event as sub-service
iterative manner. provision context and add it as a key component of
We constructed the first version of the journeys services in healthcare.
using a ‘service blueprint (Stickdorn and Schneider, We then constructed the second version of the
2010)’ method which includes the roles of the journeys by improving the first version. While we
356
Identifying Key Components of Services in Healthcare in the Context of out-Patient in Norway
were doing this, we discovered that some events 4.1 Components of Health and eHealth
contain a sender, a receiver and an object. We also Services in Out-patient Context
added the date for each event in the second version.
We learnt that the date can be recognised as an The out-patient histories include interactions situated
indicator in the service process. in health service and in eHealth service. Here we
Finally, we could develop a systematic template define a health service as a conventional medical
that shows the patients’ journeys (third version). We service not containing any interactions via electronic
added the overall aim of the service and the channels. We define an eHealth service as a service
identifier for each event. We distinguished the event containing interactions via electronic channels. We
involving a sender, receiver and object as a identified the key components of health service and
touchpoint that indicates an interaction between two eHealth service separately.
stakeholders. We also found that each touchpoint The objective of the interactions situated in the
contains a communication channel that is used in health services was treatment. Thus, the service
order to deliver the object to the receiver. We customers were the patients and the secondary
identified the other events as actions when there is service customers might be family members of the
no such interaction. We discovered that some patients. The service workers were the healthcare
touchpoints are electronic-based, occurring in or professionals from different groups and
between the health information systems. For organisations, like a GP and a nurse. The setting of
example, an electronic referral was sent from a GP’s the interactions situated in the health services were
EHR system to a Hospital A’s EHR system. We either a medical facility (e.g., a hospital) or a
found that these health information systems can be location where the patient has a touchpoint (e.g., a
seen as stakeholders that contribute to out-patient patient reads a postal letter at home or answers a
services. In addition, we identified various types of phonecall at work). The processes of the health
interaction in the patients’ histories: human-to- services were sequences of actions and touchpoints
human interaction (face-to-face or via telephone), of the patients and the healthcare professionals. We
human-to-physical evidence interaction, and human- found that the interaction type situated in the health
to-computer interaction. We call the aim of the services was either human-to-human interaction
service as service objective and the type of (e.g., a GP examines a patient.) or human-to-
interaction as service interaction type and add these physical evidence interaction (e.g., a GP reads a
as key components of services in healthcare. postal letter from a hospital.). The health services
People producing or maintaining an EHR system involved sub-services (smaller units constituting the
have influence on the interactions between a service) for the service objective (patient treatment).
healthcare professional and the EHR system. We The sub-service provision context of the health
regard these people as secondary service workers. services was either a service worker provides a
A patient can be affected by an interaction between a service to a service customer (e.g., a surgeon
healthcare professional and an EHR system. In this operates on a patient to treat a disease.) or a service
context, we regard the patient as a secondary worker provides a service to another service worker
service customer. (e.g., a health secretary in a hospital sends an out-
patient note to a GP via postal letter.).
The objective of the interactions situated in the
4 COMPONENTS OF SERVICES eHealth services was efficient communication
IN HEALTHCARE among healthcare professionals. Therefore, the
service customers were the healthcare professionals
from different groups and organisations, while the
In this section, we first present the key components
patients became the secondary service customers.
of services in healthcare, which we identified during
The service workers of the eHealth were the health
our data analysis. We then present two examples
information systems such as EHR and RIS, while the
(one for health service and one for eHealth service)
secondary service workers might be people
of the services according to the key components we
producing or maintaining the health information
analysed from the patient histories.
systems. The setting of the interactions situated in
eHealth service was the health information system
software. The processes of the eHealth services were
sequences of touchpoints via the health information
systems. We found that the service interaction type
357
HEALTHINF 2017 - 10th International Conference on Health Informatics
358
Identifying Key Components of Services in Healthcare in the Context of out-Patient in Norway
In our case study, the purpose of the health service 5.5 Sub-Service Provision Context
was providing treatment to the patients. However, in
the eHealth service perspective, the purpose In a broad and holistic perspective, a service can
becomes efficient communication among healthcare contain several sub-services. For instance, an air
professionals. Concerning these service objectives, it travel service consists of sub-services, such as
might be beneficial to better orchestrate the actions check-in, providing meal on the plane etc. In
and touchpoints in service experience when healthcare, many actors are connected to each other
designing services in healthcare. to solve specific tasks and eventually pursuit the
ultimate goal: maximising health of the population
in the society (Coast, 2004). Considering such sub-
service provision types, it would be helpful to better
359
HEALTHINF 2017 - 10th International Conference on Health Informatics
coordinate various interactions between different 2007).” We envision further research in the form of
actors and systems in services in healthcare. In our empirical studies that consider the key components
case, no ubiquitous computing or pervasive of services in healthcare when evaluating or
technology originated sub-service was found. designing services in healthcare. Investigating how
However, it might appear more and more in future to present or document all the actions and
services as the technology advances. Since the touchpoints of a service delivery process in more
interactions originated from ubiquitous computing or holistic way might also be interesting. Our research
pervasive technology happen without the customer’s is based on document analysis, observation, and
direct control (Cellary, 2015), it can be more interview because of the challenges in conducting
challenging for us to well integrate them in service ethnography study with patients due to ethical
consideration. Thus, we are also interested in
delivery.
investigating how to collect richer data that can
provide a deeper insight of services in healthcare.
6 LIMITATIONS
ACKNOWLEDGEMENTS
There are different types of eHealth service
depending on who communicates with whom. We
The research presented here has been conducted
conducted our case study with eHealth services within the VISUAL project (project number 219606)
where healthcare professionals communicate with
funded by the Research Council of Norway. Thanks
each other. Thus, the key components in other types to Ragnhild Halvorsrud for helping me arranging
of eHealth service (e.g., telepsychiatry where a data collection activities for the case study, to Maja
psychiatrist communicates with a patient) might be
Van Der Velden and Stefan Holmlid for guidance in
different from what we identified. writing this paper, to our industrial partner for the
Our case study was conducted with desktop-based contribution. Above all, we thank the participants
eHealth services. Conducting a case study with a
who provided data for the case study.
mobile-based eHealth service might lead to the
results that are not the same as what we found from
our case study.
REFERENCES
Alsos, O.A., Svanæs, D., 2011. Designing for the
7 CONCLUSION secondary user experience. In INTERACT 2011, 13th
International Conference on Human-Computer
Our research reveals that out-patient care includes Interaction. Springer-Verlag. pp. 84–91.
interactions situated in both health service and in Baxter, P., Jack, S., 2008. Qualitative case study
eHealth service. We found that these two different methodology: Study design and implementation for
types of service consist of different components. We novice researchers. The qualitative report 13, 544–
expanded the Fisk et al. (2013)’s four components of 559.
Bowen, G.A., 2009. Document analysis as a qualitative
service (service customer, service worker, service
research method. Qualitative research journal 9, 27–
setting, and service process) for services in 40.
healthcare by adding five new components: service Cellary, W., 2015. e-Service-dominant Logic. In AHFE
objective, service interaction type, sub-service 2015, 6th International Conference on Applied Human
provision context, secondary service workers, and Factors and Ergonomics and the Affiliated
secondary service customer. Considering these Conferences. Procedia Manufacturing. pp. 3629–3635.
components when evaluating service experience Chandler, J.D., Vargo, S.L., 2011. Contextualization and
might support an analytical way of understanding value-in-context: How context frames exchange.
the complexity in service delivery process in Marketing Theory 11, 35–49.
Coast, J., 2004. Is economic evaluation in touch with
healthcare. This understanding might contribute to
society’s health values? BMJ 329, 1233–1236.
designing more stakeholder-oriented services in Fereday, J., Muir-Cochrane, E., 2006. Demonstrating rigor
healthcare. using thematic analysis: A hybrid approach of
There is a need for a holistic and stakeholder- inductive and deductive coding and theme
centred approach in designing and evaluating development. International journal of qualitative
eHealth services. “the effectiveness of emerging methods 5, 80–92.
eHealth technologies in improving the processes or
outcomes of healthcare is unproven (Pagliari,
360
Identifying Key Components of Services in Healthcare in the Context of out-Patient in Norway
361
Poke-R
Using Analytics to Reduce Patient Harm
James P. McGlothlin1, Evan Crawford1, Jesse Wyatt2, Carlos Samayoa2, Yana Vaks2,
Brenda Bruneau2, Merrick Lopez2, Anthony Moretti2, Michele Wilson2 and James Pappas2
1
Fusion Consulting Inc, Irving, TX, U.S.A.
2
Loma Linda University Health System, Loma Linda, CA, U.S.A.
{jmcglothlin, ecrawford}@fusionconsultinginc.com,
{jewyatt, csamayoa, yvaks, bbruneau, mlopez, amoretti, mwilson, jpappas}@llu.edu
Keywords: Data Warehousing, Healthcare Analytics, Quality, Pediatric Intensive Care, Business Intelligence.
Abstract: Major events and surgeries are not the only sources of trauma during a hospital encounter. Many small, less
invasive events such as shots, line placements, blood draws, and imaging studies happen throughout a
patient’s hospital stay. Many of these less traumatic events have the potential to negatively impact patient
outcomes by increasing the risk of hospital-acquired infections through skin invasions and exposure to
organisms, reducing the patient experience by causing pain and frustration, increasing cost and causing other
complications. The goal of this project is to reduce such events when they are not clinically required. This
is an analytics project so this goal is facilitated by making accurate and meaningful information available to
the appropriate personnel. This includes timely information to clinicians so they can alter treatment, and
retrospective trend analysis to enable and track performance improvement and identify opportunities for
additional process improvement.
362
McGlothlin, J., Crawford, E., Wyatt, J., Samayoa, C., Vaks, Y., Bruneau, B., Lopez, M., Moretti, A., Wilson, M. and Pappas, J.
Poke-R - Using Analytics to Reduce Patient.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 362-369
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Poke-R - Using Analytics to Reduce Patient
363
HEALTHINF 2017 - 10th International Conference on Health Informatics
which required separate blood draws. If 5 lab draws 5. The provider who ordered the POKE
show the same collection time, it is important to know 6. When the POKE was scheduled to occur
whether they were separately drawn, or all of the tests 7. When the POKE occurred
used the same blood collection. 8. Whether the POKE is painful
With these extensions, all of the data needed to 9. Who performed the POKE
mine the POKE-R information was available in the One thing that was very important was to
data warehouse. However, before we could search determine the scheduled POKE-R events. Our goal
for the POKE-R events, we had to configure which was to show the clinician the upcoming POKE-R
events were defined as POKEs. We did not want to schedule so that treatment could be altered to reduce
hard-code this information and we did not want the the POKEs. To do this we brought in every scheduled
information determined or maintained by IT medication administration, procedure, surgery, image
personnel as it is clinical in nature. Therefore, we or lab test.
established an interface to configure POKE-R.
We needed to define every event which was a
POKE-R event and whether it was painful. This 3 INFORMATION
needs to be configured using attributes of the data
elements. The following attributes were identified by PRESENTATION
the clinician as identifying POKEs:
1. Medication Administration: Route and At this point, we had aggregated all of the information
Administration Event necessary to analyze POKE-R. The next step was to
2. Lab Test: Specimen Type and Specimen make this information useful to a clinician.
Source We developed three reports. The first report was
3. Procedure Order: Type and Code a detailed report of patients currently in the hospital.
Additionally, the presence of a line or drain prior This report lists for each patient the total number of
to the event can impact whether the event is a POKE pokes and painful pokes, the number of pokes and
painful pokes in the last 7 days and the number of
and whether it is painful. For example, blood tests
scheduled pokes for the next 3 days in graphical
and medication administrations are considered non-
format. This poke counts are then shown grouped by
painful if they use an existing line. A urine sample is the type of poke. Finally, every POKE performed in
not a POKE at all unless there is a catheter used to the last 7 days and every POKE scheduled for the next
obtain the specimen. 3 days was individually listed with details. This
Finally, if the patient is under anesthesia at the reported was filtered by department so that an
time of the event, it is considered non-painful. individual department could see each patient in the
We created a simple secure interface for the department. Scheduled POKEs are not always ever
Patient Safety and Reliability leadership to provide performed or cancelled. They can be left in pending
and administer this clinical information. This status. So we dropped any scheduled POKE in the
interface contains the data points listed above past which was never performed. The second report
prepopulated from the actual clinical data warehouse. was the abridged version of the first report, showing
The user can then choose which values for each data only the number of POKEs over the past 7 days and
point indicate a POKE and can combine data points. what POKEs were scheduled for today. This made it
We developed software code using Microsoft more simpler for clinicians to digest the POKE-R
SQL Server Integration Services (SSIS) to read the information and make actionable decisions. Figure 3
POKE-R configuration file and then extract POKE-R shows an example of this report.
events from the data warehouse into a new table The third report was a trend of POKEs per Patient
within the data warehouse called PokeFact. This fact per Day over time so we could see if performance
table contains the following information: improvement was being achieved. This report was
1. Encounter ID: The encounter the POKE able to be filtered by location, unit, or attending
happened during provider. Figure 4 shows an example of this
retrospective report.
2. POKE type: LDA Placement, LDA
Together, these reports enable process
Placement Extra Attempts, Medication
improvement and improved treatment. The provider
Administration, Image, Specimen Collection, Point and treatment team are supported by the detailed
of Care Test (POCT), Invasive Procedure, Surgery report, while the analysts in Patient Safety and
3. Whether the POKE has already happened Reliability have the aggregate and retrospective
or is scheduled to happen in the future information to identify improvement opportunities.
4. When the POKE was ordered
364
Poke-R - Using Analytics to Reduce Patient
365
HEALTHINF 2017 - 10th International Conference on Health Informatics
366
Poke-R - Using Analytics to Reduce Patient
367
HEALTHINF 2017 - 10th International Conference on Health Informatics
368
Poke-R - Using Analytics to Reduce Patient
This is to eliminate the provider from having to access Ridout R., 2014. Prevent Pain and Organisms from sKin
multiple systems. We plan to have the POKE-R and catheter Entry (POKE): Getting to the Why of Care
details for a patient be directly linked to the patient’s [Internet]. Harvard Business School Open Forum:
electronic health record. This way they can simply Dixie Regional Medical Center. Available from:
https://openforum.hbs.org/challenge/hbs-hms-health-
view the needed POKE-R information when they are acceleration-challenge/innovations/prevent-pain-and-
already reviewing the patient’s chart. organisms-from-skin-and-catheter-entry-poke-getting-
Currently, we have the number of laboratory tests to-the-why-of-care.
but not the volume of specimen taken for the tests. Slovis, T., 2002. CT and Computed Radiography: The
Another enhancement we want to make is to interface Pictures Are Great, But Is the Radiation Dose Greater
with our laboratory system to get the precise volume Than Required?. In American Journal of
of blood collected. This will give us more accuracy Roentgenology.
in measuring POKEs and associated risk for anemia. Brenner D., 2002. Estimating cancer risks from pediatric
CT: going from the qualitative to the quantitative. In
We are also planning to roll out our POKE-R
Pediatric Radiology.
analytics and process to more departments throughout Axt-Adam, P., van der Wouden, P., van der Does, E.,
the hospital in the coming year. 1993. Influencing Behavior of Physicians Ordering
Laboratory Tests: A Literature Study. In Medical Care.
Sengupta, A., Lehmann, C., Diener-West, M., Perl, T.,
7 CONCLUSION Milstone, A., 2010. Catheter Duration and Risk of
CLA-BSI in Neonates With PICCs. In Pediatrics.
Kelly, M., Conway, M., Wirth, K., Potter-Bynoe, G.,
We have implemented a comprehensive and Billett, A.L. and Sandora, T.J., 2011. Moving CLABSI
configurable analytics solution to give providers the prevention beyond the intensive care unit: risk factors
information they need to address excessive POKE-R in pediatric oncology patients. In Infection Control &
events in patients. While our project has only gone Hospital Epidemiology, 32(11), pp.1079-1085.
into production in one hospital unit, we are already Sherwood, G., Adams-McNeill,, J., Starck, P., Nieto, B.,
seeing considerable evidence of improvement. This Thompson, C.. 2000. Qualitative assessment of
project has the opportunity to reduce cost, improve hospitalized patients' satisfaction with pain
management. Research in Nursing Health.
patient outcomes and increase customer satisfaction.
Stein, J., Murphy, D., Payne, C., Clark, D., Bronstein, W.,
Tong, D., Castle, B., Shapiro, S, 2013. A Remedy for
Fragmented Hospital Care. In Harvard Business
REFERENCES Review.
Atchison, J., Wachendorfb, J., Haddockb, D., Mysiwb, S.,
Alharfi, I., Stewart T., Helali, I., Daoud, H., Fraser, D, Gribbleb, M., & Corriganb, J. 1993. Hyponatremia-
2014. Infection rates, fevers and associated factors in associated cognitive impairment in traumatic brain
pediatric severe traumatic brain injury. In Journal of injury. Brain Injury.
Neurotrauma. Algaze, C. et al., 2016. Use of a Checklist and Clinical
Bateman, J., Lacroix, Boven, K., Forbes, P., Barton, et al, Decision Support Tool Reduces Laboratory Use and
2008. Anemia, Blood Loss, and Blood Transfusions in Improves Cost. In Pediatrics.
North American Children in the Intensive Care Unit". Bae, J.. 2015. Value-based medicine: concepts and
In American Journal of Respiratory and Critical Care application. In Epidemiology and Health..
Medicine. Cooke, M., 2010, Cost Consciousness in Patient Care -
Salisbury, A.C., Reid, K.J., Alexander, K.P., Masoudi, What Is Medical Education's Responsibility?. In New
F.A., Lai, S.M., Chan, P.S., Bach, R.G., Wang, T.Y., England Journal of Medicine.
Spertus, J.A. and Kosiborod, M., 2011. Diagnostic Porter, M., 2010. What Is Value in Health Care?. In New
blood loss from phlebotomy and hospital-acquired England Journal of Medicine.
anemia during acute myocardial infarction. Archives of Weinberger, S., 2011. Providing High-Value, Cost-
internal medicine, 171(18), pp.1646-1653. Conscious Care: A Critical Seventh General
Foster, C.B. and Sabella, C., 2011. Health care–associated Competency for Physicians. In Annals of Internal
infections in children. JAMA, 305(14), pp.1480-1481. Medicine.
CT Radiation in Kids: How Much of a Risk, Schuh, S., Parkin, P., et al., 1989, High-Versus Low-Dose,
Really? Medscape. 2014. Frequently Administered, Nebulized Albuterol in
Grissinger, M., 2011. Capping intravenous tubing and Children With Severe, Acute Asthma. In Pediatrics.
disinfecting intravenous ports reduce risks of infection. Brenner, D.J., 2010. Should we be concerned about the
In Pharmacy and Therapeutics. rapid increase in CT usage?. Reviews on environmental
McVoy, M., Shandler, A, 2013. Anemia, Bleeding, and health, 25(1), pp.63-68.
Blood Transfusion in the Intensive Care Unit: Causes,
Risks, Costs, and New Strategies. In Am J Crit Care.
369
Augmenting Guideline-based CDSS with Experts’ Knowledge
Nekane Larburu1,2, Naiara Muro1,2, Iván Macía1,2, Eider Sánchez3, Hui Wang4, John Winder5,
Jacques Boaud6,7 and Brigitte Séroussi7,8
1
eHeatlh and Biomedical Applications, Vicomtech-IK4, Donostia-San Sebastian, Spain
2
Biodonostia, Donostia-San Sebastian, Spain
3
NARU, Donostia-San Sebastian, Spain
4
Computer Science Research Institute, Ulster University, Newtownabbey, U.K.
5
Institute of Nursing and Health Research, Ulster University, Newtownabbey, U.K.
6AP-HP, DRCD, Paris, France
7
Sorbonne Universités, UPMC Univ. Paris 06, INSERM, Université Paris 13, Sorbonne Paris Cité,
UMR S 1142, LIMICS, Paris, France
8
AP-HP, Hôpital Tenon, DSP, Paris, France
{nlarburu, nmuro, imacia}@vicomtech.org, e.sanchez@naruintelligence.com, {h.wang, rj.winder}@ulster.ac.uk,
{jacques.boaud, brigitte.seroussi}@aphp.fr
Keywords: Evidence Based Medicine, Breast Cancer, Computer Interpretable Clinical Guidelines, CDSS.
Abstract: Over the past years, clinical guidelines have increasingly become part of the clinical daily practice in order to
provide best available Evidence-Based-Medicine services. Hence, their formalization as computer
interpretable guidelines (CIG) and their implementation in clinical decision support systems (CDSSs) are
emerging to support clinicians in their decision making process and potentially improve medical outcomes.
However, guideline compliancy in the clinical daily practice is still “low”. Some of the reasons for such low
compliance rate are (i) lack of a complete guideline to cover special clinical cases (e.g. oncogeriatric cases),
(ii) absence of parameters that current guidelines do not consider (e.g. lifestyle) and (iii) absence of up-to-
date guidelines due to lengthy validation procedures. In this paper we present a novel method to build a CDSS
that, besides integrating CIGs, stores experts’ knowledge to enrich the CDSS and provide best support to
clinicians. The knowledge includes new evidence collected over time by the systematic usage of CDSSs.
370
Larburu, N., Muro, N., Macía, I., Sánchez, E., Wang, H., Winder, J., Boaud, J. and Séroussi, B.
Augmenting Guideline-based CDSS with Experts’ Knowledge.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 370-376
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Augmenting Guideline-based CDSS with Experts’ Knowledge
The rest of this paper is organized as follows. capacity for organisational change, and social,
Section 2 presents the state of the art on CIG political, and legal factors.
compliance. Section 3 presents the method to However, effective guideline-based CDSSs
augment the guideline-based CDSS with expert´s (Beeler et al., 2014; Roshanov et al., 2013) provide a
knowledge. Section 4 presents the application of such framework for logging non-compliance cases and
method in an EU project, DESIREE, developed in the learn from them. As demonstrated by Séroussi et al.
context of breast cancer. Section 5 proposed a short (B. Séroussi et al., 2013), guideline compliance
discussion on the presented method and Section 6 increases by using guideline-based CDSS.
concludes the paper and gives some future work lines. Additionally, Bouaud et al. (Bouaud and Séroussi,
2011) determined the main factors related with CPG
non-compliance and reported the distribution of non-
2 STATE OF THE ART compliance causes. Here, we list these causes
reported in (Bouaud and Séroussi, 2011):
Patient preferences: When patients receive
2.1 Guideline Compliance more complete information about the benefits
and risks of different treatment options, the
Variations in medical practices have been observed patients made their own active, informed
for decades, questioning the quality of care (Mercuri decisions (Leonard et al., 2011). This decision
and Gafni, 2011). CPGs compliance is one of the is influenced by their personal preferences.
primary performance measures to assess the quality Evolution of medical knowledge: CPG
of medical practice. McGlynn et al. (McGlynn et al., knowledge may not consider latest scientific
2003) reported that 54.9% of the studied patient publications and clinical essays, and hence,
population received CPGs’ based recommended care, they may lag behind ‘last’ evidence (B.
which vary from 10% to 78%. In their work they Séroussi et al., 2013). This may include that
reported that for BC 75.7% were consistent with ‘new’ parameters are not being considered in
recommended care, based on 9 quality indicators. the applied guidelines.
Other studies also demonstrated suboptimal guideline Specific situations: Rare situations that require
compliance levels in BC (Adegboyega et al., 2015; specific clinical research are also a cause of
Landercasper et al., 2006; Lebeau et al., 2011; non-compliance. For example, in BC scenarios
Wöckel et al., 2010). The published levels of shown in (Parks et al., 2012; Schnitt, 1998; B
guideline compliance range from 12% (Lebeau et al., Séroussi et al., 2013), microinvasion,
2011) to 100% (Adegboyega et al., 2015), depending neadjuvant situations and oncogeriatry
on the definition of guideline compliance and the conditions are the main causes that lead into
level of abstraction of the guideline. For instance, non-compliance situations.
Wöckel et al. (Wöckel et al., 2010) reported 80% of Medical choices: One of the main cause of
adherence to German-S3-BC guideline for surgery non-compliance is a medical decision that is
and for hormone therapy, and 71% for chemotherapy, prioritized over the guideline recommendation.
indicating different compliance levels for the For example, in (Bouaud and Séroussi, 2011),
different components of the care plan. Similarly, the study reported that BC multidisciplinary
Lebeau et al. (Lebeau et al., 2011) reported high level staff meetings’ choice (i.e. breast units choice)
of guideline compliance, but also said that is the main reason reported as the cause for
“management of non-metastatic BC was fully CPG non-compliance.
compliant (considering jointly 20 quality criteria)”. Others: Finally, it may be other reasons that
lead into CPG non-compliancy that do not
2.2 Causes Associated with Guideline belong to any of the previously reported causes.
Non-Compliance Some studies provide tools to support clinicians
in understanding the reasons of non-compliancy
The causes of variations in care delivery are (Hussain et al., 2007). Others exploit the stored
multifactorial. A review by Flottorp et al. (Flottorp et patient information to predict patient worsening and
al., 2013) identified a list of 51 determinants of prevent potential emergencies (Colantonio et al.,
practice grouped in seven domains: guideline factors, 2008). Yet, there is no evidence that all the
individual health professional factors, patient factors, information related to the whole decision making
professional interactions, incentives and resources, process (such as additional patient data, the decision
criteria for giving a specific treatment and patient
371
HEALTHINF 2017 - 10th International Conference on Health Informatics
3 METHOD TO AUGMENT
GUIDELINE-BASED CDSS
Here we present a method that enables the
exploitation of the implicit knowledge used in a
decision making process. The method is presented in
the following subsections: Section 3.1 presents the
starting point, which applies the clinical guideline
model, Section 3.2 presents the second stage, which
describes the acquisition process of experts’
knowledge and Section 3.3 presents how such
experts’ knowledge is exploited.
372
Augmenting Guideline-based CDSS with Experts’ Knowledge
373
HEALTHINF 2017 - 10th International Conference on Health Informatics
Narrative Guidelines: In our methodological as MobiGuide (Larburu et al., 2015), where the
approach, the starting point is the analysis of guidelines are customized and made context-aware
representative and narrative CPGs used in BC beforehand during the knowledge engineering phase,
care. and not over time depending on previous cases.
Computer Interpretable Guidelines: Neither we focus on the discovery of temporal rules
Knowledge engineers extract the relevant from time-stamped data, like in (Sacchi et al., 2007).
information from CPGs and formalize it in a Our study aims to discover rules from previous cases
CIG. This covers the recommendations given tracking each case to assess the outcomes and
by guidelines for primary BC in several stages considering further information often not taken into
of the whole treatment till the patient is account in current CPGs, such as the implicit
discharged. Hence, the CIG consider the knowledge of clinicians. Finally, the presented
previous treatments and the outcomes of them method combines both the CPGs and the knowledge
for the coming decision making action. generated automatically by the system based on their
Knowledge: The knowledge database stores experience, which overcomes the requirements
knowledge from the CIG or from the decisional expressed by clinicians in (Miranda-Mena et al.,
history exploitation´s “new” knowledge. 2006): “clinicians want a system that combines the
Rule-based Engine: The rule-based engine is protocol (or CPG) and their proper knowledge to
able to generate recommendations having as suggest treatments”.
input the structured knowledge. Then, if patient
data fulfils the clinical condition, the rules are
fired and the engine generates one or more 6 CONCLUSIONS & FUTURE
recommendations.
Knowledge Discovery: Based on a large set of WORK
information stored in the decisional history, the
system is capable of retrieving knowledge as The hypothesis of this research is that such approach
discussed in Section 3.3. is more useful for clinicians, which expect a dynamic
system that not only considers available CPGs and
protocols, but also a system that is able to learn from
the stored information over time to provide enriched
5 DISCUSSION decision support system.
In future work we aim to present among others the
The presented method overcomes some limitations of following points: (i) the tools used to convert the
current guideline-based CDSS by providing enriched information acquired by experience into knowledge
recommendations and additional information to to extend and adjust the CPGs and protocols; (ii) a
clinicians in order to support them best in their digital patient model ontology used for the CDSS, and
decision making process. For that, we develop a new particularly for similarity purposes; (iii) the
information structure based on decisional events. A methodology to assess the recommendations
decisional event stores the whole set of information applying different metrics (survival rate, overall well-
used in the decision making process, including the being, physical functioning etc.); and (iv) the
consequences of the final decision, such as patient´s validation of the system in a representative number of
outcomes (e.g. quality of life). patients and the results.
Here we present some of the potential benefits and
limitations of the proposed method. Firstly, the
system promotes the usage of CPGs. Additionally, it
assess the impact of the guidelines on clinical practice ACKNOWLEDGEMENTS
(Section 3.3.1), which is one of the critical factors
detected by (Fox et al., 2009). Secondly, the system This project has received funding from the European
flexibility enables the storage of additional valuable Union’s Horizon 2020 research and innovation
information, such as the decision criteria, that could programme under grant agreement No 690238.
be used to adjust or/and extend the clinical conditions
of the given protocols and CPGs over time (Section
3.3.3). This way it helps overcoming some of the REFERENCES
limitations of current CPGs presented in Section 2,
such as the impact of specific situations. This Adegboyega, T.O., Landercasper, J., Linebarger, J.H.,
diverges from the work done in other projects, such Johnson, J.M., Andersen, J.J., Dietrich, L.L., Driscoll,
374
Augmenting Guideline-based CDSS with Experts’ Knowledge
C.D., Raghavendra, M., Madadi, A.R., Al-Hamadani, Larburu, N., Schooten, B. van, Shalom, E., Fung, N.,
M., Vang, C.A., Marcou, K.A., Hudak, J., Go, R.S., Sinderen, M. van, Hermens, H., Jones, V., 2015. A
2015. Institutional review of compliance with NCCN Quality-of-Data Aware Mobile Decision Support
guidelines for breast cancer: lessons learned from real- System for Patients with Chronic Illnesses, in
time multidimensional synoptic reporting. J. Natl. Knowledge Representation for Health Care, Lecture
Compr. Cancer Netw. JNCCN 13, 177–183. Notes in Computer Science. Springer International
Beeler, P.E., Bates, D.W., Hug, B.L., 2014. Clinical Publishing, pp. 126–139.
decision support systems. Swiss Med. Wkly. 144, Lebeau, M., Mathoulin-Pélissier, S., Bellera, C., Tunon-de-
w14073. Lara, C., Daban, A., Lipinski, F., Jaubert, D., Ingrand,
Bouaud, J., Séroussi, B., 2011. Revisiting the EBM P., Migeot, V., REPERES Group, 2011. Breast cancer
decision model to formalize non-compliance with care compared with clinical Guidelines: an
computerized CPGs: results in the management of observational study in France. BMC Public Health 11,
breast cancer with OncoDoc2. AMIA. Annu. Symp. 45.
Proc. 2011, 125–134. Leonard, R., Ballinger, R., Cameron, D., Ellis, P.,
Cabana MD, Rand CS, Powe NR, et al, 1999. Why don’t Fallowfield, L., Gosney, M., Johnson, L., Kilburn, L.S.,
physicians follow clinical practice guidelines?: A Makris, A., Mansi, J., Reed, M., Ring, A., Robinson,
framework for improvement. JAMA 282, 1458–1465. A., Simmonds, P., Thomas, G., Bliss, J.M., 2011.
Chéreau, E., Coutant, C., Gligorov, J., Lesieur, B., Antoine, Adjuvant chemotherapy in older women (ACTION)
M., Daraï, E., Uzan, S., Rouzier, R., 2011. Discordance study - what did we learn from the pilot phase? Br. J.
with local guidelines for adjuvant chemotherapy in Cancer 105, 1260–1266.
breast cancer: reasons and effect on survival. Clin. McGlynn, E.A., Asch, S.M., Adams, J., Keesey, J., Hicks,
Breast Cancer 11, 46–51. J., DeCristofaro, A., Kerr, E.A., 2003. The Quality of
Colantonio, S., Conforti, D., Martinelli, M., Moroni, D., Health Care Delivered to Adults in the United States.
Perticone, F., Salvetti, O., Sciacqua, A., 2008. An N. Engl. J. Med. 348, 2635–2645.
intelligent and integrated platform for supporting the Mercuri, M., Gafni, A., 2011. Medical practice variations:
management of chronic heart failure patients, in: 2008 what the literature tells us (or does not) about what are
Computers in Cardiology. Presented at the 2008 warranted and unwarranted variations. J. Eval. Clin.
Computers in Cardiology, pp. 897–900. Pract. 17, 671–677.
Ferlay, J., Steliarova-Foucher, E., Lortet-Tieulent, J., Miranda-Mena, T.G., Benítez U., S.L., Ochoa, J.L.,
Rosso, S., Coebergh, J.W.W., Comber, H., Forman, D., Martínez-Béjar, R., Fernández-Breis, J.T., Salinas, J.,
Bray, F., 2013. Cancer incidence and mortality patterns 2006. A knowledge-based approach to assign breast
in Europe: Estimates for 40 countries in 2012. Eur. J. cancer treatments in oncology units. Expert Syst. Appl.
Cancer 49, 1374–1403. 31, 451–457.
Flottorp, S.A., Oxman, A.D., Krause, J., Musila, N.R., Parks, R.M., Lakshmanan, R., Winterbottom, L., AL
Wensing, M., Godycki-Cwirko, M., Baker, R., Eccles, Morgan, D., Cox, K., Cheung, K.-L., 2012.
M.P., 2013. A checklist for identifying determinants of Comprehensive geriatric assessment for older women
practice: a systematic review and synthesis of with early breast cancer – a systematic review of
frameworks and taxonomies of factors that prevent or literature. World J. Surg. Oncol. 10, 88.
enable improvements in healthcare professional Roshanov, P.S., Fernandes, N., Wilczynski, J.M., Hemens,
practice. Implement. Sci. IS 8, 35. B.J., You, J.J., Handler, S.M., Nieuwlaat, R., Souza,
Fox, J., Patkar, V., Chronakis, I., Begent, R., 2009. From N.M., Beyene, J., Van Spall, H.G.C., Garg, A.X.,
practice guidelines to clinical decision support: closing Haynes, R.B., 2013. Features of effective computerised
the loop. J. R. Soc. Med. 102, 464–473. clinical decision support systems: meta-regression of
Grimshaw, J.M., Russell, I.T., 1994. Achieving health gain 162 randomised trials. BMJ 346, f657.
through clinical guidelines II: Ensuring guidelines Sacchi, L., Larizza, C., Combi, C., Bellazzi, R., 2007. Data
change medical practice. Qual. Health Care 3, 45–52. mining with Temporal Abstractions: learning rules
Hussain, S., Abidi, S.R., Abidi, S.S.R., 2007. Semantic from time series. Data Min. Knowl. Discov. 15, 217–
Web Framework for Knowledge-Centric Clinical 247.
Decision Support Systems, in: Artificial Intelligence in Sackett, D.L., Rosenberg, W.M.C., Gray, J.A.M., Haynes,
Medicine. Presented at the Conference on Artificial R.B., Richardson, W.S., 1996. Evidence based
Intelligence in Medicine in Europe, Springer, Berlin, medicine: what it is and what it isn’t. BMJ 312, 71–72.
Heidelberg, pp. 451–455. Schnitt, S.J., 1998. Microinvasive carcinoma of the breast:
ICHOM – International Consortium for Health Outcomes a diagnosis in search of a definition. Adv. Anat. Pathol.
Measurement [WWW Document], n.d. URL 5, 367–372.
http://www.ichom.org/ (accessed 1.3.17). Séroussi, B., Laouénan, C., Gligorov, J., Uzan, S., Mentré,
Landercasper, J., Dietrich, L.L., Johnson, J.M., 2006. A F., Bouaud, J., 2013. Which breast cancer decisions
Breast Center review of compliance with National remain non-compliant with guidelines despite the use
Comprehensive Cancer Network Breast Cancer of computerised decision support? Br. J. Cancer 109,
guidelines. Am. J. Surg. 192, 525–527. 1147–1156.
375
HEALTHINF 2017 - 10th International Conference on Health Informatics
376
Home Monitoring in Portugal
An Overview on Current Experiences
Ana Dias1, Madalena Vilas Boas1, Daniel Polónia1, Alexandra Queirós2 and Nelson Pacheco Rocha3
1
Department of Economics, Management, Industrial Engineering and Tourism, University of Aveiro,
Campo Universitário de Santiago, 3810-193 Aveiro, Portugal
2
Health Sciences School, University of Aveiro, Campo Universitário de Santiago, 3810-193 Aveiro, Portugal
3
Department of Medical Sciences, University of Aveiro, Campo Universitário de Santiago, 3810-193 Aveiro, Portugal
{anadias, mvb, dpolonia, alexandra, npr}@ua.pt
Abstract: This paper aims to be a contribution to the discussion on the issue of innovation in healthcare since, in the
author’s perspective, the health sector, and particularly the Portuguese National Health Service, needs
changes in its "business model". There is a need of redirecting care provision to the citizen’s natural
environment, namely considering the opportunities offered by information and communication
technologies. For this purpose the authors surveyed projects already implemented in Portugal, within the
Portuguese National Health Service, related to home monitoring, in order to make a critical analysis of the
state of the art of ongoing projects. In this study, the authors identified four pilot experiences of home
monitoring, all targeted at chronic disease. In spite of some results of these experiments are already known,
there is a shortage of available information and scientific evidence, both about the implementation processes
themselves and about their clinical, technical and economic evaluation, which, in the opinion of the authors,
also hinders their assessment and dissemination.
377
Dias, A., Boas, M., Polónia, D., Queirós, A. and Rocha, N.
Home Monitoring in Portugal - An Overview on Current Experiences.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 377-382
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
combined with “an epidemiological transition" and Telemedicine activity can take many forms,
"this combination of phenomena is confronting us ranging from remote diagnosis (teleradiology and
with a crisis (…) which comes as an opportunity to telepathology) to remote care provision, such as
look critically at what has been done and, based on teleconsultation or home monitoring. Within
that, project us in the future with more appropriate telemedicine activities, the most used was
tools and skills to new circumstances." (OPSS, 2016, teleradiology (i.e. the exchange of images to discuss
p. 31). cases and for diagnosis), being reported by 84% of
This study thus seeks to contribute to the hospitals that refer having telemedicine. On the
discussion on the theme of innovation in healthcare other hand, only 31% of hospitals that report having
in Portugal, taking advantage of the opportunities telemedicine provide teleconsultation (i.e. 10% of
offered by information and communication the total hospital’s number) (INE, 2014b).
technologies. In particular, given the home As a result of the telemedicine development,
monitoring potential, which is supported on the Portugal is involved in several international projects
progress achieved in mobile technologies, as well as to promote the cooperation between healthcare
its relevance to chronic diseases, this study aims to professionals. In particular, there are some projects
analyze the viability of experiences already with the African Countries with Portuguese as an
implemented in Portugal related to home monitoring Official Language (Países Africanos de Língua
of patients with chronic diseases. Oficial Portuguesa - PALOP) (Borja-Santos, 2013).
In October 2013 it was launched a telemedicine
platform between Portugal and several PALOP
2 RELATED WORK (Noronha, 2013) but, previously, there were other
projects. For example, in 2012 a project between
In Portugal, via the 3571/2013 Order, published in Portugal and São Tomé and Príncipe allowed an
the Official Gazette on March the 6th, 2013, the estimated saving of 180,000 euros in the transfer of
Ministry of Health, assuming that the use of patients to Portugal and allowed to save one million
telemedicine allows the observation, diagnosis, euros to the Portuguese Ministry of Health
treatment and monitoring in a more convenient place (Noronha, 2013). Portugal is also part of a
for patients, particularly at home, states that "the telemedicine network with Angola and the
services and facilities of the National Health Service University Hospitals of Geneva that allows technical
(SNS) should increase the use of information and support for diagnosis and treatment of Angolan
communication technologies in order to promote and patients.
ensure the provision of telemedicine services to [its] In addition to the experiences within the PALOP,
users" (p.8326). there are others being carried out between Portugal
According to INE, on its Survey on the Use of and Spain. Since 2003 the southern region of the
Information and Communication Technologies in Algarve has participated in a telemedicine project in
Hospitals (INE, 2014b), one third of the Portuguese conjunction with the Spanish region of Andalusia,
hospitals developed telemedicine activities in 2014, with the aim of creating new communication
an increase of 16 percentage points in ten years (12 channels between the Algarve and Andalusia and,
percentage points in the last four years) (Figure 1). inside the Algarve, between the health centers and
However, the degree of implementation of the hospitals in the region, with the installation of
telemedicine is quite different in public hospitals telemedicine equipment in all health centers (Portal
(51%) and private hospitals (15%). da Saúde, 2005).
With regard to teleconsultation, in 2007, it was
launched in Portugal the “Linha de Saúde 24”,
which provides counselling and referral in a disease
situation, accessible through the phone (or chat for
people with special needs) as well as therapeutic
counselling to clarify particular questions and
provide support related to matters as medication
(Saúde 24, s.d.).
Within a group of other innovative projects in
Figure 1: Proportion of hospitals with telemedicine, this area, out of the governmental sphere, the authors
Portugal, 2004-2014 (Source: INE, 2014b). highlight two: the "Patient Innovation", a social
network for patients who, sharing experiences about
378
Home Monitoring in Portugal - An Overview on Current Experiences
their illness, can develop solutions to their real in their homes, promoting their autonomy and
problems, from therapeutic support to proper encouraging personal responsibility by adopting
medical equipment (Pinho, 2013) and a private healthy lifestyles. However, there are no studies
service that allows traveler teleconsultations reporting the current experiences of home
(Consulta do Viajante, 2016). monitoring in Portugal.
Specifically, in the region of Alentejo (one of the
most aged and sparsely populated regions of the
country) several teleconsultation experiments 3 METHODS
(Oliveira et al., 2014) were reported, dating back to
1998, in order to respond to challenges such as Considering the lack of evidence of current
desertification, isolation, low population density, Portuguese home monitoring experiences, the
poverty, lack of medical resources in several
present study has the following main objectives:
specialties as well as poor public transports, all of To make an inventory of projects already
which have acted as barriers to access to healthcare implemented in Portugal, within the SNS in
in the region. It should be noted that the Alentejo
the area of home monitoring, particularly
region represents approximately one-third of focused on the chronically ill, and preferably
Portugal’s continental territory, but it is home to projects involving primary healthcare, which
only 5% of its population. Teleconsultations are
is believed that will assume an increasingly
available in 15 medical specialties, ranging from central role in the management of chronic
Neurology to Pediatric Surgery. The network disease.
includes 20 primary care units and five hospitals,
To make a critical analysis of the state of the
covering almost 30,000 km2 and around 500,000 art of ongoing projects.
people. A comprehensive assessment of the costs
The authors consulted the Central Administration
and consequences of the program is currently
of the Health System (Administração Central do
underway, since it is stated that there is a lack of
Sistema de Saúde - ACSS) in order to retrieve
evidence of its cost-effectiveness, which, according
information on projects related to home monitoring
to Oliveira et al. (2014), hinders the sustainment and
already implemented by the SNS.
realization of the promise of innovative solutions,
Subsequently, an additional survey was
wherever it is implemented.
conducted to analyze if there were publications that
Regarding the autonomous islands, the Azores
best described these experiences and others in the
already belongs to several networks, which allows
same area, and possible results already obtained.
the realization of teleconsultation to determine the
Finally, the authors conducted a survey on the
clinical need of the patient's displacement to
web pages of SNS hospitals to search for innovative
mainland to carry out consultations and exams
projects in general, and home monitoring in
(Mourato, 2014). In the Azores the use of
particular. For this purpose, the web pages of 41
teleconsultation in Nursing is also frequent,
hospitals were identified and analyzed.
particularly in decision support in the treatment of
wounds. Furthermore, there is already
teleconsultation in various health centers in the
archipelago in the following specialties: 4 HOME MONITORING
Nephrology, Pediatric Cardiology, Neonatology and EXPERIENCES IN PORTUGAL
Endocrinology.
Home monitoring can improve disease With data provided by the ACSS it was possible to
prevention, facilitate chronic disease management, identify three projects related to home monitoring
including disease self-management, enable already implemented by the Portuguese SNS. In the
personalization of care, and improve productivity in area of Pulmonology, a home monitoring pilot
healthcare, thus allowing a more rational use of program of chronic obstructive pulmonary disease
health services (Queirós et al., 2013; Queirós et al., was developed, funded by the ACSS and supported
2017). In Portugal, according to the Order by Shared Services of the Health Ministry (Serviços
8445/2014 of June the 30th, 2014, the Ministry of Partilhados do Ministério da Saúde - SPMS), the
Health stressed the need to improve the capacity of government agency for eHealth, in partnership with
health monitoring, prevention, detection and five hospitals, covering a total of 75 patients with
treatment of disease in innovative ways, including severe disease (15 per hospital). These patients were
through models of care in order to maintain people selected in each hospital by their attending
379
HEALTHINF 2017 - 10th International Conference on Health Informatics
physician, based on their prior history of chronic late start in one of the hospitals, interim evaluations
obstructive pulmonary disease. This home reveal both a reduction in the number of hospital
monitoring pilot program began in 2013 and was admissions or visits to the urgency services of
implemented in a phased manner in the five patients, more evident in some hospitals.
institutions, namely: Hospital of Faro (Algarve) - More recently, in November 2015, the “Home
beginning in August 2013 (Phase 1); Hospital Pêro Monitoring Plan” was adopted for the definition of
da Covilhã (Cova da Beira) - beginning in March sites for the realization of home monitoring and its
2014; Hospital and University Center of Coimbra - articulation with the rules of the SNS.
beginning in May 2014; Hospital of Viana do In this context, and for the year 2016, it was
Castelo (Alto Minho) - beginning in October 2014 contracted activity for the implementation of other
and Hospital of Portalegre/Elvas (North Alentejo) - two home monitoring pilot programs: a Pilot
beginning in October 2014. Five private companies Program for Home Monitoring of Acute Myocardial
were also involved in the project and were Infarction and a Pilot Program for Chronic Heart
responsible for the installation of the monitoring Failure. Like the pilot program of chronic
devices and their maintenance and for the process of obstructive pulmonary disease, it was planned that
gathering information and transfer it to health the program would be implemented in five hospitals
professionals. Each patient was assigned the covering a group of 75 patients (15 per hospital).
following monitoring devices: blood pressure In the case of the chronic heart failure, and in the
measuring device, pulse oximeter, thermometer, absence of results which can be explained due to the
odometer, device monitoring heart rate and mobile program's newness, it should be noted that from
phone. The clinical teams of the hospitals were conventional remote monitoring to more recent
actively involved in the monitoring of patients strategies, using cardiac devices or implantable
integrated in the program and also in their education. hemodynamic monitors, this is a topic under active
According to SPMS (2014), under this pilot investigation, but, despite previous meta-analyses of
program, patients are monitored in their homes. The small studies have documented the potential benefit
respective data are then analyzed twice a day by the of home monitoring, major randomized clinical trials
Pulmonology teams of involved hospitals, trying to have failed to demonstrate the positive impact of this
reduce the aggravation of their clinical situation, strategy. In addition, data on the value of the latest
thus avoiding new hospital admissions. monitoring devices are contradictory, since some
The objectives and results to be achieved in 2016 studies have documented potential prognosis benefit
within the home monitoring program for chronic while others cannot confirm it (Sousa et al., 2014).
obstructive pulmonary disease include (ACSS, As a result of the literature review carried out in
2016): raising the quality of services provided to scientific databases, the authors found a concrete
citizens, promoting the continuous monitoring of example in Portugal of assessment of a home
their health condition; reducing at least one episode monitoring experience in cardiac patients, with four
of annual hospitalizations as a result of the hospitals involved. This study, of 2013, indicates
deterioration of the patients medical condition; that the introduction of home monitoring has the
reducing at least three episodes of urgency per year; ability to reduce in 25% the costs of monitoring the
reducing at least two episodes of outpatient patients (Costa et al., 2013).
consultation per year, and follow, proactively and To broaden the scope of this research, and to
continuously, the fluctuations of the health identify innovative projects, in general, and home
conditions of each patient. monitoring, in particular, the authors decided to
In terms of preliminary results of this pilot search for information on the web pages of the SNS
program, according to Pereira (2016), these have hospitals. From the 41 organizations identified six
been encouraging, both in terms of satisfaction and refer teleconsultation activities on the following
health indicators, having already been released some areas: Dermatology (referred by three
results of an evaluation carried out in the Local Unit organizations), Pediatric Cardiology (two
of the Alto Minho, namely the reduction in 50% of organizations), Internal Medicine, Endocrinology,
visits of these patients to emergency services, as Rheumatology, Oncology, Neurosurgery, Pediatrics,
well as a decrease in the number of hospitalizations Gynecology, Ophthalmology, Genetics, Imaging and
(70%). Pereira (2016) also states that in these five Pathology (all referred only by one organization).
hospitals, 61% of patients considered the quality of However, no organization mentions any home
the service as "very good or excellent”. Although the monitoring experiment.
final overall results are not yet available due to the
380
Home Monitoring in Portugal - An Overview on Current Experiences
381
HEALTHINF 2017 - 10th International Conference on Health Informatics
in contracts that were made between the ACSS and INE (2014b). Inquérito à utilização das tecnologias de
the primary healthcare services. This somehow informação e da comunicação nos hospitais 2014.
contradicts the need to direct primary care for the Lisboa: Instituto Nacional de Estatística.
prevention, with a view to achieve further gains in INS (2014). Inquérito nacional de saúde 2014. Available
in:
health outcomes as well as improvements in terms of http://www.insa.pt/sites/INSA/Portugues/ComInf/Noti
efficiency. cias/Documents/2015/Novembro/11INS2014.pdf.
The authors would also like to point out the Mourato, P. (2014). Telemedicina generaliza-se até final
difficulty in getting information related to home do ano. Available in:
monitoring experiences taking place in the SNS, http://www.dn.pt/portugal/acores/interior/telemedicina
from one source, which, from our point of view, -generalizase-ate-final-do-ano-3960209.html.
should be either the ACSS or the SPMS. In the Noronha, N. (2013). Rede de telemedicina entre Portugal e
author’s point of view, if this information is not PALOP avança em 2014. Available in:
http://lifestyle.sapo.pt/saude/noticias-
someway centralized, the evaluation and subsequent
saude/artigos/rede-de-telemedicina-entre-portugal-e-
dissemination of these experiences will be more palop-avanca-em-2014.
difficult to achieve. Oliveira, T.C., Bayer, S., Gonçalves, L., and Barlow, J.
It should also be noted that it was not possible to (2014). Brief Communication-Telemedicine in
identify evaluation methods with the purpose of, Alentejo. Telemedicine and e-Health. 20 (1)
systematically, evaluating experiences, so that the OPSS (2016). Relatório de Primavera 2016 - Saúde:
decisions can be based on accurate information, it Procuram-se novos caminhos. Observatório Português
can be possible to learn from mistakes as well as to dos Sistemas de Saúde. Available in:
innovate by sharing and replicating successful http://www.opss.pt/node/488.
Pereira, J. (2016). Telemedicina em Portugal.
experiences, although this is one of the EU
NewsPharma MyPneumologia. Available in:
guidelines for the eHealth Action Plan 2012-2020 http://www.mypneumologia.pt/entrevistas/208-
(Commission of the European Union, 2012). telemedicina-em-portugal.html
Pinho, L. (2013). Patient Innovation é uma rede social
para doentes. Jornal Público. Available in:
REFERENCES http://p3.publico.pt/actualidade/ciencia/8400/patient-
innovation-e-uma-rede-social-para-doentes.
Portal da Saúde (2005). Portugal e Espanha implementam
ACSS (2016). Termos de referência para contratualização a Telemedicina no Algarve. Available in:
hospitalar no SNS – Contrato Programa 2016. http://www2.portaldasaude.pt/portal/conteudos/a+saud
Barros, P. P. and Simões, J. D. A. (2007). Health systems e+em+portugal/investigacao+e+desenvolvimento/tele
in transition: Portugal – Health system review. The medicina.htm.
European Observatory on Health Systems and Queirós, A., Carvalho, S., Pavão, J., Da Rocha, N.P.
Policies. (2013). AAL information based services and care
Borja-Santos, R. (2013). Ministério quer que serviços de integration. In HEALTHINF 2013 - Proceedings of the
saúde apostem mais na telemedicina. Jornal Público. International Conference on Health Informatics, pp.
Available in: 403-406. ISBN: 978-989856537-2.
https://www.publico.pt/sociedade/noticia/ministerio- Queirós, A., Pereira, L., Dias, A. and Rocha, N. (2017).
quer-que-servicos-de-saude-apostem-mais-na- Technologies for Ageing in Place to Support Home
telemedicina-1586809. Monitoring of Patients with Chronic Diseases. In
Commission of the European Union (2012). eHealth HEALTHINF 2017 - Proceedings of the International
Action Plan 2012-2020 - Innovative healthcare for the Conference on Health Informatics.
21st century. Saúde 24 (s.d.). Quem somos. Available in:
Consulta do Viajante (2016). Available in: http://www.saude24.pt/PresentationLayer/ctexto_00.as
http://www.consultadoviajante.com/sobre.html. px?local=15.
Costa, P. D., Reis, A. H. and Rodrigues, P. P. (2013). Sousa, C., Leite, S., Lagido, R., Ferreira, L., Silva-
Clinical and economic impact of remote monitoring on Cardoso, J., and Maciel, M.J. (2014). Telemonitoring
the follow-up of patients with implantable electronic in heart failure: A state-of-the-art review. Revista
cardiovascular devices: An observational study. portuguesa de cardiologia, 33(4), pp.229-239.
Telemedicine and e-health, 19(2), pp. 71–80. SPMS (2014). Telemonitorização DPOC. Available in:
Dias, A. (2015). Integração de cuidados de saúde http://spms.min-saude.pt/2014/04/telemonitorizacao-
primários e hospitalares em Portugal: uma avaliação dpoc-2/.
comparativa do modelo de unidade local de saúde WHO (1978). Declaration of Alma-Ata. International
(Tese de Doutoramento). Universidade de Aveiro, Conference on Primary Health Care, Alma-Ata,
Portugal. USSR, 6-12 September 1978.
INE (2014a). Projeções de População Residente 2012-
2060. Lisboa: Instituto Nacional de Estatística.
382
Security And Privacy Issues in Healthcare Monitoring Systems:
A Case Study
Daniel Tolboe Handler, Lotte Hauge, Angelo Spognardi and Nicola Dragoni
DTU Compute, Technical University of Denmark, Richard Petersens Plads, 2800, Kongens Lyngby, Denmark
{dthandler, lotte.l.hauge}@gmail.com, {angsp, ndra}@dtu.dk
Abstract: Security and privacy issues are rarely taken into account in automated systems for monitoring elderly people
in their home, exposing inhabitants to a number of threats they are usually not aware of. As a case study
to expose the major vulnerabilities these systems are exposed to, this paper reviews a generic example of
automated healthcare monitoring system. The security and privacy issues identified in this case study can be
easily generalised and regarded as alarm bells for all the pervasive healthcare professionals.
383
Handler, D., Hauge, L., Spognardi, A. and Dragoni, N.
Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 383-388
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
384
Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study
and these are mostly committed against elder people. come useless, hence the denial of service would be
Since it is limited how much value the elder posses, discovered, since the normal behavior sends steady
the major criminals are probably not going after the flow of information, not only when a problem arrives.
elders homes. Due to this we asses the likelihood of Compromise of the system in such way can lead to
this as small, and the technical knowledge a bit higher death or injury of the elderly, or a decrease in feeling
than the inheritor, since the criminals have a network secure.
where they can distribute malicious tools. Traffic Analysis. If the communication flow in
Burglars. Possessions are also of great value to the system is analyzed, it might be possible to know
burglars. Burglars are becoming more organized, whether the elderly is home, is asleep or similar. This
and according to a Danish assurance company they information can be useful to a burglar, who doesn’t
often know what is valuable, and are quick to find want to be disturbed when breaking in.
and take these items. Knowledge of where values are Malware. Malicious software can be used to mod-
kept could be fatal in a burglary, which often takes ify the system, such that it doesn’t fulfill the intended
short time. According to Danish police statistic over purpose. This can be used to make denial of service
criminal charges thefts happens more than 20 times as or man-in-the-middle attacks. Additionally malware
much as robberies, which indicates that burglars tries can be used for simple traffic analysis as well.
to avoid people when breaking in. Danish assurance Social Engineering. Attacking the human directly
companies also advice their costumers to make their instead of the system has plenty of functions. It can
home look inhabited when away, which includes not be used to get access to the barebone computer or the
stating their vacation on Facebook (Alka Ensurance, sink to install malware, or it can be used to locate
2013). This indicates that knowledge of location and the sensors of the network. Elderly people are more
activities can have a large impact for burglars when vulnerable to social engineering than younger people
choosing a place to break in. We asses the likelihood (Lahtiranta and Kimppa, 2006), hence it is a obvious
of a burglar as high when the burglars are defined to attack vector for the criminals.
having little technical knowledge (see Fig. 2). Fig. 3 resumes the relations between threats at-
tacks and attackers we have above detailed.
Attacks. We have identified five types of attack,
which are considered in this paper. These are cho-
sen because they show how serious and diverse can
be the attacks available for this types of systems.
Man in the Middle. Man-in-the-Middle (MITM)
is an attack type where the attacker relay and possi-
bly modify or permutate the communication between
two parties (Erickson, 2008). If the attacker is capa-
ble of intercepting or modifying the communication
into or out of the house, he will be capable of pre-
venting critical system updates, and prevent critical Figure 3: Threat model for a health monitoring system,
information of going of the house. Additionally is a linking assets to the different threats, attacks and attackers.
man in the middle capable of sending fake messages,
stating that the elderly has fallen, hence summon the Vulnerabilities. The attackers can exploit several
health care company to assist the elderly without rea- vulnerabilities in order to realize the above attacks on
son. If the health care system uses cameras to monitor the assets, that can be related to the different protocols
the elderly, these pictures can be intercepted, and used or to the human being, as the social engineering-based
either for blackmailing the elderly or for locating pos- attacks. The considered vulnerabilities are discussed
session of value in the home of the elderly. in great detail in the following Section 4.
Denial of Service. If the health care systems are
targeted by a successful denial of service attack, it
will have severe consequences. All three health mon- 4 SECURITY AND PROTOCOLS
itoring systems rely on sending information out of the
house, if the user has fallen or anomalies is detected. This Section addresses some security issues and
If a denial of service attack prevents this, the whole vulnerabilities that occur when implementing the sys-
system is compromised. The environmental sensor tem. The network protocol used in the environmental
network relies on communication between the sensors sensor network is ZigBee. This Section reviews how
and the sink. If this is prevented the system will be- MITM attacks, Denial of Service (DOS) attacks,
385
HEALTHINF 2017 - 10th International Conference on Health Informatics
and traffic analysis can occur. Then, we generically ing attacks are phishing, elicitation and simple phone
describe how malware attacks and social engineering calls, where the attacker pretends to be someone else
can occur. We use the acquired information to (e.g. the IT department) (Hadnagy, 2011). According
provide a risk assessment of the system. to Danmarks Statistik3 the average age of the victims
of trick theft (which can be assimilated to social en-
ZigBee. ZigBee is widely used in pervasive com- gineering) is 75 years. It is important to keep social
puting due to its low bandwidth, low cost, and low engineering in mind when implementing the health
power consumption (Stelte and Rodosek, 2013). care systems, where users primarily are elders. It is
Our vulnerability analysis is based on KillerBee2 , in impossible to make a comprehensive list of actions to
particular on its zbtumbler tool, which detects active prevent social engineering, however some recommen-
ZigBee networks, records and display information dations can be given:
about the found devices. This makes it easy to detect • Make sure the user of the system (the elderly peo-
whether or not ZigBee is in use. ple) gets information about: system updates, visits
from technicians, who in call, if in doubt.
MITM Attacks. zbreplay lounges a replay attack,
which is countered in (Stelte and Rodosek, 2013). • As far as possible use technicians the user knows,
Another MITM attack is explained in (Choi et al., or send a known employee from the health care
2013) and exploits a vulnerability in the key distri- organization together with the technician.
bution. In ZigBee the key is occasionally updated • If possible configure the system, such that the el-
over the air in standard mode, which makes this at- der doesn’t have to know passwords, etc., such
tack quite realistic. The counter measures proposed that a social engineer cannot trick the password
involve using public key encryption instead of sym- from the elder.
metric encryption. A greater modification is needed,
Attackers. Based on the analyses in Sections 3 and
and public key encryption.
4 we will now define which attackers who are able to
DOS Attacks. zbassocflood uses a vulnerability in
carry out which attacks:
ZigBee’s association method for new nodes joining
Inheritors. The computationally skills of the in-
the network. This floods the coordinator node, creat-
heritors is limited according to our description in sec-
ing denial of service from the coordinator note, which
tion Section 3. Since the assets the inheritors are tar-
is the sink of the sensor network. A counter measure
geting are the health and life of the elderly, denial of
for this problem has been proposed in (Stelte and Ro-
service attack is their only obvious attack vector. Mal-
dosek, 2013), by filtering the incoming traffic.
ware to perform these attacks are considered to hard
Traffic Analysis. zbsniff is a tool that sniffs and
computationally for the inheritors to do, hence inheri-
analyses the network traffic, thus making network-
tors rely on jamming equipment or similar to perform
analysis easy to do. This is very difficult to prevent,
the attack.
due to how easy ZigBee is to detect.
Criminals. Social engineering is the first and most
obvious option of the criminals. Since their target
Malware. Unintended, malicious software is a prob-
is to blackmail the elderly, a lot of information is
lem in all the communication technologies described
needed. This information can be gathered by man-
above. If an attacker is able to inject malware into
in-the-middle attacks or traffic analysis. Malware is
the system, the attacker will be able to compromise
an option for these attacks.
the whole system. Injection of the malware can be
Burglars. The location of the elderly is the main
done by physically plugging in the malware (e.g. by
concern of the burglar. Traffic analysis is a good tool
a USB-stick) or using social engineering to get into
for locating the elderly. Man-in-the-middle attacks
the house of the system. Alternatively is it possible to
can be used to intercept pictures of the home of the
access a wireless router, and through this get access
elderly to locate possessions of value, such that the
to a computer to inject the malware on. A firewall
burglar knows where to look. Malware is one way to
and a strong security on the wireless network would
conduct a traffic analysis or a man in the middle at-
be a countermeasure to this.
tack, however it is difficult for the burglar to to able to
plant the malware in the system.
Social Engineering. The last attack vector we ad-
dress is social engineering, covering actions where the
human is the target of the attack, rather than the sys-
tem (Bellovin, 2015). Examples of social engineer-
2 https://github.com/riverloopsec/killerbee 3 http://www.dst.dk/da/presse/Pressemeddelelser/2002
386
Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study
4.1 Risk Assessment probability score multiplied by the value score. This
reveals a new assessment scale from 1 to 25. Since
As a final evaluation of the above analysis, having de- we do not get above 9 in our assessment we have only
fined the risks and threats of the systems in Section 3 colored the scale from 1 to 9, introducing dark green
and the vulnerabilities of the system in the above sec- as better than green, dark red as worse than red, and
tions, we can propose an overview of the five differ- brown as worst in order to easily distinguish between
ent attack vectors in the system of the considered case the risks. This is justifiable since everything above 10
study. We start considering easiness and availability could cause serious health problems because of the
of performing the attack, proposing a score for each sensitive subject of health care is, taking care of the
attack vector. The final outcome is shown in Fig. 4, already weakened citizens.
where, again, we used a scale from 1 to 5, where 1
means very low risk and 5 means very high risk. It is
quite clear that the proposed system is most vulnera-
ble to traffic analysis, as well as the social engineer-
ing, even if this is a more general problem, not only
related to the specific system.
387
HEALTHINF 2017 - 10th International Conference on Health Informatics
Purpose Specification. It is important that the groups of attackers, who could compromise the health
collected data is used only for its purpose. If the data monitoring system. Moreover, we have raised some
is intended to be used for new purposes it should be privacy issues to address when people are monitored
accepted by the user beforehand. If the user is unable in their own home. Due to the fact that personal data
to make that decision, it should be clear who can is transmitted and stored on external servers, it should
vouch for the decision (children or other next-of-kin). be stated who can access the data and who can be held
accountable if data is lost or leaked.
Collection Limitation and Data Minimisation. The Our major contribution has been the identification
stored data should be limited to a minimum. Exam- of the burglar threat, which could be very prominent
ple: there is no need for storing fall detection data, if one healthcare system is used in large scale, be-
as long as the user hasn’t fallen. It is important to cause traffic analysis is not something a communica-
inform the user of the amount of stored data and how tion protocol can secure, the defence needs to be im-
long time the data is stored. plemented as a part of what is communicated, which
is easy to oversee by the developer.
Use Limitation. The collection of health data is very The aim of the paper is to raise the levels of aware-
personal information for the user, and it is important ness and understanding of the cyber risks related to
that the integrity of the data is ensured, and that the home monitoring systems. The hope is that the issues
data in no situation is made available to other than identified in this case study will be regarded as alarm
authorized users of the system. bells for all the pervasive healthcare sector.
388
A Disciplined Innovation Approach to Health Technology Solutions
Abstract: Despite the potential of innovation-driven healthcare technology services to increase the quality,
accessibility and quality of care, the realization and success of such promise has yet to be achieved. This
prompted us to explore the barriers towards success for healthcare software companies and examine what
frameworks are employed across industry to support their growth in the digital healthcare market. As part of
a three-phase study, this article reports on the first phase – to synthesize the literature on the readiness
factors for healthcare technology companies. The findings of this research will guide our second phase of
this research in surveying industry healthcare software companies. In so doing, we can establish readiness
factors for healthcare software companies with a view to offering a more structured and disciplined
approach to healthcare innovation.
389
Carroll, N. and Richardson, I.
A Disciplined Innovation Approach to Health Technology Solutions.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 389-395
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
390
A Disciplined Innovation Approach to Health Technology Solutions
391
HEALTHINF 2017 - 10th International Conference on Health Informatics
5. Scaling and stretching. integrate this with business activity rather than
isolated processes. This enables us to develop an
Thus, we have identified that there is a natural
innovation model and identify the guiding principles
evolutionary process in the innovation process. This
that are grounded in organizational experience –
process requires an organization to move between
documented throughout literature (phase 1 of our
specific maturity stages of innovation. Maturity
research, as presented in this paper) and captured by
phases are well documented throughout the literature
surveying industry experiences (phase 2 of our
in CMM but may need to be tailored within an
research, future work). Weiner (2009) describes how
innovation context and more specifically, within a
organizational readiness is “considered a critical
health-tech context. For example, Carroll and Helfert
precursor to the successful implementation of
(2015) explain how the traditional view of the
complex changes in healthcare settings”. Weiner
organizational environment raises concerns
also cautions “most publicly available instruments
regarding the mismatch in the methods used to assess
for measuring organizational readiness for change
business value and understanding service process
exhibit limited evidence of reliability or validity” –
maturity. They demonstrate this by unpacking the
hence the motivation for this research.
nature of service capabilities that allows us to
In the case of healthcare software companies,
understand the primary components of value co-
innovation drives organizational changes to meet
creation and their contribution towards service
new market demands. To ensure that innovation can
maturity within an innovation environment to access
be successful, metrics must be established to drive
organizational readiness. This offers a suitable lens
such change. Thus, OCM may be described as an
to view a disciplined approach to innovation that can
approach to transition an organization from their
be easily adopted by SMEs in health-tech. We also
current state to a new desired state. This involves the
need to examine how organizational readiness aligns
integration and alignment of people, processes,
with innovation capabilities.
culture and strategy to innovate.
Before OCM can be successfully implemented,
5.2 Organizational Readiness managers must clearly evaluate readiness for change.
Armenakis et al. (1993) describes readiness in terms
Throughout the literature, organizational readiness is of the organizational members’ beliefs, attitudes, and
often associated with organizational change intentions. Thus, there are critical elements of
management (OCM) (Armenakis et al. 1993; change agents and social dynamics that influence
Weiner, 2009). Change is a critical factor for organizational readiness process which may
organizational readiness and is a multi-level, multi- contribute towards the success of healthcare software
faceted construct which healthcare technologies innovation. Identifying and measuring these
often face to introduce technology innovation. In elements provides a benchmark on the current
most cases, such change refers to organizational organizational state compares with their ideal state to
members’ shared resolve to commit towards a derisk healthcare software innovation. We capture all
change in practice and a collective ability to improve of these factors of CMM and OCM to present our
organizational performance. Thus, organizational Disciplined Innovation Model for health-tech SMEs.
readiness for change varies as a function of how
much organizational members value the change, e.g.
within a hospital context.
Value of change must be weighted up against the 6 DISCIPLINED INNOVATION
risk (e.g. cost and investment of resources)
associated with innovation. According to Weiner Migrating from the current state to the future state of
(2009) there are three key determinants of change an organization requires a number of key stages to
implementation capability: task demands, resource embrace an innovation culture to drive a specific
availability, and situational factors. We argue that strategy and improve their competitiveness. This
innovation capabilities are a fourth key determinant enables organizational performance to achieve the
of organizational readiness – which needs to be desired business goals. Therefore, innovation is not a
calculated to assess the impact of innovation on soft or vague construct, but rather, a critical process
organizational readiness. We explain that innovation to drive organizational performance. Why then is the
is the process of introducing new ideas, devices, or process of innovation less defined in terms of
methods to bring about some change. organizational readiness and process flow
We can begin to uncover the key enablers of measurement? Where are the formal process models
innovation by taking a holistic view of change and to guide SMEs through the innovation process to
392
A Disciplined Innovation Approach to Health Technology Solutions
Figure 1: Disciplined Innovation Model.
393
HEALTHINF 2017 - 10th International Conference on Health Informatics
394
A Disciplined Innovation Approach to Health Technology Solutions
395
Data Format for Storing ANT+ Sensors Data
Keywords: ANT+, NIX, Sensor, Data/metadata Storage, EEGBase, Data Format, eHealth.
Abstract: Medical treatment of sudden and especially chronic diseases has become more expensive. People suffering
from a variety of diseases had been traditionally treated in hospitals for a long time. Fortunately, the current
situation has been changing also thanks to relatively cheap body sensors and development of systems for
home treatment. It brings inconsiderable cost savings and improves patients’ comfort. On the other hand,
it puts demands on the used technical infrastructure and home treatment system developers who must solve
integration of different systems. A crucial point is a definition of unified data formats facilitating transfer and
storage of data to/in remote databases. There are standards and APIs such as Zigbee, Bluetooth low energy or
ANT+ that define a protocol for data transfer. However, they do not define a suitable format for long term data
storing. In this paper, data coming from ANT+ sensors have been studied and metadata related to all kinds of
body sensors and raw data and metadata specific to individual sensors have been defined. Then a framework
organizing data and metadata obtained from ANT+ sensors into an open and general data format suitable for
long term storage of sensor data is introduced. Finally, a sample use-case showing the transfer of data from
a sensor into a data storage is presented.
396
Ježek, P. and Mouček, R.
Data Format for Storing ANT+ Sensors Data.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 396-400
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Data Format for Storing ANT+ Sensors Data
397
HEALTHINF 2017 - 10th International Conference on Health Informatics
Active,
Basal
Metabolic
Rate Stride
Body Count
fat Calories
Muscle
Mass
Weight Stride,
Capa- Scale Speed,
bilities Dis-
Satu- Hydra- Speed
tion tance
rated
Hemo- Bone
globin Mass
Torque
Muscle Speed
Oxygen ANT+ device Distance
name, ANT+
Hemo- Mon- device status,
globin itor ANT+ device
Con- number,
cen- Torque
Battery status,
tration Heart Bicykle Cadence
Manufacturer
Rate identification, power
Heart Manufacturer
Beat specific data,
Count ANT+ signal Torque
strength, Effective-
Product ness
Heart information and
Morning Latest
Rate /
Pedal
Smooth- Speed
Time Mon- evening Heart Event
ness
of Pre- itor Rate Time
vious
Bicycle
Heart Speed Speed
Beat Sensor Cumu-
Mean and lative
Ar- Blood Cadence Wheel
Last terial Revolu-
Heart Pres-
tions
Beat sure Systolic
Cadence Stopped
Sensor flag
Time-
stamp
Diastolic
Latest
Cadence
Event
Cumu- Time
lative
Stopped Pedal
flag Revolu-
tions
398
Data Format for Storing ANT+ Sensors Data
399
HEALTHINF 2017 - 10th International Conference on Health Informatics
transformation of data using the Bluetooth low energy data and metadata. Front. Neuroinform. Conference
standard into the NIX format as well. Abstract: Neuroinformatics 2014.
Surie, D., Laguionie, O., and Pederson, T. (2008). Wire-
less sensor networking of everyday objects in a smart
home environment. In Intelligent Sensors, Sensor
ACKNOWLEDGEMENTS Networks and Information Processing, 2008. ISSNIP
2008. International Conference on, pages 189–194.
This publication was supported by the project Teeters, J. L., Benda, J., Davison, A. P., Eglen, S., Ger-
LO1506 of the Czech Ministry of Education, Youth hard, S., Gerkin, R. C., Grewe, J., Harris, K., Jackson,
T., Moucek, R., Pröpper, R., Sessions, H. L., Smith,
and Sports under the program NPU I. L. S., Sobolev, A., Sommer, F. T., Stoewer, A., and
Wachtler, T. (2013). Considerations for developing
a standard for storing electrophysiology data in hdf5.
Frontiers in Neuroinformatics, (69).
REFERENCES Yuriyama, M. and Kushida, T. (2010). Sensor-cloud infras-
tructure - physical sensor management with virtual-
Bjaalie, J. G. and Grillner, S. (2007). Global neuroinformat- ized sensors on cloud computing. In Network-Based
ics: the International Neuroinformatics Coordinating Information Systems (NBiS), 2010 13th International
Facility. J Neurosci, 27(14):3613–5. Conference on, pages 1–8.
Bui, A. L., Horwich, T. B., and Fonarow, G. C. (2011). Epi- Zaloker, J. (2014). Ant/ant+. Arrow M2M representative.
demiology and risk profile of heart failure. Nature
Zehl, L., Denker, M., Stoewer, A., Jaillet, F., Brochier, T.,
Reviews Cardiology, 8(1):30–41.
Riehle, A., Wachtler, T., and Grün, S. (2014). Han-
Davison, A. P., Brizzi, T., Guarino, D., Manette, O. F., dling complex metadata in neurophysiological exper-
Monier, C., Sadoc, G., and Frégnac, Y. (2013). iments. Frontiers in Neuroinformatics, (29).
Helmholtz: a customizable framework for neurophys-
iology data management. Frontiers in Neuroinformat-
ics, (25).
Farahani, S. (2008). ZigBee Wireless Networks and
Transceivers. Newnes, Newton, MA, USA.
Grewe, J., Wachtler, T., and Benda, J. (2011). A bottom-up
approach to data annotation in neurophysiology. Fron-
tiers in Neuroinformatics, 5(16).
HDF5 Group (2013). Hierarchical data format.
http://www.hdfgroup.org/HDF5/.
Heydon, R. (2012). Bluetooth low energy: the developer’s
handbook. Prentice Hall.
Innovations, D. (2013). Ant message protocol and usage.
Jezek, P. and Moucek, R. (2012). SYSTEM FOR
EEG/ERP DATA AND METADATA STORAGE
AND MANAGEMENT. NEURAL NETWORK
WORLD, 22(3):277–290.
Kyriacou, E., Pattichis, C., and Pattichis, M. (2009). An
overview of recent health care support systems for
eemergency and mhealth applications. In Engineering
in Medicine and Biology Society, 2009. EMBC 2009.
Annual International Conference of the IEEE, pages
1246–1249.
Le Franc, Y., Gonzalez, D., Mylyanyk, I., Grewe, J., Jezek,
P., Moucek, R., and Wachtler, T. (2014). Mobile meta-
data: bringing neuroinformatics tools to the bench.
Frontiers in Neuroinformatics, (53).
Mehmood, N. Q., Culmone, R., and Mostarda, L. (2014).
An ontology driven software framework for the
healthcare applications based on ant+ protocol. In
Advanced Information Networking and Applications
Workshops (WAINA), 2014 28th International Confer-
ence on, pages 245–250. IEEE.
Sheth, A., Henson, C., and Sahoo, S. (2008). Semantic sen-
sor web. Internet Computing, IEEE, 12(4):78–83.
Stoewer, A., Kellner, C., Benda, J., Wachtler, T., and Grewe,
J. (2014). File format and library for neuroscience
400
Towards a Multi-level Approach for the Maintenance of Semantic
Annotations
Abstract: Semantic annotations are often used to enrich documents as clinical trials and electronic health records. How-
ever, the usability of these annotations tends to decrease over time due to the evolution of the domain on-
tologies. The maintenance of these annotations is critical for tools that exploit them (e.g., search engines and
decision support systems) in order to assure an acceptable level of performance. Despite the recent advances
in ontology evolution systems, the maintenance of semantic annotations remains an open problem. In this pa-
per, we introduce, based on previous experiments, the main components of a multi-level approach towards the
automatic maintenance of semantic annotations. We further provide examples for strengthening our proposal.
401
Cardoso, S., Reynaud-Delaître, C., Silveira, M., Lin, Y-C., Groß, A., Rahm, E. and Pruski, C.
Towards a Multi-level Approach for the Maintenance of Semantic Annotations.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 401-406
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
Park et al., 2011; Frost and Moore, 2014). This is an annotation within an instance item (o f f set) since
mostly done based on reasoning techniques which items can cover several concepts. The o f f set can be
rely of the logic formalism of the KOS. However, useful, e.g. to link concepts from different versions
as medical KOS are expressed using lightweight de- with the same part of an item. We further consider the
scription logic, these technique must be adapted. semantic relationship between a KOS concept and an
The literature review highlights that there is no item or the annotated part of an item. For instance,
annotation maintenance/adaptation framework able one item can be annotated as equivalent to a concept,
to cope with the specificity of the medical domain more/less specific, partial match, etc. The semantic
e.g., size of the KOS, amount of annotations. In type of an annotation is useful to update outdated an-
this paper we discuss the foundation of a (semi- notations. For instance, instead of removing an im-
)automatic approach to manage semantic annotations pacted annotation after concept deletion, one could
when their underlying KOS evolve over time without preserve the annotated item by linking it to the super-
re-annotating the documents. We further justify our class of the removed concept and changing its seman-
ideas based on previous experiments and examples. tic type to “less specific”. As additional provenance
We structure the remainder of this paper as fol- information, our annotation model includes an ele-
lows: In Section 2 we define the annotation model ment to indicate which concept attribute (e.g., title,
used throughout this paper. Section 3 introduces our synonym, preferred terms, etc.) has mainly been used
ideas towards the (semi-)automatic maintenance of to produce an annotation. This can be valuable dur-
semantic annotations. In Section 4 we conclude the ing the maintenance process, for example, to decide
paper by outlining future work. whether a basic attribute change is relevant and might
entail an annotation modification.
2 ANNOTATION MODEL
3 FOUNDATION FOR SEMANTIC
The development of novel annotation maintenance ANNOTATION MAINTENANCE
approaches requires an appropriate annotation model
covering evolution and quality aspects for annota- As discussed in Section 1, our long term objective
tions. We refer to our previously described annota- is to design a (semi-)automatic approach for main-
tion model (Groß et al., 2012; Cardoso et al., 2016) taining semantic annotations valid over time if the
and give a brief overview of the main aspects. underlying KOS is evolving without a complete re-
A single annotation is defined as a = (i, c, {q}) annotation of the document and by guaranteeing a
where an instance item i ∈ Iu is annotated with an on- high quality in the annotation after maintenance. We
tology concept c ∈ ONv , and a set of quality indicators have analyzed the evolution of several KOS of the
{q} ∈ Q. An instance might be an electronic health medical domain and we identified the behavior of an-
record (EHR) or a question item from a case report notations under different scenarios. We rely on these
form (CRFs) as used within clinical trials. In general, findings to derive different aspects to take into con-
a concept can be used to annotate many items and an sideration for the maintaining semantic annotations.
item might be annotated with several concepts. Dif- It can be seen as a multi-level approach that can be
ferent quality indicators can be used to retain qual- split according to inputs, process and outputs. It al-
ity, reliability and provenance information for each lows us to optimize the annotation maintenance task
annotation, e.g. by attaching numerical confidence by considering at each step more information of dif-
values, categorical ratings or evidence codes (Groß ferent nature to maintain annotation that remain in-
et al., 2009). Note that the quality of automatically valid after the previous step.
generated annotations can vary significantly depend-
ing on the used methods, tools and their configura- 3.1 Maintenance Process
tions (Funk et al., 2014).
Both, instance data and ontologies, underlie con- The different maintenance processes we have identi-
tinuous changes. Hence, we denote Iu as an instance fied consist in: i) Automatically detecting inconsistent
in the version u and ONv is an ontology in the ver- annotations caused by the evolution of the underlying
sion v. In this proposition paper, we focus on main- KOS; ii) Using information gained from the evolution
taining annotations due to evolution of ontology. We of the KOS only to adapt impacted annotations; iii)
include further elements in the annotation model to Using information of external KOS to maintain anno-
better trace KOS changes and to correctly update the tations that could not be maintained by considering
annotations. For instance, we retain the position of local resource; iv) Using change patterns to finalize
402
Towards a Multi-level Approach for the Maintenance of Semantic Annotations
Correlate
Set of annotations, Set of impacted Stable Identification of
ontology changes +
set of ontology Annotation annotations invalid annotations
annotation changes
changes
Set of classes, Apply rules in local Annotations for Corrected Annotation correction:
rules, set of resource refinement annotations Ontology change rules
ontology changes
Identification of
invalid annotations
Find annotations that
might be impacted by
the KOS evolution
¾ Ontology change rules
Ontology change rules Annotation: ࢙ࢋࢋࢠࢍ ݐ݁ܿ݊ܥǣ ૠૡǤ ૢ ܯܥͻܦܥܫ՜ ͲͲʹ ݁ݐ݈݁ݏܾ ʹͲͲ because a split
¾ Rules: ݁ܽ ݊݅ݐݑ݈ݒ ǡ ܽାଵ ՜
୧ ǡ
ାଵ ܿ ܿ݅ݐ݊ܽ݉݁ܵ݁݉ܽܵݏ݅ ٿ ǡ ܿାଵ ǡ ݕ݃݁ݐܽݎݐݏ
Apply formal heuristics Action: ࢎࢇࢍࢋ̴̴ࢉࢋ࢚ሺࢇ ǡ ࢇା ሻ
to maintain the 784.9 784.99
annotations using KOS
changes
External resource ¾ External resource knowledge
Annotation: ࢈࢛ࢇ ݐ݁ܿ݊ܥǣ ૠǤ ܯܥͻܦܥܫ՜ ͲͲʹ ݀݁ݒ݉݁ݎͶ ʹͲͲͷ because a ChgAttValue
knowledge
¾ Result in ontology change rules: The annotations were not corrected by rules
Access external resources ¾ Search in external sources:
to retrieve additional
information to maintain the
annotations. These ݐ݁ܿ݊ܥǣ ૠǤ ݉ܽ ܶ݃݊݅՜ ܱܵܰ ܶܥܦܧܯૠૡ
information are validated i.e.: bulimia was found in other ontology and it has a sameAs correlation with the changed concept
using formal heuristics Action: ࡷࢋࢋ̴̴ࢉࢋ࢚ሺࢇ ǡ ࢇା ሻ
307.51 307.51
¾ Level 4
Change patterns ՜
¾ When previous levels have not worked! D055705 SubClassOf ࡰૡૢ
¾ Annotation: ࢎ࢙࢟ࢍࢉ ࢘ࢉࢋ࢙࢙ࢋ࢙ Change Patterns:
Use of change patterns to Action:
identify the correlation ݐ݁ܿ݊ܥǣ ࡰૡૢ ܪܵܧܯ՜ ࢎࢇࢍࢋ̴̴ࢉࢋ࢚ሺࢇ ǡ ࢇା ሻ
ͲͲʹ ݀݁ݒ݉݁ݎͺ ʹͲͲͻ because a ChgAttValue ChangePattern (ܿ ࡰૡૢ ሻ
between concepts over time
and maintain the superClass ሺܽ ሻ ՜ ܱܹ݄݃݊݅ܶܮ Partial Match ܿାଵ D055705
annotations
Rules ՜ ՜ Physiological Processes D010829 D055705
the maintenance and optimize the quality of the set of evolution of the associated KOS. To this end, it
adapted annotations. takes as input a set of annotations and two suc-
• Identification of invalid annotations: It consists cessive versions of the used KOS namely Kn and
in identifying invalid annotations by analyzing the Kn+1 . The identification of concepts that have
403
HEALTHINF 2017 - 10th International Conference on Health Informatics
changed between Kn and Kn+1 can be obtained ing as code 784.09 in ICD-9-CM version 2006 is
using an ontology Diff tool (Hartung et al., 2013; no more valid in 2007. It is the direct consequence
Noy et al., 2002) as well as additional information of the split of concept 784.9 between 2006 and
specifying the type of changes that have affected 2007.
these concepts. As it is the case for ontology map- In the example of Figure 2 the depicted rule
ping adaptation (Groß et al., 2013), such informa- checks if a concept was split. Basically, it speci-
tion plays a key role in the maintenance task be- fies if the concept 784.99 from the new version of
cause it will determine the type of correction to ICD-9-CM was engendered by a split of concept
apply to the annotations in the next levels. For in- and whether it has a label (or an attribute value)
stance, the deletion of a concept attribute can lead which is equal to the same text of the annotation.
to the deletion of annotations but the deletion of It also verifies that the new version of the concept
the same attribute value in the context of a split 784.9 (if it still exists) has no label of concept that
of concept can lead to the migration of the anno- fully match the text of the annotation. As a result,
tation to the evolved version of the concept (i.e. the action to maintain this annotation is to change
the result of the split). It is therefore crucial to the source concept of the annotation to 784.99.
consider not only basic ontological changes (i.e.
• Annotation correction using external resource
addition/deletion of concept) as it is the case in ex-
knowledge: It consists in using information in-
isting approaches for annotation maintenance but
ferred from external knowledge sources to main-
complex changes (i.e. split/merge of concepts)
tain the annotations that could not be corrected
to optimize both the maintenance process and the
using local resources of the previous level. Ac-
quality of the adapted annotations.
tually, in many cases the drift of ontological con-
• Annotation correction using ontology change cepts can be characterized only by considering the
rules: It consists in using information derived semantic relationships provided by other ontolo-
from the set of annotations itself as well as the gies (Pruski et al., 2016). Often labels of con-
data of the Diff between the two KOS versions Kn cept are completely different, from the syntactic
and Kn+1 coming from the previous level to adapt point of view, before and after evolution. There-
the identified invalid annotations. At this level, the fore, considering local resources only does not al-
correction of annotations can be specified in rules low to characterize their evolution and, in turn,
that combine the context of evolution of the KOS cannot be reused for annotation maintenance pur-
and the status of the annotations. Under these con- pose. The example depicted in Figure 2 about the
ditions, the rules must specify the maintenance ac- evolution of the label of concept 307.51 of ICD-
tion to perform. For instance, we observed cases 9-CM “Bulimia” in 2004 to “Bulimia nervosa” in
where an annotation was impacted because in its 2005 shows another use case that requires external
new version the label of concept associated with knowledge source. Applying existing approaches
this particular annotation adopted the plural form. on annotation associated with this concept would
Therefore the corresponding rule can look like: simply lead to the deletion of the annotations. But
“If the label of concept is set to its plural form the consideration of external resource (here map-
then do not change the annotation” pings between ICD-9-CM and SNOMED CT pro-
The type of ontological change contained in the vided by Bioportal) tells that these two terms are
Diff allows to propose more elaborated correction synonyms therefore the annotation can be kept.
rules acting directly on the element of the anno- Nevertheless, the nature of the external knowl-
tation model like the o f f set. For instance, if the edge resources can vary. Whether RDF datasets
attribute used to annotate the text contained in an like BIO2RDF (Belleau et al., 2008) or expres-
EHR is modified (e.g., a new word was added at sive OWL ontologies contained in Bioportal (Noy
the end of the label), then we check if we can find et al., 2009) are considered, the inferred informa-
this modification in the text of the document to tion can be of different quality and can affect the
annotate (e.g., if the new word is also adjacent to quality of the maintenance process.
the old text) by checking the information located • Annotation correction using change patterns:
at the o f f set position. The corresponding rule is: At this stage, information provided by the Diff
“If the label of concept increase and the data lo- and the use of external resources are not suffi-
cated beside the offset of the annotation is equal cient to maintain invalid annotations. The anal-
to the added word then increase the offset” ysis of the morphosyntactic form of concept la-
Another example is depicted in Figure 2. The an- bels can reveal information to take decision about
notation sneezing associated with the concept hav- the maintenance of annotation. This technique has
404
Towards a Multi-level Approach for the Maintenance of Semantic Annotations
already been explored in the context of ontology sidering the quality of the adapted annotations.
mapping adaptation (Dos Reis et al., 2015) but re-
mains less relevant in terms of quality in the re-
sulting maintenance decisions. Change Patterns 4 CONCLUSION
are modifications observed in attribute values of
a concept using linguistic-based features to iden-
We have presented a multi-level approach towards
tify the correlation between concepts over time.
the (semi-)automatic maintenance of the annotations
For instance, a Partial Copy between concepts is
turned invalid after the evolution of their associated
computed if and only if there exists a partial over-
KOS. Our proposal is based on literature review as
lap between words from an attribute present in the
well as experimentations and consists in the progres-
KOS version Kn and an attribute in the new KOS
sive integration of complex information of different
version Kn+1 (i.e., the attribute a0 becomes a1 ).
nature and various sources for correcting invalid se-
For instance, the annotation “Physiologic pro- mantic annotations without re-annotating documents.
cesses”, shown at the bottom of Figure 2 pro- As future work, we will put the stress in the definition
duced using MeSH in period 2008/2009 was re- and validation of such a framework. Since our anno-
moved. This is due to a change in the attribute tation framework will be used to (semi-)automatically
value in the definition of the concept D010829 correct outdated annotations, the used methods will
leading to “Physiological Phenomena”. Assum- need careful evaluation according to the quality of the
ing the following conditions: i) we do not have in- produced results. For future work, we also plan to
formation inside the ontology to handle with this evaluate the different maintenance approaches using
change, ii) the super class from concept D010829 several annotation datasets from the biomedical do-
is Thing iii) external resources do not provide the main such as annotated CRFs or EHR.
necessary information to make decision, the ap-
plication of four change patterns (total copy, total
transfer, partial copy, partial transfer) consider-
ing only the attributes in the same sub-ontology ACKNOWLEDGEMENTS
e.g., the sub classes from concept D010829 allow
to change the concept associated to this annotation The National Research Fund (FNR) of Luxembourg
from D010829 to D055705. and Deutsche Forschungsgemeinschaft (DFG) sup-
port this work under the ELISA research project.
3.2 Output
405
HEALTHINF 2017 - 10th International Conference on Health Informatics
Current status and future challenges. Yearbook of Noy, N. F., Musen, M. A., et al. (2002). Promptdiff:
Medical informatics, 10(1):125–133. A fixed-point algorithm for comparing ontology ver-
Dos Reis, J. C., Dinh, D., Da Silveira, M., Pruski, C., and sions. AAAI/IAAI, 2002:744–750.
Reynaud-Delaı̂tre, C. (2015). Recognizing lexical and Noy, N. F., Shah, N. H., Whetzel, P. L., Dai, B., Dorf, M.,
semantic change patterns in evolving life science on- Griffith, N., Jonquet, C., Rubin, D. L., Storey, M.-A.,
tologies to inform mapping adaptation. Artificial in- Chute, C. G., et al. (2009). Bioportal: ontologies and
telligence in medicine, 63(3):153–170. integrated data resources at the click of a mouse. Nu-
Eilbeck, K., Moore, B., Holt, C., and Yandell, M. (2009). cleic acids research, page gkp440.
Quantitative measures for the management and com- Park, Y. R., Kim, J., Lee, H. W., Yoon, Y. J., and Kim, J. H.
parison of annotated genomes. BMC Bioinformatics, (2011). Gochase-ii: correcting semantic inconsisten-
10(1):67. cies from gene ontology-based annotations for gene
Frost, H. R. and Moore, J. H. (2014). Optimization of gene products. BMC Bioinformatics, 12(1):1–7.
set annotations via entropy minimization over variable Pruski, C., Dos Reis, J. C., and Da Silveira, M. (2016). Cap-
clusters (emvc). Bioinformatics (Oxford, England), turing the relationship between evolving biomedical
30(12):1698–1706. concepts via background knowledge. In the 9th Se-
Funk, C., Baumgartner, W., Garcia, B., Roeder, C., Bada, mantic Web Applications and Tools for Life Sciences
M., Cohen, K. B., Hunter, L. E., and Verspoor, K. International Conference.
(2014). Large-scale biomedical concept recognition: Qin, L. and Atluri, V. (2009). Evaluating the validity of data
an evaluation of current automatic annotators and their instances against ontology evolution over the semantic
parameters. BMC Bioinformatics, 15(1):1–29. web. Information and Software Technology, 51(1):83
Gimenez, F., Xu, J., Liu, Y., Liu, T. T., Beaulieu, C. F., – 97.
Rubin, D. L., and Napel, S. (2012). Automatic anno- Tissaoui, A., Aussenac-Gilles, N., Hernandez, N., and
tation of radiological observations in liver CT images. Laublet, P. (2011). Evonto - joint evolution of on-
In AMIA 2012, American Medical Informatics Asso- tologies and semantic annotations. In Dietz, J., ed-
ciation Annual Symposium, Chicago, Illinois, USA, itor, International Conference on Knowledge Engi-
November 3-7, 2012. neering and Ontology Development (KEOD), Paris,
Groß, A., Dos Reis, J. C., Hartung, M., Pruski, C., and 26/10/2011-29/10/2011, pages 226–231.
Rahm, E. (2013). Semi-automatic adaptation of map- Uren, V., Cimiano, P., Iria, J., Handschuh, S., Vargas-Vera,
pings between life science ontologies. In International M., Motta, E., and Ciravegna, F. (2006). Semantic an-
Conference on Data Integration in the Life Sciences, notation for knowledge management: Requirements
pages 90–104. Springer. and a survey of the state of the art. Web Semantics:
Science, Services and Agents on the World Wide Web,
Groß, A., Hartung, M., Kirsten, T., and Rahm, E. (2009).
4(1):14 – 28.
Estimating the quality of ontology-based annotations
by considering evolutionary changes. In International Yimam, S. M., Biemann, C., Majnaric, L., Šabanović, Š.,
Workshop on Data Integration in the Life Sciences, and Holzinger, A. (2016). An adaptive annotation ap-
pages 71–87. Springer. proach for biomedical entity and relation recognition.
Brain Informatics, 3(3):157–168.
Groß, A., Hartung, M., Prufer, K., Kelso, J., and Rahm, E.
(2012). Impact of ontology evolution on functional Zavalina, O. L., Kizhakkethil, P., Alemneh, D. G., Phillips,
analyses. Bioinformatics, 28(20):2671–2677. M. E., and Tarver, H. (2015). Building a framework of
metadata change to support knowledge management.
Hartung, M., Groß, A., and Rahm, E. (2013). Conto–diff: Journal of Information & Knowledge Manage-
generation of complex evolution mappings for life sci- ment, 14(01):1550005.
ence ontologies. Journal of biomedical informatics,
46(1):15–32.
Hodge, G. (2000). Systems of knowledge organization
for digital libraries: Beyond traditional authority files.
Reports - Descriptive.
Köpke, J. and Eder, J. (2011). Semantic invalidation of an-
notations due to ontology evolution. In Meersman, R.,
Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing,
L., Ooi, B.-C., Damiani, E., Schmidt, D., White, J.,
Hauswirth, M., Hitzler, P., and Mohania, M., editors,
On the Move to Meaningful Internet Systems: OTM
2011, volume 7045 of Lecture Notes in Computer Sci-
ence, pages 763–780. Springer Berlin Heidelberg.
Luong, P.-H. and Dieng-Kuntz, R. (2006). A rule-based
approach for semantic annotation evolution in the
coswem system. In Canadian Semantic Web, vol-
ume 2 of Semantic Web and Beyond, pages 103–120.
Springer US.
Maynard, D., Peters, W., and Sabou, M. (2007). Change
management for metadata evolution.
406
Diabetes Among Children (DAC)
Project - Exploring Opportunities with Support from Mobile Applications in
a Cross Cultural Indo-Swedish Study
Keywords: Diabetes, Indo-Swedish, Global Health, Quality Assurance Systems, Metronics, Open Systems.
Abstract: In this paper we present opportunities and challenges to meet the worldwide challenge of diabetes. Diabetes
has devastating long-term complications that cause very great personal suffering and social costs locally and
globally. The prevalence of diabetes is increasing globally as an epidemic and affects 415 million people
today, which is expected to increase to 642 million in 2040. In this paper we explore possibilities to join in
Indo-Swedish R&D collaboration. We present and motivate the research purpose. Furthermore we present a
research framework for mobile application development between Sweden and India. The scientific framework
is elaborated and this paper ends with specific challenges and further work.
1 INTRODUCTION means risk of death in the short term, if not cared for,
and the high risk of long term complications such as
According to the International Diabetes Federation macrovascular (myocardial infarction, heart failure,
(2015), 415 million in the world have got diabetes and stroke and peripheral arterial insufficiency, if not heal
it is estimated that by 2040, 642 million will be foot ulcers and amputations) and microvascular
diagnosed with diabetes. Probably no other condition (retinopathy / blindness, kidney failure with dialysis
constitutes a challenge to the patient as diabetic, as or transplantation, and nerve problems).
glucose levels is dependent on the content of each Diabetes puts high demands on the individual
meal, and the physical activity before and after that when it comes to individual care, and in the case of
time, all the time, and every day. Level of emotional children it puts higher demands on the family and
stress also affects sugar levels via the hypothalamic- especially the parents. Complications can occur and it
pituitary-adrenals (HPA) cortisol-producing systems is commonly known that this creates difficult health
(Melin, 2015). Too little insulin is a threat in the long conditions and high social costs. Potentially this can
term, due to the risk of complications, and too much be handled with support from not only medical
can lead to serious symptoms, mental and physical science but also the latest developments in mobile
impact, in the worst cases, coma or death within devices and sensor technology. The measurements
minutes-hours. Patients should preferably combine obtained from the close interaction of the mobile
information on food intake, especially the amount of applications with the patients, here the children, and
carbohydrates, and previously scheduled and physical the consequent big data can be used to handle some
activity, and the current stress level, to calculate the of the issues in this area. Given that diabetes in
optimal dose of insulin before each meal, several children is a growing concern all across the world,
times per day. this pilot project aims to look at the development and
Diabetes has two main types. In type 1 patients are use of mobile applications designed specifically for
dependent on insulin injections several times a day, to them. As part of the background motivation for this
survive; in type 2 are many dependent on insulin for study a focus group was conducted in India among
control, and to minimize the risk of complications paediatricians and diabetologists to inquire about the
(Forbes, 2016) (Thunander et al., 2012). Diabetes knowledge and usage of mobile applications for
Diabetes. It was observed that the doctors were aware
407
Lundberg, J., Billore, S. and Axelsson, C.
Diabetes Among Children (DAC) - Project - Exploring Opportunities with Support from Mobile Applications in a Cross Cultural Indo-Swedish Study.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 407-412
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
2 BACKGROUND
In this background we present the situation related to
diabetes from the two countries specific perspectives.
This presented within the three subsections India,
Sweden and motivation for the Indo-Swedish
research study. Figure 1: The Diabeto application. Photo credit:
www.startupexplore.com.
2.1 India
The presence of Diabetes among children is a
growing concern in India. According to a recent
report (The Times of India, 2014) there are almost
70,000 cases of children with Type I and nearly
40,000 cases with type 2 diabetes. Obesity and the
fast food fad is a common factor coupled with the fact
that nearly 68% of urban children do not engage in
regular exercise (type 2). Praveen and Tandon (2016)
discuss the incidences of type II diabetes among
children in India and underline that obesity is the
Figure 2: The synchronisation of the app with the
leading cause of the situation. It is also of concern that glucometer. Photo credit: http://www.medgadget.com/
parents, caretakers and schools emphasise the need 2015/01/diabeto-to-sync-glucometers-with-smartphones-
for a healthy lifestyle among the children so that type video.html.
II incidences can be curbed and brought under
control. One of the possible influencers could be the In the next section, the situation related to diabetes
digital support systems such as mobile technologies. in Sweden is presented.
Forbes, 2016 reports that the mobile penetration is
India has reached nearly a billion subscribers and the 2.2 Sweden
market has the third largest smartphone users in the
world. This opens immense opportunities for using Sweden has the second highest presence of diabetes
the mobile technology for health related benefits. The among children in the world approximately 7-8000
first diabetes app named Diabeto was launched only individuals and 800 are diagnosed every year. But
recently in 2015. This application connects to there are some popularly used applications such as
glucometers of 30 different types and helps to keep Triabetes, a CE marked medical software (iTunes,
track of the sugar levels, insulin levels including Triabetes). Research, development & innovation
Bolus and Basal. Further it keeps the data stored in related to diabetes are ongoing and mature enough
the cloud and presents visual representations of the with rich data material to do further analysis on.
patient’s data for further, more efficient diabetes Different quality assurance systems where devices
management. There is growing awareness about this related to diabetes are included exists. CE markings
application for Diabetes management in India and (Läkemedelsverket, 2016) and other initiatives as for
there is also growing interest among health and example Diabetesappar.se are a collection of apps
technology entrepreneurs to develop more related to diabetes developed in cooperation with the
applications for Diabetes. Swedish health care professionals and Swedish
application providers to facilitate and improve
everyday life for patients and healthcare. Modeling of
408
Diabetes Among Children (DAC) - Project - Exploring Opportunities with Support from Mobile Applications in a Cross Cultural
Indo-Swedish Study
For children and adolescents diagnosed with diabetes As seen from the framework, the research attempts to
lifelong lifestyle changes are inevitable to ensure explore in depth the situation of the children suffering
quality of life. Dietary regulations, sound exercise from Diabetes type I and II in the countries of Sweden
and monitoring as well as medication need to be and India. The research will be done for mainly 2
obtained regularly every day (Barndiabetesfonden, aspect, A: the lifestyle of the children and the
2016). This is an immense task for the young and their requirements that the children have given their health
family who all need to be highly motivated to succeed condition. By requirements it can mean a number of
long term. Cafazzo et al., 2012 have shown that parameters such as access to health and medical
motivation for self-monitoring can increase with the advice, infrastructure support in terms of access to
help of specialised mobile applications. sports and other facilities that can help keep their
It is believed that the experience of healthcare and body healthy and active, emotional support from
researchers Sweden could be used to explore the use families and friends, and access to other children who
of similar applications for the diabetic children in suffer from the same health situation through a
India. An Indo-Swedish cross cultural study of the network or group either online or otherwise where
lifestyles of diabetes among children can provide they and their families could meet and support each
sufficient data and enable a higher level of other. The other parameter is B: systems that support
generalization that can be translated to create more diabetes management in children such as the quality
efficient and open mobile applications for the young of awareness regarding the condition among the
generation. families, schools and local society and the
relationship between them and the local health care
units. Also this will explore the technological support
that children have access to as they themselves want
409
HEALTHINF 2017 - 10th International Conference on Health Informatics
to know more of their health condition and how best By knowing the situation for parameters A and B
they could manage it. For example , the use of mobile described above we can have a list of factors that need
applications that can be used to bring the knowledge to be tested against the presently available
, awareness and management of the diabetes related applications and explore the possibility of including
health situation closer to the children suffering from new ones in them. Further on, the research will take
it as well as making the platform user friendly. the next step of bringing these observations to the
world of entrepreneurship by building a link between
the mobile app developers in the health industry of
Sweden and India. It is believed that since Sweden
Sweden India and India have increasing number of diabetes affected
children in very varied social and cultural settings, the
knowledge created through the study will help
generalise some important human and disease related
elements that could be used on a wider context for
Diabetes management among children on a global
level.
Children
with
Diabetes
type 1 5 SPECIFIC OPPORTUNITIES
and 2
and their
AND CHALLENGES
families
A: Explore B: Explore Novel technology with sensors / actuators, Internet of
needs and support systems Things (IoT), micro sensors and open socio-technical
lifestyle that assist systems, e.g. Internet-of-Things have unique
requiremen diabetes opportunities to produce scientific data on e.g.
ts of the management in
children children diabetic patient's situation occurred. From here, and
suffering 1. Family directly from the electronic medical record can be
from Mobile 2. Schools and models based on real data and large data sets over
Diabetes applications for Society time be developed and on contributing to a more
Diabetes 3. Health Care 4.
management in Technological secure basis for informed decisions in everyday life,
Sweden and support e.g. such as about insulin doses, for patients and
India and mobile apps. caregivers. The second area of this project concerns
possibilities for the so-called Big Data management. Much
collaboration
between information is available today in the electronic
Swedish and medical record, but not available. Output data must
Indian health be retrieved by experts in analysis departments, in e.g.
Excel. Basic facilities required, for example. standard
reports, for everyday recurring purposes. Most
diabetic patients are and will be in developing
Knowledge creation on generalisations
of important human lifestyle related
countries, with type 2 diabetes, with more
parameters that can be included in the sophisticated technology the so-called artificial
technological support system, in this pancreas will not be an option, but there techniques
case mobile applications. that can be used with smart phones are more
accessible. A combination with the automatic
Figure 4: Research framework for mobile application biological data, as pulse rate, as visualized in parallel
development between Sweden and India. with glucose levels and insulin doses, would provide
additional information, e.g. about symptoms
It is known by our initial secondary research on associated with hypoglycaemic events.
the topic that Sweden has been using a number of Hypoglycaemia is still the biggest obstacle to
mobile applications for Diabetes management but the achieving ideal blood glucose control, incl. fear of
situation is not the same for India. It will be hypoglycaemia. Many factors influence the outcome
interesting to further see how the applications in of doses of insulin in diabetes, such as age, sex,
Sweden are customised to children patients if any. duration of diabetes, type of insulin used (short- and
410
Diabetes Among Children (DAC) - Project - Exploring Opportunities with Support from Mobile Applications in a Cross Cultural
Indo-Swedish Study
long-acting types), the patient's body composition, Nearly 70000 children suffer from Diabetes, Available at
physical activity, why automatic data collection via a http://timesofindia.indiatimes.com/life-style/health-fit
"bio-bracelet", which such as Smart Band, and ness/health-news/Nearly-70000-children-suffer-from-
practical visualization of these complex tasks, and diabetes/articleshow/45133397.cms, accessed 26
September 2016
their interactions, both can be helpful for patients and India’s first diabetes app, available at:
their advisers or assistants in clinical settings, and http://timesofindia.indiatimes.com/life-style/health-
provide information to be analysed at the graduate fitness/health-news/Indias-first-diabetes-app-launched-
level, can provide new information that can be to-ease-diabetic-lives/articleshow/49980670.cms,
converted into new clinical counselling. Analyses of accessed 24 September 2016.
data for glucose levels and insulin doses with details India’s mobile subscribers, available at: http://
of HbA1c levels, over time, longitudinally, can www.forbes.com/sites/sariatharia/2016/01/06 india-
provide both new insights into the relationship just-crossed-1-billion-mobile-subscribers- milestone-
and-the-excitements-just-beginning/#783308a55ac2
between glucose variability (i.e., frequency and
http://www.diabetesappar.se/
amplitude of the high and low values) and the level of Barndiabetesfonden, available at http://www.barndiabetes
HbA1c (and over time relation to the development of fonden.se/Om-diabetes/, accessed 28 September 2016
diabetic complications), and in the patterns of glucose http://www.forbes.com/sites/saritharai/2016/01/06/india-
levels, frequency of episodes of hypoglycaemia, just-crossed-1-billion-mobile-subscribers-milestone-
relationships actually taken insulin doses, etc. are not and-the-excitements-just-beginning/#783308a55ac2
available today, and not for larger groups of real http://timesofindia.indiatimes.com/life-style/health-fitness
patients outside of clinical trials, and put them in the /health-news/Indias-first-diabetes-app-launched-to-eas
with bias (s) involved. The complex situation of e-diabetic-lives/articleshow/49980670.cms
diabetes care is a major global challenge (Guariguata https://lakemedelsverket.se/Alla-nyheter/NYHETER-2015
/Medicinska-appar-ska-folja-regelverkets-krav-for-att-
et al., 2014) and is a good example of the area where vara-sakra/
the development and utilization of techniques to https://itunes.apple.com/se/app/triabetes-diabetes-allt-i-ett/
facilitate better target fulfilment can spread easily id657352839?mt=8
benefit both individuals and society (Sundström, https://www.ndr.nu/#/
2016), (Hu et al., 2015), (Lundberg, et al., 2015), Cafazzo, J. A., Casselman, M., Hamming, N., Katzman, D.
(Eriksén, 2015). K., & Palmert, M. R. (2012). Design of a mHealth App
for the self-management of adolescent type 1 diabetes:
a pilot study. Journal of medical Internet
research, 14(3), e70.
6 FUTURE WORK Praveen, P. A., & Tandon, N. Childhood obesity and type 2
diabetes in India. WHO South-East Asia J Public
Collaboration between different expert domains are Health, 5(1), 17-21., 2016
of interest to battle the challenges related to diabetes. https://swediabkids.ndr.nu/
Closer collaboration between stakeholders, with care Marmarelis, V. & Mitsis, G. Data-driven modeling for
diabetes - diagnosis and treatments, Springer Verlag,
institutions and related partners for a healthy lifestyle
2014
among children are desired. Diabeto application
Melin, E., Psychosomatic aspects on diabetes and chronic
pain, Alexithymia, depression and salivary cortisol;
ACKNOWLEDGEMENTS The affect School and Script Analysis Therapy, in
Department of Clinical sciences. 2014, Lund
University, Faculty of Medicine: Lund
To the system-cross organisation at Linnaeus Thunander, M., Torn, C., Petersson, C., Ossiansson, B.,
University giving us this unique opportunity to Fornander, J., Landin-Olsson, M., Levels of C-peptide,
initiate a small scale R&D cooperation. Furthermore body mass index and age, and their usefulness in
to the paediatric clinics, endocrinologists in Växjö classification of diabetes in relation to autoimmunity,
and Kalmar hospitals for support. in adults with newly diagnosed diabetes in Kronoberg,
Sweden. Eur J Endocrinol, 2012. 166(6): p. 1021-9.
Guariguata, L., et al., Global estimates of diabetes
prevalence for 2013 and projections for 2035. Diabetes
REFERENCES Res Clin Pract, 2014. 103(2): p. 137-49.
Sundström, P., Överenskommelse mellan staten och
International Diabetes Federation, About Diabetes, Sveriges Kommuner och Landsting; vision e-hälsa
Available at http://www.idf.org/about-diabetes/facts- 2025 Avdelningen för digitalisering, 2016.
figures, accessed 22 September 2016
411
HEALTHINF 2017 - 10th International Conference on Health Informatics
412
Understanding Users’ Perception on the Trustworthiness of Online
Health Information
Keywords: Information Credibility, Information Trustworthiness, Information Literacy, Youth, Health Information
Seeking.
Abstract: The evaluation of online health information, i.e. its reliability, credibility, trustworthiness, etc., plays a
significant role in the users’ judging and health behaviour change process. Related works haven’t come to a
consensus on the framework of trust formation process. Nor much attention has been paid to one of the most
active groups of online information users, the youth. This study, from the young people’s perspective,
examines the perception and judgment on the trustworthiness towards online health information. To test the
design and reveal deficiencies of the study and procedure before time and resources are expended on large-
scale studies, a pilot study was designed and conducted. Then semi-structured interviews were employed
involving students from two groups: university freshman and the seniors respectively. The preliminary
results cover: the exploration of their health information seeking process, factor analysis towards
trustworthiness of online health information, the perceptions on HON measures and related health
information literacy.
413
Li, S., Yu, B., Liu, J. and Huang, B.
Understanding Users’ Perception on the Trustworthiness of Online Health Information.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 413-417
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
2 METHODS AND MATERIALS was a senior university student who was interviewed
about basic information about online health
The methods of the ongoing work are designed information search and trustworthiness judgement.
including of a pilot study and semi-structured Questions that were not answered as expected were
interviews. Young people’s perception and judgment re-worded or re-scaled; time that taken to complete
towards the trustworthiness of online health the session was recorded to decide whether it is
information are investigated utilizing searching reasonable; ambiguities in questions were identified
experiment and follow-up interviews. Volunteered and clarified.
participants, aged between 18 to 24, were employed Then semi-structured interviews were conducted
in the Peking University (China) to take part in the involving students from two groups: university
investigation. The participants were asked to firstly freshman and the seniors respectively. The recorded
attend 30 minutes long session to search for interviews were transcribed by one the research team
information within a given health field. Each and then crosschecked by another member. The
participant should provide concurrent protocols as preliminary results were analysed utilizing content-
they search the Internet for health information. based analysis that will be discussed in the next
Meanwhile, a numerical scale, from one to ten, will section in greater details.
be provided to them to score the trustworthiness of
the searching results. Then a brief interview is 2.3 Data Analysis
followed to explore the rational on how they allocate
scores for the trustworthiness of each result (Yu, The data collected from both the pilot study and the
2016). interviews were recorded and transcribed with
permission from the participants for further analysis.
2.1 Related Measures One concern is that of contamination of data.
This may arise from either where data from the pilot
Evaluation tools are available to assess online health study are included in the main results or where pilot
information, and previous studies have used generic participants are included in the main study, but new
tools, i.e., HON code, to examine the quality of web- data are collected from these people (van Teijlingen
based healthcare information (Harland, 2007; Hsu and Hundley, 2001). It is believed that
W-C, 2008; Kim, 1999). The Health On the Net contamination is less of a concern in qualitative
Foundation (HON) (www.healthonnet.org) promotes research, where researchers often use some or all of
and guides the deployment of useful and reliable their pilot data as part of the main study. Some have
online health information, and its appropriate and therefore argued that in qualitative approaches
efficient use. The purpose of HON code is to protect separate pilot studies are not necessary (Holloway,
all from incorrect, indeed misleading medical and 1997). Frankland and Bloor (Frankland and Bloor,
health information. With this intention, HON 1999) indicated that piloting provides the qualitative
accredits web sites according to eight ethical researcher with a “clear definition of the focus of the
principles: 1) from which authority the information study” which in turn helps the researcher to
is coming from; 2) what is the purpose of the site; 3) concentrate data collection on a narrow spectrum of
the confidentiality policy; 4) the origin of the projected analytical topics. Therefore, data from the
sources used; 5) the justification about benefits and pilot study was included in the overall analysis.
performance of a specific treatment; 6) the The interpretation and analysis of the data
transparency of the authorship; 7) the transparency employed content-based thematic analysis that
of sponsorship as well as honesty in advertising; 8) involved classifying and coding the content into
editorial policies. The user’s perceptions on those themes. An explanation of the codebook used is as
selected measures are investigated in this study as shown in Table 1, including the code, theme and
well. their corresponding explanations. The main themes
formed from the data include: the health information
2.2 Data Collection seeking process, perception on HON measures,
health information literacy, factor analysis on
The qualitative data are collected from both the pilot trustworthiness etc.
study and interviews. A pilot study was conducted to
reveal deficiencies in the design of the study and
procedure before time and resources are expended
on large-scale studies. The participant approached
414
Understanding Users’ Perception on the Trustworthiness of Online Health Information
3 PRELIMINARY RESULTS
Basing on both related theories and the previous
findings, the preliminary results from the qualitative
data are categorized into the following themes:
Exploration of their health information seeking
process;
Their perception on HON measures and related Figure 1: Health information seeking process.
health information literacy;
Factor analysis towards trustworthiness of 3.2 Perceptions on HON Measures
online health information.
Not very surprisingly, nearly all of the participants
3.1 Health Information Seeking have not heard of the HON code measures
Process previously due to their health information literacy
limitations. On the other hand, the HON code has
As shown in Figure 1, the participant actively seeks been well established in the western world prior its
for health information when a health related issue translation into Chinese languages. Regarding to the
occurred, or they passively received pushed detailed eight measures that forming the HON’s
information from well-known information sources, ethical principles; the authority, the purpose,
such as top websites or official organizations. The confidentiality and the frequency of the occurrence
take-for-granted trust on experts and large public of advertisement could have affected their
hospitals arguably affects young people’s judgement and perception towards the online health
assessment of credibility of online health information’s credibility. Moreover, senior students
information, and excludes other information sources showed capability of more sophisticated information
such as private sectors. literacy and willingness to explore complicated
They tend to believe the health information measures for online health information.
immediately as long as they are from large hospitals
with good reputation (i.e. Three grade hospital in “If I suffer from health problems which I can’t
China), or the online health information were solve with common sense, I must go to the hospital. I
provided by the physicians who have been working don’t trust commercial recommendations.”
in those large hospitals.
“Heavy advertisements are for profit only. They
“The most credible website is hospital website.” may exaggerate the issues.”
415
HEALTHINF 2017 - 10th International Conference on Health Informatics
3.3 Factor Analysis on Trustworthiness “When I browse the information I get from
search engine, all of them are consistent.”
Young people pay more attention to well-known
healthcare providers. They tend to neglect the
content or design of health information. Therefore, 4 DISCUSSION
their take-for-granted trust on the experts affects the
youth’s choices greatly. The preliminary findings from our work is
Figure 2 and Figure 3 summarized the summarized as following:
subdomains of two important factors, “trust” and The participants paid more attention to the
“credibility”, from related studies. trustworthy information providers, i.e. leading
“Trust/trustworthiness” and “credibility” have hospitals, doctors and web editors, which
been identified as two factors that affect each other, contribute to the credibility of health
which therefore confused the formation of information.
trustworthiness towards online health information The take-for-granted trust on experts and large
and the define of those two concepts. Nevertheless, public hospitals arguably affects young
other factors, such as brand, content, verification, people’s assessment of credibility of online
style, design look, authority, expertise, real-world health information, and excludes other
feel, are identified as factors for the youth to decide information sources such as private sectors.
the trustworthiness towards online health The lack of provision of health information
information. from well-known organizations and
consumers’ deficiency in health information
literacy restricts the health information
seeking and utilizing behaviour.
Sillence et al. (2007) noted that the design and
content of information were major impact factors
within the dimension that users utilized to assess the
credibility of online health information. The reason
behind this difference between previous study and
ours will be investigated in future large-scale studies.
In addition, the result of pilot study indicated that
when conducting searching experiment, the task
should be set about a common symptom which
Figure 2: Subdomains of “Trust”. young people are more likely to suffer from. The
active acquisition and passive acquisition should
also be taken into consideration to augment the
research methodologies.
REFERENCES
China Internet Network Information Center, 2016.
Statistical Report on Internet Development in China.<
http://www1.cnnic.cn/IDR/ReportDownloads/201604/
P020160419390562421055.pdf>.
Dobransky, K. Hargittai, E., 2012. Inquiring Minds
Acquiring Wellness: Uses of Online and Offline
Sources for Health Information. Health
Figure 3: Subdomains of “credibility”.
Communication, Vol. 27 No. 4, pp. 331-343.
Everard, A., Galletta, D. F., 2005. How Presentation
“I read these articles carefully because they are Flaws Affect Perceived Site Quality, Trust, and
filtered by editors who should be responsible.” Intention to Purchase from an Online Store. Journal of
Management Information Systems, Vol. 22 No. 3, pp.
“I use Internet to search what the disease is and 55-95.
which hospital and department I should go to. Fogg, B. J. et al, 2003. How Do Users Evaluate the
Credibility of Web Sites? A Study with Over 2,500
416
Understanding Users’ Perception on the Trustworthiness of Online Health Information
417
Making Environments Work for People
A Novel Approach towards Personal Lifestyle Management Informatics
Eleni Kaldoudi
School of Medicine, Democritus University of Thrace, Dragana, Alexandroupoli, Greece
kaldoudi@med.duth.gr
Keywords: eHealth, Personal Health Systems, Healthy Behaviour, Lifestyle Related Disease, Self-engagement,
Self-management.
Abstract: This paper introduces a new paradigm for personalized systems used by the citizen for self-management of
health and disease: using smart technologies to exploit the health potential of surrounding environments and
to support the citizen in decisions related to a healthy lifestyle. This approach proposes meshing the
citizen’s specific needs for healthier behaviours with what is available to meet these needs in the
surrounding environment. Rather than focusing on health monitoring alone, the aim should be to create a
healthy digital envelope – a Healthy Place – around the citizen as they move through their everyday lives.
The implementation of this approach needs to integrate existing systems for health assessment and
environmental predictions; collect personal private data from mobile personal sensors and public data on
health content of the environment; design dynamic testable models of behaviour change, that situate the
individual within their environment; develop advanced analytics for context understanding and situational
awareness that will couple the current goals of the person with what his or her environment can offer; and
create personalized decision support services for behaviour change that exploit the current match between a
person’s needs and the opportunities offered by his or her environment.
418
Kaldoudi, E.
Making Environments Work for People - A Novel Approach towards Personal Lifestyle Management Informatics.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 418-423
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Making Environments Work for People - A Novel Approach towards Personal Lifestyle Management Informatics
any drug treatment (Spruijt-Metz, 2014; Wilson, from the person’s social media presence, including
2014; Williamson, 2005; Li, 2014) attitudes, intention and relations to the community;
During the last decade, different forms of health and (d) via analysis of the above, information on the
care delivery have also been considered, based on motivational and emotional state of the person.
the specific needs of patients with chronic diseases, Public data includes data on healthy aspects of
such as patient empowerment. Environmental resources and activities of a place, incorporating
information as provided by smart cities commerce, retail, leisure, workplace and community
infrastructure has been proposed to augment aspects, or the ambient environment. Aggregating
personal health applications and help citizens choose public data on life contexts can be driven by
wisely their whereabouts in the urban environment stakeholders in commerce, retail, leisure, workplace,
(Solanas, 2014). Furthermore, the WHO, among community who will publish key data; it can also
others, has promoted the idea of preventing disease use participatory sensing approaches.
through healthy environments (Pruss-Ustun, 2006). Major lifestyle related contexts include:
To ensure sustainable healthy behavioural change, Food: the ingredients and calorific content of
we must foster and promote environments that can food items are an obvious and important source
support people in healthier lifestyle habits. of data when considering one’s health. This data
As it is difficult to radically change the can be used in relation to: managing weight,
environments of developed societies, we propose to ensuring an appropriate balance of nutrients is
change how the environment is perceived. This will consumed and coping with food allergies.
be achieved by highlighting, on an individual basis, Additional information includes meal
those aspects of the environment that are most preparation processes, e.g. the type of fat used
conducive to encouraging and maintaining for frying, whether menu items have been in the
personalized healthy behaviours. Thus, the aim is to proximity of nuts and other common allergens.
‘change’ the place around the citizen into a Recreational activities: rich description of
‘perceived’ Healthy Place. For the rest of this activities in terms of their work load, difficulty,
document, therefore, the term Healthy Place is used special requirements, indications and contra-
to refer to a place whose health-related aspects have indications for the healthy person at different
been highlighted by the proposed technological ages and capacities and when suffering from
framework. different health conditions and disease.
Public Transport: with the emergence of ‘Smart
Cities’ and public Open Data there is a growing
3 HEALTHY PLACES CONCEPT tendency for data concerned with transport
routes, stop and station locations, timetables and
For any place of everyday life to turn into a vehicle locations to be publicly available. This
perceived Healthy Place, its objects and concepts data can be used to help with maintaining a
must be semantically described and linked to healthy certain level of exercise and energy
habits and values, thus creating an augmented consumption.
environment for individuals to manage health, Ambient environment: temperature,
lifestyle and disease. To be relevant, this needs to meteorological conditions, noise level, air
relate to the individual’s every day, real world pollution, airborne allergens, etc. pollen counts,
context and be coupled to the personal lifestyle and as well as meteorological conditions can affect
the medical/behavioural goals of the individual in health.
question. Ground medical evidence and health prediction
There are three different types of data that models can serve as the basis on which the current
pertain to this approach: private personal data, environment is analysed for the opportunities it
public data on the ambient surroundings, and health offers and threats it presents for the individual. The
related scientific evidence including predictive goal is to dynamically highlight the most suitable
models and risk assessment (Figure 1). attribute of each environment for the individual and
Private, individual-level data includes: (a) deter from any threats this environment may hold,
personal information on health issues, e.g. based on the needs of each person. Thus, the same
demographics, allergies, risk factors, etc. as environment is presented differently according to the
available from a personal health record; (b) real-time health condition and requirements of each
information on physical activity, location, and individual.
dietary choices; (c) lifestyle related information
419
HEALTHINF 2017 - 10th International Conference on Health Informatics
medicalevidence&
healthpredictivemodels
healthcontent
oftheenvironment
data
interlinking analytics
quantifiedself
mindchange decision
model support
via
personal lifecontextdescriptions&
healthdata participatorysensing
healthylifestyle
virtualcoach
The coupling of public and personal data data. Personal data is nowadays readily available via
projected against a behaviour and behaviour change a variety of commercially available wearable and
model to create personalized recommendation other personal sensors and systems (e.g. personal
services for the citizen via a personal application. health records). However, describing the health
This can virtually coach individuals by supporting: content of the environment may prove challenging.
(a) advanced behaviour and environment awareness; Participatory sensing can be employed to exploit the
(b) self-monitoring, goal setting, and action crowds and their mobile devices to harvest and
planning; and (c) motivational and sustained enrich the information about the environment and
behaviour change. Thus, individuals can explore living spaces (e.g. the noise level and the
personal motives, competences, life goals, temperature of a place, photos of food items for
preferences, social connections, and other internally- optical nutritional recognition, etc.).
driven motivational elements around physical Information a person creates on social networks
activity, healthy eating and healthy behaviours in may prove to be a significant determinant of
general. These can be coupled with opportunities behaviour: We are all individuals who are
offered by the current environment. Social interconnected with other individuals by personal,
intelligence tools can also be used to tap into social, economic and workplace relationships. These
participants’ sense of volition and ownership (as connections facilitate communication, can motivate
opposed to merely external pressure), confidence us to different behaviours, and have the potential to
and competence (as opposed to self-perceptions of support shifts toward healthier lifestyles. Further
unpreparedness and even failure), and positive social research is expected to adapt and develop the
support for their activities and goals. necessary natural language processing, information
retrieval and machine learning methods, combining
data mining with semantic technologies and
4 OPEN RESEARCH ISSUES expertise in social media sentiment analysis.
Data enriching and interlinking is of outmost
The proposed concept of combining health related importance to bring up rich data relationships that
content with personal information to create an would help couple personal health requirements with
optimum perceived Healthy Place for each the opportunities in the environment. Thus, graph
individual can be approached by a modular data repositories (Angles, 2012) are chosen to
architecture as shown in Figure 2. establish the middle layers of the proposed
Starting from top to bottom, data and knowledge architecture: a public one for the health context of
acquisition components acquire personal and public living spaces and a private for the personal
420
Making Environments Work for People - A Novel Approach towards Personal Lifestyle Management Informatics
privatepersonaldata opendata
users sensors social networks
LinkedOpenData
data
sensorsdata dataharvesting
extraction
extraction andenrichment
personal
sentiment harvesting information
application profiling analysis extraction
personal,private LinkedOpenData
LinkedData repository
repository
www,LOD
decisionsupportservices personalized
realbehaviour tracking behaviour & dataanalysis
existing
goalsetting,actionplanning behaviour predictive
motivationalsustained change models
behaviour change visualization
model
integratedservicesplatformtorealizeapersonalperceivedhealthylivingspace
information. Although a lot of work has been put on detailed examination and exploitation of existing
releasing semantically rich Open Data, health and life vocabularies and development of the
contemporary solutions often fall short of fully appropriate Linked Services and service information
exploiting the Semantic Web’s potential (d’Aquin, (Pedrinaci, 2010).
2008). This shortcoming owes mainly to a) the The emergence of social web has led to the
shortage of adequate knowledge acquisition generation of user interaction and preferences traces
mechanisms, b) the lack of an environment-based, that are often distributed, fragmented and detached
life and health related semantically integrated (Rowe, 2009). This limitation not only complicates
approach and c) the slow progress concerning the efforts to gather relevant user information, but also
linkage of user data with the Web of Data. weakens the ties between personal data and the web
Despite the proliferation of semantic web data, of data. However, it fails to safeguard privacy, given
most published data remains semantically poor (e.g. the potential for a determined data-gatherer to
XHTML, XML, CSV files). To leverage this wealth, integrate diverse data sources to form a detailed
research should focus on developing solutions that picture of an individual’s actions and preferences.
enable knowledge acquisition, which can be Concerning the linkage between personal data and
accommodated using different approaches, such as the web of data further research is required to
data and information extraction, and sentiment integrate personal data and web of data through a
analysis. Applications that are based on traditional single services interface, while ensuring the highest
database modelling principles suffer from difficulty level of privacy protection for individuals.
in capturing evolution of the data model, high Support for analysis and visualization of large
software maintenance cost and low reusability. The data sets can in principle be done by aggregation
semantic web achieves the translation of data across performed in either data space (data reduction) or in
boundaries that separate different domains and visual space (visual aggregation). Scalability is a key
overcomes these limitations (Feigenbaum, 2007). challenge in visual analytics as it determines the
Further research is required to define and analyse the ability to process large datasets by means of
model and corresponding ontology/schema to computational overhead as well as appropriate
describe health context of living spaces. This entails rendering techniques. Often, the huge amount of
421
HEALTHINF 2017 - 10th International Conference on Health Informatics
data that must be visualized exceeds the limited complemented by novel privacy preserving consent
number of pixels on a display by several orders of management mechanisms and cryptography enabled
magnitude. Currently existing techniques typically techniques for anonymous and unlikable feedback
focus on a single given data type, e.g., time series or and reward mechanisms to return useful service
text data, so further research is required to address output to the citizen (e.g. a health prediction or
multiple data perspectives simultaneously. personal health status) or reward the citizen for
The wealth of available personal health devices contributing personal data.
and applications, should be amended by novel
applications tracking real-time personalized lifestyle
to deduce the person’s current real behaviour and
how much this deviates from what is a healthy 5 DISCUSSION
behaviour for this person (especially as specified by
the individual in terms of his or her personal In a radical departure from traditional eHealth, this
behavioural goals) and to determine mind changing paper introduces a new paradigm for personalized
actions (i.e., behaviour change through cognitive and systems used by the citizen for self-management of
health and disease: smart technologies based on
emotional determinants). Novel tools are also
existing predictive systems are used to exploit the
required to support individuals to engage with self-
health potential of the surrounding environment and
monitoring, goal setting, personal projects and support the citizen in his/her decisions related to a
coping plans. New motivational and sustained healthy lifestyle. To achieve this, novel research
behaviour change decision support applications should address the following:
should be devised to allow individuals to explore integrate existing predictive systems from
personal motives, competences, life goals, different domains, namely (a) health risk
preferences, social connections, and other internally- assessment models, calculating risks based on
driven motivational elements around physical current health condition; (b) health predictive
activity, healthy eating and healthy behaviours in systems based on environmental factors; (c)
general. behavioural models; and (d) predictive models
A major enabling factor for realizing the of environmental parameters, e.g. weather
personal healthy space via messing public and conditions, air pollution and noise levels;
private health related data lies in the challenge to collect personal data from mobile personal
preserve privacy (Vayena, 2015). Although sensors but also collect data on health content of
healthcare data are customarily anonymised to the environment via citizen participatory
ensure a certain level anonymity (Gkoulalas- sensing;
Divanis, 2014), they remain susceptible to threats design dynamic testable models of behaviour
caused by data linkage (e.g., with publicly available change, that situate the individual within their
data sources) or by background knowledge. Thus, environment and take full account of cognitive,
effective measures for preserving privacy must be social and emotional aspects;
developed (Viceconti, 2015). Also, patient consent develop technology that allows the semantic
description of health-related aspects of an
(and its revocation) is recognized as a major
environment as well as of health-related aspects
limitation in broadly re-using available healthcare
of a person’s behaviour;
datasets for novel big data analytics (Barash, 2015). perform advanced analytics for context
Additionally, the recent agreement on Commission’s understanding and situational awareness that
EU Data Protection Reform (EU Regulation will couple the current goals of the person with
2016/679) recognizes that practices have to respect what the current environment can offer; and
the citizens’ rights to (1) easily access their own deploy personalized recommendation services
data, (2) transfer data among providers; (3) have for behaviour change that, based on
their data deleted when no longer needed; (4) know personalized predictions, exploit the current
when their own data have been hacked. Thus, new match between a person’s needs and the
research is required to extend anonymization opportunities offered by his or her environment.
algorithms to work on a distributed setting, where The goal is to: (a) help citizens manage actively
multiple parties hold different parts of the data that health and eventually adopt and maintain a healthy
cannot or are not willing to share in raw form. behaviour, and thus prevent lifestyle related
develop and validate computationally efficient diseases; and (b) make stakeholders in food,
algorithms for detecting complex events in commerce, retail, leisure, workplace and community
healthcare data streams. This research should also be level aware of the healthy (or non-healthy) aspects
of the goods, opportunities and premises they offer
422
Making Environments Work for People - A Novel Approach towards Personal Lifestyle Management Informatics
to the public and provide them with technology to Rowe, M., 2009. Interlinking distributed social graphs. In
promote what is healthier for each citizen. Linked Data on the Web Workshop, WWW2009.
Health cannot be successfully promoted and Singer, N., 2015. From knowing yourself, to prodding
sustained by health care systems alone – these are yourself, The New York Times, April 19, BU3.
naturally focussed on treatment much more than Solanas, A., Patsakis, C., Conti, M., Vlachos, I.S., Ramos,
prevention. At the same time, changing V., Falcone, F., Postolache, O., Perez-Martinez, P.A.,
Di Pietro, R., Perrea, D.N., Martinz-Balleste, A., 2014.
environments with health-related goals in mind is
Smart Health: A Context-Aware Health Paradigm
extremely difficult – it requires political will and
within Smart Cities. IEEE Comm Mag, 52(8), 74-81.
sometimes costly investments; health is a goal that Spruijt-Metz, D., O’Reilly, G.A., Cook, L., Page, K.A.
needs to be balanced alongside other priorities, such Quinn, C., 2014. Behavioral contributions to the
as prosperity or efficiency. pathogenesis of type 2 diabetes. Curr Diab Rep,
Changing citizens’ awareness of their everyday 14(4), 475.
environment, in the light of their own priorities and Vayena, E., Salathe, M., Madoff, L.C., Brownstain, J.S.,
goals, creates a new possibility for the prevention of 2015. Ethical challenges of big data in public health.
lifestyle related diseases and, indeed, for the co- PLOS Comp Biol, 11(2), e1003904.
production of health and reduction of potential Viceconti, M., Hunter, P., Hose, R., 2015. Big data, big
chronic, life quality reducing and costly health knowledge: big data for personalized healthcare. IEEE
conditions and complications. J Biomed Health Inf, 19(4), 1209-1215.
WHO, 2010. Global status report on non-communicable
Diseases.
Williamson, D.A., Stewart, T.M., 2005. Behavior and
ACKNOWLEDGEMENTS lifestyle: approaches to treatment of obesity. J La State
Med Soc, 157(1), S50-S55.
The concept presented in this paper was inspired Wilson, D.E., van Vlack, T., Schievink, B.P., Doak, E.B.,
mainly by work done in the FP7-ICT project Shane, J.S., Dean, E., 2014. Lifestyle factors in
CARRE (No. 611140), funded by the European hypertension drug research: systematic analysis of
articles in a leading Cochrane report. Int J Hypertens,
Commission
2014, 835716.
REFERENCES
Angles, R., 2012. A comparison of current graph database
models. In 28th International Conference on Data
Engineering Workshops (ICDEW), IEEE, 171-177.
d’Aquin, M., Motta, E., Sabou, M., Angeletou, S.,
Gridinoc. L., Lopez, V., Guidi, D., 2008. Toward a
new generation of semantic web applications. IEEE
Intelligent Systems, 23(3), 20-28.
Feigenbaum, L., Herman, I., Hongsermeier, T., Neumann,
E., Stephens, S., 2007. The semantic web in action.
Scientific American, 297(6), 90–97.
Gkoulalas-Divanis, A., Loukides, G., Sun, J., 2014.
Publishing data from electronic health records while
preserving privacy: a survey of algorithms. J Biomed
Inf, 50, 4-19.
Li, D., 2014. Effect of the vegetarian diet on non-
communicable diseases. J Sci Food Agric, 94(2), 169-
173.
Pedrinaci, C., Liu, D., Maleshkova, M., Lambert, D.,
Kopecky, J., Domingue, J., 2010. iServe: a linked
services publishing platform. In CEUR workshop
Proceedings, 596, 10.
Prüss-Üstün, A., Wolf, J., Corvalan, C., Bos, R., Neira,
M., 2006. Preventing disease through healthy
environments. World Health Organization WHO,
Geneva.
423
Health Information Systems: Background and Trends of
Development Worldwide and in Russia
Keywords: Medical Informatics, Health Information Systems (HIS), Special Aspects of Development, Opportunities
and Challenges, Trends.
Abstract: The paper is to study the background, opportunities, challenges, and trends of development of health
information systems in Russia and worldwide. There are two main types of HIS: electronic medical records
and clinical decision support. The key areas of their application include patient management, clinical
management, diagnostics and treatment, research and education. The development of economic efficiency
of HIS is considered to be one of the future research field in medical informatics.
424
Vaganova, E., Ishchuk, T., Zemtsov, A. and Zhdanov, D.
Health Information Systems: Background and Trends of Development Worldwide and in Russia.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 424-428
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Health Information Systems: Background and Trends of Development Worldwide and in Russia
1973 - in the Netherlands at the Free University for health care. Special attention is paid to standards
in Amsterdam the department of Medical of digital medicine, HIS and their components. For
Informatics started under the chairmanship of Jan Russian conditions (a lot of remote parts of the
van Bemmel. country) implementation of e-health programs
1974 - the department of Medical Cybernetics including telemedicine systems, networks and data
and Informatics was established in the Soviet Union, banks is of great current interest.
headed by S.A. Gasparyan. Intended use and functional options of HIS
1976 - The Problem-Oriented Medical depend on the territorial level of health care, as well
Information System, or PROMIS, was designed for as the special features of a particular health care
maintaining health care records at the University of organization. The main objectives of HIS usage are
Vermont by Jan Schultz and Dr. Lawrence Weed, enhancement of efficiency of treatment (reducing of
M.D. medical errors), and optimization of diagnosis and
1980 - Edward H. Shortliffe founded one of the treatment expenses including health and clinical
earliest formal degree programs in biomedical management and patient records. The most urgent
informatics at Stanford University, emphasizing a and challenging task is considered to develop
rigorous and experimentalist approach. computer-based medical decision-support.
1986 - European Society for Artificial Healthcare information systems, health
Intelligence in Medicine (AIME) was established. information systems and hospital information
1970s - 1980s - a shift from a paper-based to systems are often used today to refer to the same
computer-based records system; founding most concept. A series of terms such as computerized
national and international organizations, patient records, electronic medical records, and
conferences; attempts to systematize major areas of electronic health records, have been have been
medical informatics; first specialized schools and mentioned in scientific papers in the evolution of
courses; principles of clinical and hospital this phenomenon from its early foundations in the
information systems, security and medical data 1960s. They are commonly used almost
protection; advanced decision support systems – interchangeably.
expert systems. Thus there are two main types of HIS: electronic
1990s–2000s - medical Informatics consolidates medical records (EMR) ɢ clinical decision support
its position as an independent discipline and is (CDS).
mandatory in most medical schools; hospital Electronic medical records maintain patient
information systems are implemented in some information and physician notes in a computerized
hospitals, mainly for management; first e-health and data base. Electronic records allow the provider to
telemedicine research; notable progress in data track the patient's health over time, read the input of
bases, medical imaging; more visible importance other consulting physicians, or recall his own
and complexity of electronic health record (HER), clinical assessment from a previous day or hospital
including confidentiality, data protection, standards visit. Clinical decision support provides timely
etc. reminders and suggestions to medical practitioners.
2000 – 2010 - clearer understanding of e-health Decision support may recommend screening tests
potential as a specialized industry and business; based on a patient's age and medical conditions, and
hidden gaps and difficulties in real implementation: drug allergy information. Electronic medical records
integration and interoperability, modest rate of user and clinical decision support systems together form
acceptance, quality assessment. Clear contour of the backbone of the hospital information system.
sub disciplines: bioinformatics, neuroinformatics The main application fields and functions of HIS
etc. consist of:
Patient management (patient registry, scheduling
of appointments, admittance and bed control;
3 KEY CONCEPTS OF HEALTH emergency care; in-patient/out-patient system);
INFORMATION SYSTEMS Clinical management (hospital releases; medical
reports, electronic prescriptions; surgery appoint-
In recent decades medicine and health care have ments);
changed significantly. Major companies (IBM, Diagnostics and treatment ( lab exams);
Cisco, Microsoft, AGFA, GE et al.) are involved in Supplies management (stockroom; ordering of
the development of hardware and software solutions supplies; pharmacy; current assets);
425
HEALTHINF 2017 - 10th International Conference on Health Informatics
426
Health Information Systems: Background and Trends of Development Worldwide and in Russia
427
HEALTHINF 2017 - 10th International Conference on Health Informatics
data; patient empowerment, involvement of Personal Jorgen P. Banslera et al., 2010. International Journal of
medical record; further steps towards personalized Medical Informatics ʋ 7 9, p. 637–648
medicine, increase of patient safety, reduction of Kossova E. V., Muhin Ju. Ju. 2010-2011 Information
medical accidents and errors; improvement of systems in healthcare (Informacionnye tehnologii v
medicine), p. 124-148.
preventive medicine and reduction of curative Peter Littlejohns et al., 2003. British Medical Journal ʋ
medicine; use of portable/wearable devices for 326, p. 860–863
monitoring, prediction & prevention; deployment of Elske Ammenwerth et al., 2003. International Journal of
home monitoring systems and tele-assistance; deeper Medical Informatics ʋ 71, p. 125—135
penetration of IT tools in medical research Lebedev G.S. 2011-2012. Information systems in
(modeling & simulation, digital patient etc); healthcare (Informacionnye tehnologii v medicine) p.
advanced decision support systems. 4262.
At present in Russia Medical Cybernetics is a Gesev A. V. 2012. Radiotechnics (Radiotehnika)
Zarubina T. V. 2013. Data-measuring and operating
full-blown health care specialty. Education is
systems (Informacionno-izmeritel'nye i
provided by the Siberian State Medical University, upravljajushhie sistemy) vol. 11, ʋ 10. P. 48.
Penza State University and the Voyno-Yasenetsky Gusev A.V. 2006. Doctor and information technologies
Krasnoyarsk State Medical University, in addition to (Vrach i informacionnye tehnologii) ʋ 5. p. 3243.
the education provided by the Pirogov Russian International Medical Informatics Association. URL:
National Research Medical University. In 2000 the http://imia-medinfo.org/wp/welcome-to-imia-2/
Russian Ministry of Health approved a program for World Health Organization. URL: www.who.int
this discipline, prepared by the Second Pirogov Agha L. 2014. Journal of Health Economics. ʋ 34. P.
Moscow Medical Institute. 19–30.
N. S. Fleming et.al. 2011. Health Affairs. Vol. 30, ʋ 3.
In Russia, one of the key trends is creation of a
P.481489.
united national electronic information system S. V. W. de Oliveira et.al. // Journal of Information
including telemedicine, providing a hot link between Systems and Technology Management. 2011. Vol.
medical organizations of various levels aimed at 8, ʋ 1. P. 155178.
remote consultations of physicians. Distance George I. Mihalas, 2014. Acta Informatica Medica 22(1):
learning courses and continuous educational 37–43.
programs for health care workers are to be Hasman A., Mantas J., and Zarubina T. 2014. Acta
developed. Informatica Medica. 22(1) p. 25–36.
In recent years, in Russia a growing number of
health information systems for automation of health
care institutions have been developed and imple-
mented. Russia is a comparatively young participant
in the market discovering the achievements of heath
informatics, reproduction and restoration of human
resources on the basis of new technologies.
REFERENCES
Reinhold Haux, 2010. International Journal of Medical
Informatics 79, p. 599–610
Morris F. Collen, 2015. Chapter The History of Medical
Informatics in the United States Part of the series
Health Informatics p. 123-206
Nazarenko G. I., Guliev Ja. I., Ermakov D. E. 2005. Book.
MedicalInformation systems: theory and practice
(Medicinskie informacionnye sistemy: teorija i
praktika), 320p.
M. Ngafeeson, 2014. Chapter. Healthcare Information
Systems: Opportunities and Challenges (IGI Global,
Hershey)
Sonia Valle W. et al., 2011. Journal of Information
Systems and Technology Management Vol. 8, No. 1,
p. 155-178
428
A Telecare System on Smart Watches that Communicate with Wireless
Bio Sensors
Keywords: Telecare System, Wireless Bio-sensor, Wristwatch-type Device, Smart Watch, Peer-to-peer, Tactile Interface.
Abstract: In this paper, we propose a prototype of telecare system by using wristwatch-type devices, so called smart
watches. In the prototype system, the smart watch receives physiological data of a user, such as heart beats
and body movements, by communicating with a wireless bio-sensor worn by the user. The smart watch sends
the physiological data to the other users’ smart watches connected to the Internet. The sensed data are shared
among family members in a peer-to-peer manner so as to remotely monitor the physical health status of the
other members. We have designed a user interface which visually shows the remote user’s current body posture
and enables the others to tactilely feel his/her heart beats. We describe the overview of this prototype system
and its user interface implemented with the smart watches. We show experimental results of communication
performances of the system.
1 INTRODUCTION members.
In this paper, we describe a prototype of peer-to-
Recently, wristwatch-type information devices, so peer telecare system by using wristwatch-type infor-
called “smart watches”, have drawn attention of in- mation devices instead of smartphones. The system
dustrial and research communities. In general, the is implemented with small wireless bio-sensors and
wristwatch-type information device is regarded as a wristwatch-type devices. Physiological information
peripheral device of smartphone because it is a small of a service user, such as electrocardiogram and body
sensing device attached with the user’s wrist to sense movements, are sensed by the bio-sensor and shared
her/his activity and shows alerts of the connected with the others’ devices in a peer-to-peer manner. Uti-
smartphone, such as when a mail is received. How- lizing the above features of wristwatch-type device,
ever, some of them can be used as stand alone devices we have developed a user interface which visually
which do not need to work with smartphones because shows the remote user’s current body movements and
they have wireless communication modules, such as enables the others to tactilely feel his/her heart beats.
Wi-Fi and LTE (4G), to independently communicate The user interface has been designed to realize intu-
with other devices on the Internet. itive communication in family members. First, we de-
In addition, as a user interface device, wristwatch- scribe overview of the system and its user interface.
type devices have distinguished features from the Then experimental results to investigate its communi-
smartphones. For example, a feature is intimacy of cation performances are shown.
the devices: they are attached with the users wrists
and stay close with the users at all times; they can
directly provide tactile information for the users by 2 BACKGROUND
using their vibration. By utilizing this feature, we
can create a new service that directly and successively Mobile sensor devices have been used in telecare
provides the telecare information with care givers. An services to remotely monitor statuses of older per-
example of such intimate service is “Mediated social sons who live alone (Lin, 2012)(Triantafyllidis et al.,
touch,” (Haans and IJsselsteijn, 2006). It is an impor- 2015)(Sashima et al., 2008). The services provide
tant issue in teleacare researches how we can mediate their health and activity statuses, which are obtained
social touch and tactile information between family by the wearable devices, for their trustworthy persons
429
Sashima, A., Kawamoto, M. and Kurumatani, K.
A Telecare System on Smart Watches that Communicate with Wireless Bio Sensors.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 429-434
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
Figure 1: Overview of telecare service for elderly person. Figure 2: Overview of P2P telecare service for family mem-
bers.
who take care about them, such as caregivers, family
members, doctors, by using smart phones. 3.1 Telecare Service for Elderly Person
So far, in order to implement such telecare ser-
vices, most of them have been built based on server- In “telecare service for elderly person” model, we as-
client communication model; all of sensing data of sume that the service consists of a wireless bio-sensor,
the older person are sent to a central data server and a connection management server, a wristwatch-type
the server manages and provides the data of the users. device of sensed user and a wristwatch-type device
However, the approach has a drawback to start up and of remote user. The service user, who wears a
maintain a practical service in reality. It is about man- wristwatch-type device and a wireless bio-sensor, is
agement costs of the physiological sensing data in a an elderly person living in the nursing care facilities
central data server; the management costs rise as in- which has Wi-FI access points. The other remote
creasing personal health data in the server because it users are care givers (e.g., family member, medical
requires careful handling. staffs). The bio-sensor senses the user’s physiological
In order to prevent the management issue aris- data, such as electrocardiograph data, and wirelessly
ing from the server-client model, we have proposed sends the data to the his or her wristwatch-type de-
peer-to-peer communication model (P2P communi- vice. The data which represents the user’s physical
cation model) for telecare services (Sashima and Ku- status are sent to the other remote wristwatch-type de-
rumatani, 2016). The P2P communication model as- vices connected to the Internet. The network address
sumes that the smartphones of the users directly com- of the remote devices, which is used for establishing
municate with each other in a peer-to-peer manner. a communication channel among devices, are sent by
The sensing data are directly sent to a smartphone of the connection management server. Hence, it is pos-
a caregiver not going through a central data server so sible to share the latest physical status of the user by
that the management cost is less. using the wristwatch-type device.
In this paper we apply the P2P communication
model to a telecare system on wristwatch-type de- 3.2 P2P Telecare Service for Family
vices. We have implemented a prototype of telecare
system based on the P2P communication model and Members
evaluated the validity of the system. In addition, we
propose a user interface that fits for wristwatch-type In “P2P telecare service for family members” model,
devices. we assume that the service consists of a connection
management server, two wireless bio-sensors, and
two wristwatch-type devices. Each service user has a
wristwatch-type device and a bio-sensor. This model
3 TELECARE SERVICE MODELS is a symmetrical telecare service model for family
members; each member can be take care of other
We propose two service models using the peer-to-peer members. The difference between “telecare service
telecare system implemented on wristwatch-type de- for elderly person” model and this model is that the
vices;one is for elderly person is shown in the figure data flows in both directions between the wristwatch-
1; the other is for family members is shown in the type devices.
figure 2.
430
A Telecare System on Smart Watches that Communicate with Wireless Bio Sensors
4 IMPLEMENTATION
431
HEALTHINF 2017 - 10th International Conference on Health Informatics
Sender
Start
Server
Start
Receiver
Start
user is changed. Hence, using this representation, the
Log on
Log on
amount of traffic data becomes 10–100 times smaller
ACK
ACK
Telling the peer logs on than using the raw data representation in our proto-
Telling the peer’s UDP
socket address. type system.
ACK
Data Request
Sending Data
ACK 4.4 User Interface
Repeat
Sending Data
The wristwatch type device is tactilely attached with
Log off
ACK
the user’s wrist and stay close with the user at all
Telling the peer logs off times. To utilize the features of the device, we have
ACK designed a user interface which directly and succes-
End Go to Start End sively provide telecare service to the user. The user in-
Figure 4: Overview of the communication protocol
terface visually shows the users’ current body move-
(Sashima and Kurumatani, 2016). ments and enables the user to tactilely feel other user’s
heart beats.
4.3 Data Representation 4.4.1 Graphical User Interface for Showing
User’s Status
To share the sensing data between the devices in the
service, the data has two data representations for the Because the wristwatch-type device has a small dis-
service models: a) “raw data representation” which play, we have designed a simple graphical user inter-
includes raw sensing data and b) “abstract data repre- face showing the status of the remote user. Figure 5
sentation” which includes the data analyzed at a wrist- shows display images of the user interface. In the fig-
watch device connecting to wireless bio-sensor. ure, each image shows a physical status of the remote
user. Currently, the system classifies the following 6
4.3.1 Raw Data Representation statuses: standing, moving, laying-up, laying-down,
walking, unclassified. The system automatically clas-
This representation includes raw data obtained by the sifies the status based on the 3-axis acceleration data
bio-sensor for the application that requires to know obtained by a wireless bio-sensor. The sampling rate
detailed data of the sensed user. We assume that typ- of the data is 100 Hz. For the classification, we have
ical usage of this representation is for medical ap- used a rule-based algorithm using predefined thresh-
plications, such as remote monitoring of electrocar- old values.
diograph. Thus the communication is one way from To share the classification with the raw data repre-
a sensed user to a care giver, such as medical staff. sentations, the devices share the raw acceleration data
This raw representation data is synchronously sent at and do the classification based on the data indepen-
a constant sensing interval. For example, if the sam- dently. Because the classification process is done by
pling period of the sensor is 5 msec, the data is sent at each device, the analysis results can be slightly differ-
each 5 msec interval. ent between the devices.
To share the classification with the abstract data
4.3.2 Abstract Data Representation representations, the devices connected to the bio-
sensor analyses the raw acceleration data and send the
two way communication assumed in “P2P telecare abstract posture data to other devices. Because the
service for family members” requires more compu- classification process is done by a device, the same
tational power for handling traffics. We have devel- analysis results are shared by the devices.
oped the abstract representation to reduce the traffics
in the two way communication. The representation 4.4.2 Tactile User Interface for Feeling Heart
includes an abstract data summarized by a data se- Beats
quence of raw sensing data: a “posture” data of the
abstract representation is derived by analyzing a se- Based on electrocardiographic data obtained by the
quence of 3-axes acceleration data; and a “heart beat” wireless bio-sensor, the system automatically detects
data is derived by analyzing a sequence of electrocar- the pase of heart beats of sensed user. To detect
diographic data. In addition, the abstract represen- the pase of heart beats, the system monitors peak lo-
tation data is asynchronously sent when the system cations of the R-wave by calculating differentiation
detects a change of the status. For example, the data values of the electrocardiographic data, and detect
is sent as soon as possible when the posture of the sharply changing points as the peaks of the R-wave.
432
A Telecare System on Smart Watches that Communicate with Wireless Bio Sensors
Figure 5: Graphical user interface of the prototype system. Each image shows a physical status of a remote user: standing
(left), moving (center), laying up (right). HR field shows the pase of heart beats of the user.
The sampling rate of the data is 200 Hz. It calculates ent service models: one-way communication used
“beats per minute (BPM),” which stands for the pase for “telecare service for elderly person,” and two-
of heart beats. The BPM is based on the latest R-R way communication used for “P2P telecare service
period, and shown at the heart rate (HR) field in the for family members.” For the above two conditions,
graphical user interface (see Figure 5). we have compared the performance between the ab-
To share the pase of heart beats with the ab- stract data representation and raw data representation.
stract data representations, the device is connected We have analyzed the performance based on the data
to a wireless bio-sensor. It detects an R-peak from recorded by each device in each condition. We have
the electrocardiographic data and repeatedly sends a used the data recorded within ten minutes from the
packet to remote user’s wristwatch device. We call starting time of the communication.
the packet corresponding to the detected R-peaks R-
peak packet. When the remote user’s device receives 5.1 Packet Losses
the R-peak packet from sensed user’s device, it imme-
diately vibrates for a short time (30 msec). Hence, it Experimental results about packet losses between the
vibrates in synchronism with the heart beat of sensed wristwatch-type devices are shown in Table 1. Total
user so as to others can tactilely feel his/her heart beat samples means a total number of the data sent by the
by the vibrations. Strictly speaking, as there are de- devices. The “condition” column of Table 1 shows
lay times to receive the R-peak packets and the times combinations of communication styles and data rep-
fluctuate with network conditions, others can tactilely resentations. For example “Two Way/Raw” stands
feel ”his/her heart beat like pattern” by the vibrations. for two way communication with raw data represen-
To share the pase of heart beats with the raw data tation. Using the abstract representation, the total
representations, the devices sends the raw electrocar- numbers of data became small in this experiment be-
diographic data to the other users. The others calcu- cause the data is sent asynchronously when the user
late the BPM based on the raw data independently. changed his or her posture.
While many packets were lost by using the raw
representation especially in the two way communica-
5 EVALUATIONS tion, few packets were lost by using the abstract rep-
resentation. Because the wristwatch-type device has
We have experimentally evaluated communication limited computational resources, the abstract repre-
performances by measuring the packet loss and end- sentation with asynchronous communication is more
to-end delays of the prototype system. suitable for the prototype than the raw representation.
The experimental network environments are a Wi-
Fi network (LAN) in our laboratory. We have mea- 5.2 End-to-end Delay
sured the communication performance of two devices
which connect to the same Wi-Fi access point that We have measured delay times of the communication
might be used by the other users. To prevent the ef- in the conditions. The results are shown in Figure 6.
fects of the sleep mode of the devices, we have ap- Before the experiments clocks of the devices are syn-
plied power to USB ports of them. chronized based on a clock of the connection server.
We have evaluated communication performance The average delay time of “Two Way/Raw” condition
in the following two conditions assuming the differ- is omitted in the graph because it took for a long time
433
HEALTHINF 2017 - 10th International Conference on Health Informatics
6 CONCLUSIONS
We have described a prototype of peer-to-peer tele-
care system by using wristwatch-type information de-
vices not using smartphones. Physiological informa-
tion of service user, such as electrocardiogram and
body movements, sensed by the wireless bio-sensor
are shared among the service users’ wristwatch-type
information devices in a peer-to-peer manner. To re-
alize intuitive communication between family mem-
bers, we have developed a user interface which visu-
ally shows the sensed user’s current body movement
and enables the others to tactilely feel his or her heart
beats. We believe that the system opens up a new de-
sign space in which all users in a social group can take
care of each others at the same time.
ACKNOWLEDGEMENTS
This work was supported in part by JSPS KAKENHI
Grant Number 26330125.
434
Designing a Social Machine for the Heart Manual Service
Abstract: Social machines are emerging as a focus of research within the field of informatics as they begin to become the
central administrator of our everyday communications. The difficulty of applying such systems to specialised
contexts, such as healthcare, calls for guidelines on how to design them, so that they become truly useful.
In collaboration with the Heart Manual Department, this project is an attempt at finding suitable methods for
designing social machines in a healthcare context. It suggests that adopting a participatory approach where
stakeholders are active, equal participants throughout the design process leads to a more usable, likeable, and
thus more successful social machine. We describe the process of designing a social machine for the Heart
Manual service, in which requirements were elicited through various participatory design methods and a proof
of concept evaluation was carried out with a prototype. The prototype was received largely positively and
scored highly on the System Usability Scale, indicating the success of the proposed methodology.
435
Hanschke, V., Manataki, A., Alexandru, C., Papapanagiotou, P., Deighan, C., Taylor, L. and Robertson, D.
Designing a Social Machine for the Heart Manual Service.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 435-440
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
(Deighan et al., 2015), and there is now the oppor- text, where technology uptake is relatively slow. In-
tunity to extend it with recent advances in large and cluding the capabilities of the users in the interface
distributed open systems, such as social machines. design can have a significant effect on its usability
Social machines are technology-enabled social and, thus, the success of a healthcare social machine.
systems, seen as computational entities governed by We thus adopt a participatory approach to the de-
both computational and social processes (Hendler and sign of a social machine for the HM facilitators. Par-
Berners-Lee, 2010). They are defined as “Web-based ticipatory design is a user-centred design methodol-
socio-technical systems in which the human and tech- ogy, in which the end-user is made a full participant
nological elements play the role of participant ma- of the design process, typically by interacting with
chinery with respect to the mechanistic realization of mock-ups, prototypes and other tools that represent
system-level processes” (Smart et al., 2014). Social developing systems (Schuler and Namioka, 1993; Si-
machines are a recent research theme, with related monsen and Robertson, 2012). We hypothesise that
work focusing mostly on analysing existing exam- participatory design is an effective method for the de-
ples, such as Facebook, Wikipedia and Stack Over- sign of a social machine of health services with re-
flow (Shadbolt et al., 2013; Smart et al., 2014). Lit- spect to system likeability and usability, as measured
erature on designing social machines is relatively by a small-scale evaluation of a web-based prototype.
sparse. Donath (Donath, 2014) approaches this An iterative development process was followed,
topic in terms of conceptualising communities and consisting of three main phases: requirements elicita-
strengthening ties, while Murray-Rust and Robertson tion, low-tech paper-based prototype design and high-
(Murray-Rust and Robertson, 2015) suggest using ex- tech wireframe prototype development. Inspired by
isting social machines that bring together designers the spiral model of software development, each phase
and developers to generate new social machines. Both included a repetition of steps, namely planning ob-
approaches push for an understanding of the users and jectives, collecting information from users, analysing
a close tailoring of the social machine to its partici- their feedback and creating a next level prototype (or
pants. Yet we are still lacking guidelines for practical list of requirements, in the case of Phase 1).
requirement elicitation for new social machines.
In healthcare, a number of social machines aim
to bring patients together to help them live health- 4 ESTABLISHING
ier lives. PatientsLikeMe.com, for instance, con-
nects patients with similar conditions, allowing for REQUIREMENTS
peer support and knowledge sharing, while the Fit-
bit and Nike+ FuelBand online communities operate We utilised Shadbolt’s constructs for classifying so-
as behavioural interventions that complement activ- cial machines (Shadbolt et al., 2013; Smart et al.,
ity trackers. However, the majority of such machines 2014) to establish a set of questions which provide
lack a clinical evaluation, and there are concerns a framework for gathering requirements for a social
around confidentiality and patient self-diagnosis. machine. The questions devised cover the tasks and
Similarly to the proposed HM social machine, purpose of participation, participants and their roles,
other machines connect clinicians rather than patients as well as motivation and incentives (see Figure 1).
(e.g. doc2doc.bmj.com). A recent review (Rolls et al., Three main methods were used for establishing re-
2016) explores how social media have helped health quirements, described hereafter:
professionals worldwide create virtual communities Training session: We first attended a two-day train-
where they exchange knowledge and network. How- ing session that prepares healthcare professionals to
ever, the paper does not give a comprehensive re- become facilitators of the HM programme. This al-
view of design methodologies. The closest example lowed us to gain a clearer understanding of their role
in this literature were the trials for the Midwifery Fo- and the challenges they face (e.g. cultural issues that
rum (Brooks et al., 2004). However, the participatory might impede patients from following dietary restric-
design mentioned in the paper was limited to proto- tions). To address such challenges, the session also
type evaluation, rather than collaborative design. made apparent the usefulness of a space for facilita-
tors to discuss their opinions and experiences, share
good practice and provide peer support, especially in
the case of facilitators working in remote areas.
3 METHODOLOGY Brainstorming session: This was organised in the
form of a “Future Workshop” towards idea genera-
The lack of guidelines for designing social machines tion (Simonsen and Robertson, 2012). Future work-
is a considerable gap, especially in the healthcare con- shops are common in participatory design and consist
436
Designing a Social Machine for the Heart Manual Service
Figure 1: Questions to guide requirement gathering for a social machine, and answers for the HM social machine.
of three stages: i) critiquing the present, ii) envision- questions (presented in the same figure), leading to
ing the future and iii) implementing - moving from a list of functional and non-functional requirements.
present to the future. Four clinicians participated in Among functional requirements, we distinguish the
the workshop: a health psychologist, an assistant psy- following elements: discussion forum, quizzes, sur-
chologist, a specialist nurse who is also an HM facili- veys, blogs, events and notepad. Posting anony-
tator, and the lead of the HM team. Following the Fu- mously and tagging content as helpful were deemed
ture Workshop structure, we first focused on existing desirable, but setting up groups or private messaging
communication between clinicians, and then we dis- were not. The list of non-functional requirements in-
cussed the goals of the HM social machine. Based on cluded high levels of security and privacy, low main-
these goals, the participants were then asked to devise tainability and the option to report forum abuse.
dream solutions, unrestricted by technical knowledge
or possibilities. Three examples of social machines
were then presented to them: Facebook, doc2doc and
Stack Overflow. These were carefully chosen, so as to 5 FIRST PROTOTYPE AND ITS
prompt discussions around different forms of commu- EVALUATION
nication, privacy and confidentiality regulations, as
well as user reputation, respectively. This presenta- Following best practices in participatory design (Si-
tion initiated a new discussion about the dream solu- monsen and Robertson, 2012) and based on the re-
tions, leading to a jointly ordered list of requirements. quirements gathered, we created a low-fidelity, paper-
Telephone interviews: Three semi-structured inter- based website prototype, so as to quickly obtain feed-
views with additional facilitators were organised so back and generate ideas at an early stage of the design
as to verify some of the ideas collected previously, as process, before committing to design decisions that
well as to clarify points where participants had dif- would be harder to change later on. A set of pages
fering opinions. For example, participants gave their were designed to capture the main functionality of the
opinion about the motivation for a social machine and website: i) homepage, ii) discussions, iii) submitting
the associated concerns, the need for private groups a discussion (see Figure 2) and iv) user profile.
or private messaging, anonymous posting, etc. A prototyping session was organised to collect
The brainstorming session and telephone inter- feedback, with the partaking of the four participants
views were recorded (with the written consent of the from the brainstorming session. Each participant was
participants), transcribed and analysed following top- questioned individually around two activities. In the
down thematic analysis, as guided by the questions in first activity, they were given a set of cut out items
Figure 1. Outputs included explicit answers to these (e.g. buttons and taskbars) which they could arrange
437
HEALTHINF 2017 - 10th International Conference on Health Informatics
438
Designing a Social Machine for the Heart Manual Service
439
HEALTHINF 2017 - 10th International Conference on Health Informatics
440
Experimental Design and Collection of Brain and Respiratory Data for
Detection of Driver’s Attention
Roman Mouček1,2 , Lukáš Hnojský1 , Lukáš Vařeka1,2 , Tomáš Prokop1,2 and Petr Brůha1,2
1 Departmentof Computer Science and Engineering, Faculty of Applied Sciences, University of West Bohemia,
Univerzitnı́ 8, Pilsen, Czech Republic
2 NTIS – New Technologies for the Information Society, Faculty of Applied Sciences, University of West Bohemia,
Keywords: Neuroinformatics, Brain Activity, Electroencephalography, Event Related Potentials, Respiration Rate,
Driver’s Attention, Simulated Drive, Data Validation, Deep Learning, Stacked Autoencoder.
Abstract: Attention of drivers is very important for road safety and it is worth observing even in laboratory conditions
during a simulated drive. This paper deals with design of an experiment investigating driver’s attention, vali-
dation of collected data, and first preprocessing and processing steps used within data analysis. Brain activity
is considered as a primary biosignal and is measured and analyzed using the techniques and methods of elec-
troencephalography and event related potentials. Respiration is considered as a secondary biosignal that is
captured together with brain activity. Validation of collected data using a stacked autoencoder is emphasized
as an important step preceding data analysis.
441
Mouček, R., Hnojský, L., Vařeka, L., Prokop, T. and Brůha, P.
Experimental Design and Collection of Brain and Respiratory Data for Detection of Driver’s Attention.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 441-450
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
provided. Moreover, since we publicly provide the a variety of global factors, such as time since the last
collected data, the analysis can be provided by in- meal, weather, body temperature, and even day time
dependent experts. We also realize that the number or the time of year (Luck, 2005). It is not known ex-
of subjects participated in the experiment (15 partic- actly what the P3 component really means, it is proba-
ipants) is low for more precise statistical evaluation, bly related to a process called context updating (Luck,
but this number seems to be sufficient for a pilot ex- 2005).
periment and for the decision about meaningfulness However, there are known factors which influence
of the used experimental design and usability of the the amplitude and the latency of the P3 component.
collected data. The P3 component is sensitive to the probability of
The paper is organized as follows. Section 2 gives a target stimulus. P3 amplitude increases when the
a short overview of basic principles of the ERP tech- probability of the target stimulus class decreases or
nique and assumptions related to amplitude and la- when it is preceded by a greater number of non-target
tency of P3 component. Then some recent exper- stimuli. P3 amplitude is also larger when the subject
iments dealing with attention of drivers are briefly pays more attention to the task. However, it is smaller
presented with respect to the experiments already if the subject does not know whether a given stimulus
presented in papers (Mouček and Řeřicha, 2012), is / is not a target.
(Mouček and Řondı́k, 2012), and (Mouček and Košař, P3 latency is associated with stimulus categoriza-
2014). The objectives of the proposed experiment are tion; if stimulus categorization is postponed, P3 la-
given in Section 3. Section 4 deals with experimen- tency increases. However, P3 latency does not de-
tal design, used hardware devices and software tools, pend on consequent processes (e.g. response selec-
participants, environment, and course of the experi- tion). Thus P3 latency can be used to determine if
ment. The collected data and metadata are described a performed experiment influences the processes of
in Subsection 4.5. The validation of the collected data stimulus categorization or processes related to a re-
is provided in Section 5. Sections 6 and 7 describe sponse (Luck, 2005). More detailed information is
data preprocessing and processing. Experimental re- available in the literature provided above.
sults together with final discussion are provided in In our case we suppose that stimulus categoriza-
Section 8. The last section contains concluding re- tion is influenced by driver fatigue that is related to
marks. inattention and the time required for low-level sen-
sory processing of incoming stimuli increases with
the level of fatigue. We also consider that respiratory
2 STATE OF THE ART rate decreases with the level of fatigue.
When omitting behavioral studies, not many ex-
This section provides a necessary short description of periments dealing with driver’s attention during sim-
the ERP technique, the P3 component and the rela- ulated drive were performed using the techniques of
tion of P3 amplitude and P3 latency to attention. Then electroencephalography and especially event related
an assumption dealing with respiratory data is given. potentials.
Finally, a short overview of EEG/ERP experiments Suitability of EEG-based techniques is described
dealing with driver’s attention is presented. in (Schier, 2000); drivers’ activity during a driving
Electroencephalography (EEG) and event related simulation task was recorded. As the result, an in-
potentials (ERP) techniques are used for monitor- crease in alpha activity was interpreted as less atten-
ing brain activity by measuring voltage changes on tional activity and a decrease as more attentional ac-
a scalp surface. ERPs have two advantages com- tivity. EEG data as an effective indicator to evalu-
pared to classic behavioral methods: they are useful ate driver fatigue are presented in (Li et al., 2012).
for determining which stage or stages of processing The impact of a surrogate Forward Collision Warning
are influenced by a given experimental manipulation System and its reliability according to the driver’s at-
(a detailed set of examples is in (Luck et al., 2000)) tentional state by recording both behavioral and elec-
and they provide an online measure of the process- trophysiological data was presented in (Bueno et al.,
ing of stimuli even when there is no behavioral re- 2012).
sponse (Luck, 2005). A systematic framework for measuring and un-
The P3 component (also referred to as the P300 derstanding cognitive distraction in the automobile
component) as one of the event related components was presented in (Strayer et al., 2015). Primary,
(waveforms) depends entirely on the task performed secondary, subjective, and physiological measures
by the subject and is not directly influenced by the were collected and integrated into a cognitive dis-
physical properties of the stimulus. It is sensitive to traction scale. Simultaneous recording of EEG and
442
Experimental Design and Collection of Brain and Respiratory Data for Detection of Driver’s Attention
eye-tracking for investigating situation awareness and • to compare the latency of averaged P3 compo-
working memory load in distracted driving was intro- nents and evaluate the respiration waveforms to
duced in (Ichiki et al., 2015). give a preliminary view if the results follow the
The ERP technique was used in (Wester et al., considerations given in Section 1 and should be
2008) where the impact of secondary task perfor- further elaborated.
mance (an auditory oddball task) on a primary driv-
ing task (lane keeping) was investigated. The study
showed that when performing a simple secondary task 4 DESIGN OF EXPERIMENT
during driving, performance of the driving task and
this secondary task are both unaffected (Wester et al., The design of the experiment is a variant on the clas-
2008). sic odd-ball paradigm in which presentations of se-
Amplitude of the P3 component reflecting individ- quences of frequent (non-target) audio/visual stimuli
ual differences of navigation performance in a driving are interrupted by infrequent (target) stimuli. Infre-
task was investigated in (Bo et al., 2012). Two groups quent stimuli usually elicit a much larger P3 compo-
of navigators with good and poor navigation perfor- nent than frequent stimuli.
mance participated in a driving task; P3 amplitude Two auditory stimuli were used to elicit the brain
was measured while two types of triggers were pre- activity of the participants:
sented (intersections and street signs). Poor naviga-
tors showed larger P3 amplitude than good navigators • non-target stimulus S1 - the sound of car wipers,
on the left hemisphere, right hemisphere, the tempo- duration time 900 ms, probability of occurrence p
ral, parietal and occipital sites when intersection trig- = 0.8,
gers were presented, and on the occipital site when • target stimulus S2 - the sound of thunder, duration
street sign triggers were presented, reflecting differ- time 900 ms, probability of occurrence p = 0.2,
ent levels of mental resource needed to process the Both these stimuli were played from the head-
spatial information between these two groups. phones worn by the participants during the whole sim-
ulated drive. The participant had to press the button to
react to each target stimulus. The response button was
3 OBJECTIVES OF located under the steering wheel. Although this re-
EXPERIMENT sponse event required some movement from the par-
ticipant, it did not cause undesired artifacts. The stim-
The presented experiment was designed and con- ulus onset asynchrony (SOA) was set to 3900 ms (it
ducted to investigate attention of drivers during sim- means that the interstimulus interval was 3000 ms).
ulated drive. The assumptions described in Section 2 The following rules were applied within the experi-
were considered during designing and performing the mental scenario:
experiment and the following objectives were set: • at least two first stimuli are non-targets,
• to construct and implement a monotonous track • each target stimulus appears randomly with re-
where a substantial decrease of attention is sup- spect to its probability of occurrence,
posed, • two target stimuli cannot be sequential.
• to use a car simulator located in our neuroinfor- The background sound of drizzling was played
matics laboratory, from speakers to imitate the real environment. The
• to capture the brain activity of drivers during a speakers were located inside the car simulator behind
simulated drive, the driver’s seat.
• to use auditory stimuli during experiment to eval- The overall length of the experiment was 60 min-
uate brain activity, utes. This length was experimentally verified as a
maximum time frame during which the participant did
• to capture respiration rate together with drivers’ not have difficulties (bad feelings) with an EEG cap
brain activity monitoring, placed on his/her head. It was also expected that fa-
• to perform a pilot experiment on a group of at least tigue would increase approximately after 30 minutes
ten participants, of driving.
• to validate the collected data, The experiment was divided into three driving ses-
sions, each session lasted 15 minutes and was fol-
• to annotate, store and made the collected data pub- lowed by five minutes break. The breaks served both
lic, for relaxation of the participant (from driving and
443
HEALTHINF 2017 - 10th International Conference on Health Informatics
watching the simulation scene) and for preventing 4.4 Participants and Course of
the participant from familiarity with presented stim- Experiment
uli (habituation to stimuli was thus limited).
A group of 15 volunteers, university students (thir-
4.1 Hardware Equipment teen men, two women), aged 21-28, participated in
the experiment. The participants got necessary infor-
The experiment was performed in the neuoroinfor- mation about the experiment in a written form in ad-
matics laboratory of the University of West Bohemia, vance. Then informed consent was obtained from all
Czech Republic that was equipped with all necessary of them.
hardware infrastructure for EEG/ERPs and respira- Before starting the experiment, each participant
tory rate recordings. The experimental car simulator was familiarized with basic behavioral rules during an
(a front part of a real Skoda Octavia car) was equipped EEG/ERP experiment (e.g. not to use cosmetic prod-
with the Logitech G27 wheel, accelerator, and brake. ucts before the experimental session, or reduce eye
These were connected to the computer via the USB blinking and unnecessary movements to decrease the
port. number of artifacts). Then the participant was famil-
Three computers were used: the first one for pre- iarized with all sounds played during the experiment,
sentation of auditory stimuli, the second one for stor- with car simulator controls, and with the track. Subse-
ing recorded data, and the third one for presentation quently the participants were allowed to drive around
of the track. The track was projected on the wall in to get accustomed to the car simulator and simulated
front of the car simulator. V-Amp produced by the drive.
Brain Products company was used as an EEG ampli- During the experiment the experimenter was con-
fier. It served also as an input of the sensor capturing trolling data recording and checking the correct be-
respiratory rate. havior of the stimulation program. When the exper-
imental session finished, the participant left the car
4.2 Software Tools simulator. Then the experimenter asked him/her to
fill in the questionnaire containing questions related
The stimulation protocol was implemented in the Pre- to his/her feeling of fatigue during/after the drive.
sentation software tool produced by Neurobehavioral
Systems, Inc (Neuro Behavioral Systems, 2014). The 4.5 Data and Metadata
sequence of stimuli was generated randomly, but it
always contained the same number of target and non-
EEG/ERP data were recorded with the sampling fre-
target stimuli. All the sounds (including background
quency of 1 kHz; no filters were used during data
drizzling) were recorded using the Audacity software
recording. The resulting signal was stored into three
tool and stored in the .wav format. The track was
files:
prepared using the World Racing 2 game produced
by the Synetic Company (SYNETIC GmbH, 2014). • .eeg file containing raw data,
The same track as in (Mouček and Řeřicha, 2012) • .vhdr file containing metadata that describe raw
was used. The BrainVision Recorder (Brain Products, data in the related .eeg file,
2014) was used for recording and storing EEG/ERP
data and respiration rate. MATLAB, EEGLAB, and • .avg file containing the averaged signal around the
ERPLAB software tools were used for processing and used stimuli.
analysis of experimental data. All recorded data and collected metadata were
stored into the EEG/ERP portal (experiments No.
4.3 Recording System 205-209, 225-236) (EEG/ERP Portal, 2016). These
data are publicly available for registered users (regis-
Common EEG caps (the 10-20 system defining loca- tration is free).
tions of scalp electrodes) were used depending on the
size of the participants’ heads. The reference elec-
trode was placed approximately 0,5 cm - 1 cm above 5 DATA VALIDATION
the nose and the ground electrode was placed on the
ear. The respiratory rate sensor (produced by the The data validation was based on the main objec-
Brain Products company) as well as the EEG cap were tive of P3-based experiments: target and non-target
connected to the V-Amp amplifier. trials are expected to be associated with differently
shaped ERP components, especially P2, N2, and
444
Experimental Design and Collection of Brain and Respiratory Data for Detection of Driver’s Attention
P3 (Blankertz et al., 2011). To validate this objective, After the training of each autoencoder, the input
dichotomous machine learning was used. If classi- feature vectors were encoded using that autoencoder
fication of a specific dataset from one subject yields to form input vectors of the next autoencoder.
low error rates (defined later), the objective of the Using the output of the last autoencoder, softmax
odd-ball paradigm is considered to be fulfilled. supervised classifier was trained with 200 training it-
The classifier was trained on a randomly selected erations. Finally, the whole pre-trained 133-100-75-
data subset. The training subset contained 730 ERP 60-30-2 network was fine-tuned using backpropaga-
trials (described in detail in (Vařeka et al., 2014a)) tion.
with equal numbers of targets and non-targets. The The learned model was first verified on other
trained classifier was subsequently applied to the data P300-based data (Vařeka et al., 2014a). Then, for
of individual subjects. each subject, error rates depicted by red bars were ob-
The Matlab scripts available in (Vařeka et al., tained by applying the classifier in the testing mode.
2014b) and using EEGLAB and BCILAB functions Let us suppose that we have t p - number of correctly
were used for the implementation. Feature extrac- classified targets, tn - number of correctly classified
tion follows the Windowed Means Method proposed non-targets, f p - number of misclassified non-targets,
in (Blankertz et al., 2011). This method includes fea- fn - number of misclassified targets. The error rate
ture extraction: low pass filtering and spatial filtering, was calculated according to Equation 1.
and machine learning technique based on one of the
deep learning models - stacked autoencoders. Feature f p+ fn
ERR = (1)
extraction was described in detail in (Vařeka et al., t p + tn + f p + f n
2014a). Machine learning was designed as follows. As a result, error rates indicate the extent to which
The Matlab implementation of stacked autoen- the classifier was unable to separate target and non-
coders was used. The parameters (including number target single trials. The classification results may
of layers, number of neurons in each layer, etc.) were slightly differ with each run because of the indeter-
empirically optimized. The experimentation started ministic training process.
with two layers, then either new neurons were added
into the layer, or a new layer was added until the per-
formance of the classifier stopped increasing. 6 DATA PREPROCESSING
Finally, the following procedure was used to train
the network: The recorded EEG/ERP data as well as the data ob-
1. The first autoencoder with 100 hidden neurons tained from the respiratory sensor were processed us-
was trained. The maximum number of training ing the following workflow:
epochs was limited to 500. • Channel selection: The following channels cap-
2. The second autoencoder with 75 hidden neurons turing brain data were selected for the initial pro-
was connected with the first autoencoder to form cessing: Fp1, Fp2, F3, F4, C3, C4, P3, P4, O1,
a 133-100-75-133 neural network, and trained. O2, F7, F8, T3, Fz, Cz, and Pz.
The maximum number of training epochs was • Driving session selection: Data for each driving
limited to 300. session were processed separately.
3. The third autoencoder with 60 hidden neurons • Data filtering: IIR Butterworth filter (frequency
was connected with second first autoencoder to range 0,01 Hz - 20 Hz) was applied to the data.
form a 133-100-75-60-133 neural network, and • Data segmentation: The epochs were extracted
trained. The maximum number of training epochs from datasets, data corresponding to each target
was limited to 200. and non-target stimulus were selected in the time
4. The fourth autoencoder with 30 hidden neu- interval (-100 ms before the stimulus, 1000 ms af-
rons was connected with third autoencoder to ter the stimulus) in the area of occurrence of the
form a 133-100-75-60-30-133 neural network, target or non-target stimulus.
and trained. The maximum number of training • Application of the filter for automatic artifacts de-
epochs was limited to 200. tection: The segmented data exceeding the range
Furthermore, the following parameters were set (-100 microV, 100 microV) were denoted as pos-
for the network globally: L2WeightRegularization sible artifacts and provided for manual inspection.
was set to 0.004, SparsityRegularization was set to 4, • Rejection of corrupted data: The data automati-
and SparsityProportion was set to 0.18. cally denoted as artifacts were manually inspected
445
HEALTHINF 2017 - 10th International Conference on Health Informatics
45,00
40,00
35,00
30,00
Error rate (%)
25,00
20,00
15,00
10,00
5,00
0,00
0001 0003 0004 0005 0006 0007 0008 0009 0010 0011 0012 0013 0014 0015 0016
Participant
Figure 1: Results of validation. The error rates for each subject are depicted in bars. Higher error rates mean lower amplitudes
of P3s and/or more distortion in the EEG/ERP signal.
and most of them rejected. Moreover, each dataset in case of auditory stimulation. Finally, the peak la-
was manually inspected and in case of suspected tency was determined manually from computed grand
artifacts the related epochs were rejected. Arti- averages.
facts were usually caused by eyes blinking, swal-
lowing or movements.
• Baseline correction: The baseline was corrected 8 RESULTS AND DISCUSSION
using the interval (-100ms, 0ms) before occur-
rence of each target or non-target stimulus.
The results from performed experiments are summa-
• Data averaging: The accepted epochs for each rized in the figures and tables presented further. The
participant and each session were averaged and P3 component for the participant 0010 and the val-
stored separately for target and non-target stimuli. ues of his/her peak latency for the first driving session
• The data captured by the respiratory sensor were and for channels P3, P4, Fz, Cz, and Pz are shown in
processed using the following workflow: only the Figure 2.
.vhdr file was read, filtering was applied, and the It can be seen that the component P3 is clearly
scale for respiration visualization was adjusted. identifiable and there is a substantial difference be-
tween reaction to target and non-target stimuli. How-
ever, the identification of the P3 component was not
so evident for all participants. This is shown in Ta-
7 DATA PROCESSING ble 1 where peak latencies for selected channels and
each driving session are available.
For the next analysis only the channels P3, P4, Fz, The data collected from participant 0002 were
Cz, and Pz (since the occurrence of the P3 compo- rejected, the resulting values were out of reason-
nent is more significant on these channels) were se- able range, most probably because of technical fail-
lected. Then grand averages for each driving ses- ure during the measurement. The data from partici-
sion and each participant were computed (separately pants 0005, 0006, 0008, and 0009 were also not fur-
for target and non-target stimuli). The latency of the ther interpreted since the N2 component (a repetitive,
P3 component was determined using the technique of non-target stimulus elicits N2 deflection that can be
peak latency. It is the simplest way to determine the thought of as the basic N2 component) had a very high
latency of the P3 component when the maximum am- amplitude while the component P3 was not clearly ev-
plitude in the time frame of possible occurrence of ident (an example for the participant 0006 is available
the P3 component is searched for. The P3 component in Figure 3). It can also easily observed that the am-
time frame was set to (300 ms, 450 ms) reflecting the plitude of the N2 component decreased in time; the
expected location of peak latency values occurrence difference in peak amplitudes of this component is
446
Experimental Design and Collection of Brain and Respiratory Data for Detection of Driver’s Attention
Figure 2: Grand average for participant 0010, the first driving session, channels P3, P4, Fz, Cz, and Pz, peak latency of the P3
component for target and non-target stimuli.
noticeable comparing the waveforms for each driving ticipant and for each driving session as it can be seen
session. It was probably caused by habituation of par- in Table 3. The average respiratory rate decreased in
ticipants during the course of the experiment. time. Participants 0013 and 0014 had an increased
However, it does not mean that the data contain- respiratory rate in all driving sessions in general, but
ing high N2 amplitude and low P3 amplitude are in- it also decreased within the course of the experiment.
correct. Since we were unsure with their correct inter- The values from participants 0002 and 0015 were not
pretation, they were rejected only for this preliminary captured correctly due to technical difficulties with
analysis. It is reasonably possible that they will be the sensor.
considered for later analysis after reviewing them by
another expert in the field. The data from participants
0012 and 0013 were not interpreted because of low 9 CONCLUSIONS
amplitude of the P3 component.
It is also evident that peak latencies differ among This paper described the experiment dealing with at-
the participants in average. This is a natural phe- tention of drivers during a simulated drive. Brain ac-
nomenon that reveals that the cognitive processing of tivity and respiratory rate of the participants of the
stimuli is different for each individual in the consid- experiment were measured and investigated by us-
ered time frame. It can be also seen that the aver- ing mainly the methods of electroencephalography
age latency for all participants for each selected chan- and event related potentials. Drivers, university stu-
nel increased as the experiment continued to the next dents, were stimulated by simple auditory stimuli
driving sessions. while driving a car simulator on a monotonous track.
However, different results we got by computing The collected data were annotated, stored, prepro-
grand averages for all epochs containing the target cessed, validated, and partly analyzed. The peak la-
stimulus and for all participants. It is not an average tency of the P3 component was derived from the data
of peak latencies as computed above, all waveforms and grand averages for each participant and driving
related to the target stimulus within driving sessions session as well as grand averages for all participants
were averaged. The resulting waveforms are given in and each driving session were computed.
Figure 4. The determined values of peak latency for Experimental results showed that the P3 compo-
averaged waveforms are clearly shown in Table 2. It nent had been identified at most participants during
can be seen that grand averages for target stimuli, se- all driving sessions. However, some experimental re-
lected channels and all participants differ between the sults were not interpreted in this article because of the
first and second driving session, while there is no ev- high amplitude of the N2 component compared to the
ident difference between the second and third driving amplitude of the P3 component. Prolongation of the
session. peak latency of the P3 component was evident in case
The respiration rate was computed for each par- of most participants and in case of simple averaging of
447
HEALTHINF 2017 - 10th International Conference on Health Informatics
Table 1: Grand averages for driving sessions, participants and selected channels.
1st driving session 2nd driving session 3rd driving session
Participant Peak latency of P3 component [ms] on Peak latency of P3 component [ms] on Peak latency of P3 component [ms] on
channels channels channels
P3 P4 Fz Cz Pz P3 P4 Fz Cz Pz P3 P4 Fz Cz Pz
0001 423 421 336 410 418 452 450 404 406 486 497 507 402 400 497
0002 rejected because of technical failure
0003 383 384 382 386 383 390 416 394 399 378 398 431 387 398 346
0004 459 443 422 435 445 464 462 409 456 455 473 476 454 465 469
0005 too high amplitude of N200 component
0006 too high amplitude of N200 component
0007 345 334 323 343 341 356 353 357 356 354 357 355 359 358 356
0008 too high amplitude of N200 component
0009 too high amplitude of N200 component
0010 361 356 357 357 359 389 389 391 389 389 399 397 394 398 396
0011 317 318 347 305 322 319 311 309 303 327 363 410 307 304 407
0012 Low amplitude of P3 component
0013 Low amplitude of P3 component
0014 351 348 358 347 350 399 336 353 337 335 448 359 399 363 365
0015 444 413 404 406 411 428 418 411 415 418 498 505 448 456 449
0016 405 404 392 387 404 418 416 404 406 415 404 389 402 393 399
Avg 388 380 369 375 381 402 395 381 385 395 426 425 395 393 409
Figure 3: Grand average for the participant 0006, channels P3, P4, Fz, Cz, and Pz, peak latency of the N2 component for
target stimulus.
their peak latencies. Despite expectations, prolonga- The results in this article were not statistically
tion of peak latency in time was not clearly observed evaluated. However, the trend of increasing latency
when grand averages for all participants were inves- and decreasing respiratory rate is clearly visible. The
tigated. This prolongation is evident only as a dif- experimental results were naturally affected by differ-
ference between grand averages of the first and sec- ent brain reactions of participated drivers and sensi-
ond driving sessions. We also supposed that when the bility of captured data to the environmental noise, par-
driver expected his/her drive to be almost completed ticipants’ overall mental conditions, and their move-
(during the third driving session), his/her attention in- ments that caused occurrences of artifacts. Although
creased. The average respiration rate and respiration there was a big effort to eliminate these circumstances
rates for most participants showed a decreasing trend by experimental design, setting of experimental con-
during the course of the experiment. ditions, and usage of data preprocessing and process-
448
Experimental Design and Collection of Brain and Respiratory Data for Detection of Driver’s Attention
Figure 4: Grand averages for all participants, channels P3, P4, Fz, Cz, and Pz, peak latency of the P3 component for the target
stimulus.
Table 2: Grand averages of peak latencies of the P3 component in [ms] for selected channels, target stimulus.
Grand average
1st driving session 2nd driving session 3rd driving session
P3 P4 Fz Cz Pz P3 P4 Fz Cz Pz P3 P4 Fz Cz Pz
391 391 369 386 389 407 407 395 402 405 406 405 395 402 402
Table 3: Respiration rate for each participant and driving port a highly increased level of fatigue after having
session. finished their experiment. Although the participants
Respiratory rate complained about the tedious ride, the stimulation
Participant 1st driving ses- 2nd driving 3rd driving kept them relatively attentive. One third of partici-
sion session session pants pointed out that they would like to drive longer
0001 18 16 16 without any brake. On the other hand, most partic-
0002 rejected ipants complained about unpleasant feelings caused
0003 16 15 14
by the ground electrode placed on their ear. This feed-
0004 15 14 14
0005 19 18 18
back have been used for the design of further ongoing
0006 16 16 15
experiments.
0007 16 15 15 We believe that by using the results of ongoing
0008 18 17 16 research and technological innovations it will possi-
0009 17 17 15 ble to capture biosignals more easily in the future.
0010 16 15 15 It would facilitate recognition of the human attention
0011 14 13 13 level and decrease the number of accidents not only
0012 18 18 18 in transport but also during activities that are directly
0013 23 22 22
influenced by human attention.
0014 26 25 25
0015 rejected
0016 16 16 16
Avg 17,69 17,00 16,62 ACKNOWLEDGMENTS
ing methods, they could not be completely removed. This publication was supported by the UWB grant
That is why we also validated the collected data using SGS-2016-018 Data and Software Engineering for
the stacked autoencoder. Advanced Applications and the project LO1506 of the
The observations collected by experimenters from Czech Ministry of Education, Youth and Sports under
the participants were also summarized. The partic- the program NPU I.
ipants (they filled in the questionnaire) did not re-
449
HEALTHINF 2017 - 10th International Conference on Health Informatics
REFERENCES Wester, A., Böcker, K., Volkerts, E., Verster, J., and Ken-
emans, J. (2008). Event-related potentials and sec-
Blankertz, B., Lemm, S., Treder, M., Haufe, S., and Müller, ondary task performance during simulated driving.
K.-R. (2011). Single-trial analysis and classifica- Accident Analysis and Prevention, 40(1):1–7.
tion of erp components – a tutorial. NeuroImage,
56(2):814 – 825. Multivariate Decoding and Brain
Reading.
Bo, O., Changxu, W., Guozhen, Z., and Jianhui, W. (2012).
P300 amplitude reflects individual differences of nav-
igation performance in a driving task. International
Journal of Industrial Ergonomics, 42(1):8–16.
Brain Products (2014). Brain vision recorder.
Bueno, M., Fabrigoule, C., Deleurence, P., Ndiaye, D., and
Fort, A. (2012). An electrophysiological study of the
impact of a forward collision warning system in a sim-
ulator driving task. Brain Research, 1470:69–79.
EEG/ERP Portal (2008-2016). EEG/ERP Portal.
Ichiki, M., Ai, G., and Wagatsuma, H. (2015). Simultane-
ous recording of eegs and eye-tracking for investigat-
ing situation awareness and working memory load in
distracted driving: A prospective analysis toward the
neuro-driving framework. Frontiers in Neuroscience,
(10).
Li, W., He, Q.-C., Fan, X.-M., and Fei, Z.-M. (2012). Eval-
uation of driver fatigue on two channels of eeg data.
Neuroscience Letters, 506(2):235–239.
Luck, S., Woodman, G., and Vogel, E. (2000). Event-related
potential studies of attention. Trends in Cognitive Sci-
ences, 4(11).
Luck, S. J. (2005). An Introduction to the Event-Related Po-
tential Technique (Cognitive Neuroscience). A Brad-
ford Book, 1 edition.
Mouček, R. and Košař, V. (2014). Attention of driver dur-
ing simulated drive. HEALTHINF 2014 - 7th Inter-
national Conference on Health Informatics, Proceed-
ings; Part of 7th International Joint Conference on
Biomedical Engineering Systems and Technologies,
BIOSTEC 2014, pages 543–550.
Mouček, R. and Řeřicha, J. (2012). Driver’s attention dur-
ing monotonous driving. 2012 5th International Con-
ference on Biomedical Engineering and Informatics,
BMEI 2012, pages 486–490.
Mouček, R. and Řondı́k, T. (2012). Influence of mental
load on driver’s attention. Transaction on Transport
Sciences, 5(1):21–26.
Neuro Behavioral Systems (2014). Home page.
Schier, M. (2000). Changes in eeg alpha power during simu-
lated driving: A demonstration. International Journal
of Psychophysiology, 37(2):155–162.
Strayer, D., Turrill, J., Cooper, J. M., Coleman, J. R.,
Medeiros-Ward, N., and F., B. (2015). Assessing cog-
nitive distraction in the automobile. Human Factors:
The Journal of the Human Factors and Ergonomics
Society, 57(8):1300–?1324.
SYNETIC GmbH (2014). World racing 2.
Vařeka, L., Brůha, P., and Mouček, R. (2014a). Event-
related potential datasets based on a three-stimulus
paradigm. GigaScience, 3(1):35.
Vařeka, L., Brůha, P., and Mouček, R. (2014b). P3-
validator.
450
The Need for Trustworthiness Models in Healthcare Software
Solutions
Raja Manzar Abbas1, Noel Carroll1,2, Ita Richardson1,2 and Sarah Beecham1
1
Lero- The Irish Software Research Centre, University of Limerick, Limerick, Ireland
2
ARCH- Applied Research for Connected Health Technology Centre, University of Limerick, Limerick, Ireland
{raja.abbas, noel.carroll, ita.richardson, sarah.beecham}@lero.ie
Abstract: Trustworthiness in software is of vital importance to technology users, especially in health, where lives may
depend on the correct application of software that is fit for purpose. Despite the risk posed by improper use
of technology in the health domain, there is evidence to suggest that stakeholders often trust the software
without fully appreciating the possible consequences. In this paper, we explore what determines
trustworthiness in healthcare software solutions. While there are often claims of improved quality of care,
increased safety and improved patient outcomes using healthcare technology – the scientific basis for such
claims appear to be uncritically accepted. Ultimately, this can lead to a surge in healthcare software solutions,
some of which may be misaligned with healthcare needs and potentially lead to fatal outcomes. To support
health technology stakeholders, we propose a ‘trustworthiness healthcare software model’ that can be
employed to assess the level of trustworthiness associated with healthcare software solutions.
451
Abbas, R., Carroll, N., Richardson, I. and Beecham, S.
The Need for Trustworthiness Models in Healthcare Software Solutions.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 451-456
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
There is an apparent lack of insight into what a nonfatal medical errors is between $17 billion and $19
trustworthiness healthcare software model should billion each year, and that between 2.9% and 3.7% of
capture, and how it should be applied. To address all patients admitted suffer some type of injury
these gaps, we formulate the following research because of medical mismanagement. As a result, there
questions: is a growing focus on healthcare technology to offer
x RQ1. What are the key attributes that define greater service efficiency and it has given rise to a
trustworthiness of healthcare software? comprehensive sociotechnical model for managing
x RQ2. What are the current models or healthcare through software solutions.
frameworks that capture trustworthiness of Technological advances have encouraged the
healthcare technology? development of new technologies that drive
connectivity across the healthcare sector—apps,
1.3 Methodology gadgets, and systems that personalize, track, and
manage care using just-in- time information
To explore these questions, we undertook a structured exchanged through various patient and community
literature review. A structured literature review may connections (Leroy et al., 2014).
be described as appraisals of past studies conducted This paradigm shift heavily emphasizes the
systematically, purposefully and methodologically process of software development in healthcare
(Armitage and Keeble-Allen, 2008; Petticrew, 2001). systems. It has also contributed to a shift in healthcare
In the research discussed in this article, a literature practice, highlighting our growing reliance and
search was completed in the bibliographic databases trustworthiness of software to support healthcare
ACM Digital Library, IEEE, Springer LINK decisions. However, trusting the healthcare software
and Google Scholar, using the keyword search solution without validating can have serious and
phrases ‘trustworthiness’, ‘healthcare software’, potentially fatal consequences (Carroll, 2016).
‘healthcare trust’, ‘trustworthiness models’,
trustworthiness frameworks’, ‘trust attributes’,
‘trustworthy attributes’, ‘software trustworthiness’ 3 TRUSTWORTHINESS – WHO
and ‘healthcare software trustworthiness’. 2894 CARES?
initial reference sources were found. From these, after
screening titles and abstracts , 2224 were deemed not
Trustworthiness in healthcare software is the sum of
eligible. Out of remaining 670 research articles, 536
trust in different factors. The composition these
articles were screened out after applying the exclusion
factors can differ for different healthcare users. For
criteria on the titles and abstracts - 238 were not
example, for patients, trustworthiness in software
relevant to software engineering, 107 research articles
consists of, mostly, a perceived level of control and
had no specific intervention about software
privacy, while for healthcare professionals, a larger
trustworthiness (trustworthy, trust), 187 articles did
and different set of issues play a role, including
not mention software attributes and/or models and 4
reliability and a transparent data storage policy. The
research articles were not written in English. After
set of factors that affect trustworthiness in a healthcare
reviewing the full text of the remaining 134 studies,
portal are different from the sets that have exist for
83 more studies were excluded due to lack of
general software domain. There is a need to study
relevance to the topic and 51 studies were selected as
trustworthiness in healthcare software as a separate
primary studies.
subject to inform the design of reliable interventions.
452
The Need for Trustworthiness Models in Healthcare Software Solutions
patient management software, there was a mapping Trustworthiness is defined by Amoroso et al.
error in the alteration process that triggered the (1994) as a “level of confidence or degree of
program to notify 8,500 patients of their incorrect confidence” and software trustworthiness is defined as
death. a “degree of confidence that the software satisfies its
While unregulated medical devices rarely find requirements”. Since the definition is expressed as a
their way to patients, the same cannot be said about “degree of confidence”, Amoroso and Taylor
the largely unregulated market for health applications illustrates trustworthiness is dependent upon
and software. As such, in reality, there exists a management and technical decisions made by
considerable gap between the potential benefits that individuals or groups of individuals evaluating the
software’s could provide, and what healthcare software. Software trustworthiness is expressed in
professionals are currently likely delivering in terms of a set of requirements, where the ‘set’ is
practice. Recent reviews in the therapeutic areas of variable. For example, trustworthiness may be
bulimia (Nicholas et al., 2015), asthma (Huckvale et dependent on the set of functional requirements, or
al., 2012), Post-traumatic stress disorder (PTSD) may be a critical subset of functional requirements, or
(Olff, 2015), insulin dosing (Huckvale, 2015) and it may be some set of requirements that include non-
suicide prevention (Larsen et al., 2016) have yielded functional assurance requirements like safety or
worrying conclusions regarding the quality, scientific security (Amoroso et al., 1994).
basis and often blatant disregard for safety (The Daily In his ICSE 2006 Keynote speech, Boehm (2006)
Mail, 2014), pointed out the increasing trend of software criticality
These errors go some way to illustrating the need and dependability as one of the key software trends.
for trustworthy healthcare software. Although Over the past 50 years, different strategies such as
different researchers have tried to address some formal methods, security assurance techniques, defect
attributes of trustworthiness not all attributes have prediction, failure mode and effects analysis, testing
been identified. We discuss some of the models and methods, and software assurance techniques have
standards and the attributes they cover in an effort to been proposed to address different aspects of software
understand what areas they are lacking in. trustworthy challenges. Based on these studies,
numerous quality categories and attributes have been
3.2 Impact of Trustworthiness on studied as major factors influencing on software
Quality trustworthiness. Among them are included
functionality, reliability, safety, usability, security,
The number of medical errors caused by devices portability, and maintainability, etc.
(which have embedded software) and software In addition, Zhang et al. (2012) reviews the
applications naturally leads to the questions: appropriateness of the software attributes summarized
x How can healthcare software be made by Yang et al. (2009), and suggests that the
trustworthy? trustworthiness of software is related to the following
x What process/mechanism would achieve this? set of properties which they redefined to address the
trustworthiness context as:
x How do we inform users and healthcare
providers which healthcare software solution x Safety
can be trusted and why? x Validity
We first identified the attributes of trustworthy x Reliability
healthcare software and why there is a need for a x Reusability
trustworthy healthcare software model. x Scalability
x Maintainability
x Performance
4 DEFINING Carbone et al. (2013) defined trustworthiness from
TRUSTWORTHINESS information and communication technology (ICT)
systems where security challenges include both
According to Merriam–Webster Dictionary confidentiality (or privacy) and in integrity (or trust)
(2004), trustworthy means ‘worthy of confidence’. of the data. In particular, the notion of trustworthiness
For software products, researchers and practitioners seems relevant for tagging databases and electronic
have a slightly different understanding of ‘trustworthy patient records with information about the extent to
software systems’, since we need to view which test results, diagnoses and treatments can be
trustworthiness over time. trusted.
453
HEALTHINF 2017 - 10th International Conference on Health Informatics
Initial findings from literature suggest a lack of implementation as part of the software development
understanding of trustworthiness in the healthcare process. The process of verification and validation
software domain and a need for a trustworthiness requires a clear understanding of how each activity is
process model that define standards or best practices undertaken and related to each other, which is
about the trustworthiness of healthcare software. important in a healthcare environment (Carroll and
In this position paper, we propose the key Richardson, 2016).
attributes that define trustworthiness of healthcare For example, the development of an international
software and current models that capture software process improvement (SPI) framework for
trustworthiness of healthcare technology. the medical device industry acts as a key enabler of
best practice for the healthcare sector. SPI techniques
offer a continuous cycle of performing an assessment
5 THEORETICAL and restarting the cycle (McHugh et al., 2012) with
the aim of reducing defective software. Software may
FOUNDATIONS also be vulnerable to outside attack. Many hospitals
and healthcare facilities use various threat
Though there is a growing consensus that management software and firewalls to monitor their
trustworthiness is characterized as one that satisfies a mobile device applications to ensure that they are
collection of critical quality attributes, yet, there is a secure and safe. In most cases, within the USA, this is
lack of common understanding of healthcare software a requirement of Health Insurance Portability and
trustworthiness – particularly in a healthcare context. Accountability Act (HIPPA).
Based on the literature and the sample of definitions HIPAA is a framework which is followed by
introduced here, we identify that the key factors of number of organisations for maintaining the security
trustworthiness for healthcare software should be and privacy of the health information. HIPAA came
regulation, confidence of the users and meet its into force in 1996 to address a number of concerns,
requirements and objectives in a satisfactorily most notably the need for increased protection of the
manner. medical records of the patients against unauthorised
access (Wu et al., 2012). HIPAA provides a national
5.1 Theoretical Influences on standard for electronic healthcare transactions. It also
Developing a Trustworthiness provides regulations regarding healthcare information
Healthcare Software Model security and privacy (Jepsen, T, 2003). HIPAA covers
entities such as healthcare providers, insurers and
The Capability Maturity Model Integration (CMMI) providers of health plan. Healthcare organisations are
guides organisations with a view to ensuring that the now required to individually assess their security and
correct software is being developed throughout each privacy requirements using various auditing tools.
stage in the development cycle and conforms to Healthcare technology systems have access to
specification. However, it is important to realise that personal identifiable information.
software process models, such as CMMI, do not cover Our traditional view of privacy protection
healthcare regulations, and that they need to be used methods through various anonymization techniques
in conjunction with the regulations (Burton et al., does not provide an efficient way to deal with the
2006). privacy of technological healthcare software
There have been some new developments in this solutions. For example, in response to growing
area, for example the development of MDevSPICE concerns on privacy and data security, in 2014, the
(formally known as MediSPICE) (Clarke et al., 2014; European Commission published a Green Paper on
McCaffery et al., 2010). The MDevSPICE framework mHealth (European Commission, 2014). Through
is one of the first attempts to address the safety wide stakeholder consultation, the paper discusses the
concerns faced by healthcare software producers and main barriers and issues related to mHealth
presents a software safety assessment process. deployment. They highlight a number of key topics
Verification and validation activities are very including data protection, security of health data,
important in software development and can consume informed consent, big data management, patient
much of a project’s costs and effort. While safety and transparency of information across the EU
verification and validation are addressed by process and, ultimately, on the need to regulate mHealth
models and standards for both generic and safety applications.
critical software development, there are still One of the main concerns across industry is the
challenges in undertaking its successful lack of a unified model which can incorporate all of
454
The Need for Trustworthiness Models in Healthcare Software Solutions
the best practices for healthcare software build on this to establish key processes and metrics
development. There is a need to formulate a within the model.
healthcare software model that can accurately As part of our future research, we will examine
propagate trustworthiness throughout the process. and modify existing trustworthiness models. The
subsequent focus will be on extending and modifying
5.2 Towards Developing a existing techniques based on our identified attributes
Trustworthiness Healthcare for the analysis. Then our next step will be to take the
trustworthiness model that we develop, to test and
Software Model refine it on a large scale with healthcare software
sector. This way, we will also be able to say which
By carefully reviewing the appropriateness of the
attributes are the most important.
attributes summarized through a software lens, we
suggest that the trustworthiness of healthcare software
model is related to the following set of properties:
x Security: inclusion of security mechanisms in 7 CONCLUSIONS
the model with respect to access control
processes. The primary goal for adopting healthcare software is
x Efficiency: effectiveness of the model to provide patients the best service possible by
construction that is able to give a quick gathering and interpreting accurate information. This
response or reaction with minimal resources should help them to take correct and timely decisions
and/or time taken. which reduces cost, time and effort, thereby resulting
x Safety: inclusion of semantics that represent in the timely treatment of the patient. But, there are
process requirements related to safety, and the apparent concerns regarding whether we can trust
ability to highlight inconsistencies in the healthcare software solutions.
process model with respect to safety-related We have identified that there is a gap, and
processes. therefore, a consequent need to introduce a
x Functionality: the functions at the level Trustworthiness Healthcare Software Model. In this
expressed in functional requirements of the study, we have focused on an initial definition of
model, emphasizing at the level of final user trustworthiness attributes from literature. We
functionality highlight our next steps towards the development of
x Reliability: the probability of the process the Trustworthiness Healthcare Software Model and
model delivering results that is consistent with its validation across the healthcare software sector.
the model assumptions.
x Regulation: decision support reference model
that will ensure that healthcare software ACKNOWLEDGEMENTS
products are safe and effective to protect and
promote public health through various “This work was supported with the financial support
standards and regulations. of the Science Foundation Ireland grant 13/RC/2094
x Validity: the ability of the process model to and co-funded under the European Regional
reflect the assumptions and constraints about Development Fund through the Southern & Eastern
the software process specified by process Regional Operational Programme to Lero - the Irish
stakeholders. Software Research Centre (www.lero.ie)”.
x Accuracy: the measurement tolerance, or
transmission of the process model that defines
or removes the limits of the errors. REFERENCES
Amoroso, E., Taylor, C., Watson, J. and Weiss, J., 1994,
6 FUTURE RESEARCH November. A process-oriented methodology for
assessing and improving software trustworthiness.
In Proceedings of the 2nd ACM Conference on
Having established a foundation for the Computer and communications security pp. 39-50.
Trustworthiness Healthcare Software Model by Armitage, A and Keeble-Allen, D. 2008."Undertaking a
identifying the key attributes of trustworthiness from structured literature review or structuring a literature
a healthcare software perspective, we will continue to review: Tales from the field", Electronic Journal of
455
HEALTHINF 2017 - 10th International Conference on Health Informatics
Business Research Methods 6 (2), pp. 103-114. McCaffery, F., Dorling, A. and Casey, V. (2010), “Medi
Available www.ejbrm.com. SPICE: an update”, available at: http://
Boehm, B., 2006, May. A view of 20th and 21st century eprints.dkit.ie/48/ (accessed 14 November 2016).
software engineering. In Proceedings of the 28th McHugh, M., McCaffery, F. and Casey, V., 2012. Software
international conference on Software engineering pp. process improvement to assist medical device software
12-29. ACM. development organisations to comply with the
Burton, J., McCaffery, F. and Richardson, I., 2006, May. A amendments to the medical device directive. IET
risk management capability model for use in medical software, 6(5), pp.431-437.
device companies. In Proceedings of the 2006 Merriam-Webster, 2004. Merriam-Webster's Collegiate
international workshop on Software quality pp. 3- Dictionary. Merriam-Webster.
8.ACM. Nicholas, J., Larsen, M.E., Proudfoot, J. and Christensen,
Carbone, M., Christensen, A.S., Nielson, F., Nielson, H.R., H., 2015. Mobile apps for bipolar disorder: a systematic
Hildebrandt, T. and Sølvkjær, M., 2013, August. ICT- review of features and content quality. Journal of
powered Health Care Processes. In International medical Internet research, 17(8).
Symposium on Foundations of Health Informatics Olff, M., 2015. Mobile mental health: A challenging
Engineering and Systems pp. 59-68. Springer Berlin research agenda. European journal of
Heidelberg. psychotraumatology, 6.
Carroll, N. 2016. Key Success Factors for Smart and Petticrew, M.A. (2001)."Systematic literature reviews from
Connected Health Software Solutions, Computer, Vol. astronomy to zoology: Myths and misconceptions",
49, No. 11, pp. 32-38. British Medical Journal 322 (7278), pp. 98-101.
Carroll, N. and Richardson, I., 2016. Software-as-a-Medical Available www.bmj.com/cgi/contact/full/322/7278/98.
Device: Demystifying Connected Health Shojania, K.G. and Dixon-Woods, M., 2016. Estimating
Regulations. Journal of Systems and Information deaths due to medical error: the ongoing controversy
Technology, 18(2). and why it matters. BMJ Quality & Safety, pp.bmjqs-
Catwell, L. and Sheikh, A., 2009. Evaluating eHealth 2016.
interventions: the need for continuous systemic The Daily Mail: Health warning over blood pressure
evaluation. PLoS Med, 6(8), p.e1000126. monitoring apps as doctors warn they are ‘untested,
Clarke, P., Lepmets, M., McCaffery, F., Finnegan, A., inaccurate and potentially dangerous’. Available
Dorling, A. and Flood, D., 2014, November. at: http://www.dailymail.co.uk/sciencetech/article-
MDevSPICE-a comprehensive solution for 2887791/Health-warning-blood-pressure-apps-doctors-
manufacturers and assessors of safety-critical medical warn-untested-inaccurate-potentially-dangerous.html.
device software. In International Conference on United Nations. International Standard Industrial
Software Process Improvement and Capability Classification of All Economic Activities, Rev.3. New
Determination pp. 274-278. Springer International York.
Publishing. Van Velsen, L., Wildevuur, S., Flierman, I., Van Schooten,
European Commission (2014), “Green paper on mobile B., Tabak, M. and Hermens, H., 2016. Trust in
health (‘mHealth’)”, COM 219 final, SWD 135 Final, telemedicine portals for rehabilitation care: an
available at: http://ec.europa.eu/digital-agenda/en/ exploratory focus group study with patients and
news/green-paper-mobilehealth- mhealth (accessed healthcare professionals. BMC medical informatics and
November, 2016). decision making, 16(1), p.1.
Huckvale, K., Adomaviciute, S., Prieto, J.T., Leow, M.K.S. Wu, R., Ahn, G.J. and Hu, H., 2012, January. Towards
and Car, J., 2015. Smartphone apps for calculating HIPAA-compliant healthcare systems. In Proceedings
insulin dose: a systematic assessment. BMC of the 2nd ACM SIGHIT International Health
medicine, 13(1), p.1. Informatics Symposium pp. 593-602. ACM.
Huckvale, K., Car, M., Morrison, C. and Car, J., 2012. Apps Yang, Y., Wang, Q. and Li, M., 2009, May. Process
for asthma self-management: a systematic assessment trustworthiness as a capability indicator for measuring
of content and tools. BMC medicine, 10(1), p.1. and improving software trustworthiness.
Huckvale, K., Car, M., Morrison, C. and Car, J., 2012. Apps In International Conference on Software Process pp.
for asthma self-management: a systematic assessment 389-401. Springer Berlin Heidelberg.
of content and tools. BMC medicine, 10(1), p.1. Zhang, H., Kitchenham, B. and Jeffery, R., 2012. Toward
Institute of Medicine (2007) Preventing medication errors. trustworthy software process models: an exploratory
Washington (D.C.): National Academy Press. study on transformable process modeling. Journal of
Jepsen, T., 2003. IT in healthcare: progress report. IT Software: Evolution and Process, 24(7), pp.741-763.
professional, 5(1), pp.8-14.
Larsen, M.E., Nicholas, J. and Christensen, H., 2016. A
systematic assessment of smartphone tools for suicide
prevention. PloS one, 11(4), p.e0152285.
Leroy, G., Chen, H. and Rindflesch, T.C., 2014. Smart and
connected health. IEEE Intelligent Systems, 29(3), pp.2-
5.
456
A Step Towards the Standardisation of HIV Care Practices
Abstract: Recent improvements to HIV care at the NHS Lothian Board have concentrated on a re-mapping of the pro-
cesses involved in their existing Integrated Care Pathway (ICP), in order to incorporate improvements identi-
fied during the ICP implementation and consider new advances in care. Our work aims to extend and enhance
this mapping by formalising care workflows using our logic-based tool WorkflowFM. This paper presents our
progress to date in terms of methodology and initial findings concerning actors, resources and workflows in-
volved in the first 3 months of HIV care for the Chalmers Sexual Health Centre. We argue that the resulting
models and analysis could address some of the difficulties faced by units providing HIV outpatient care.
1 INTRODUCTION for the first 3 months of HIV care since April 2012
(Wielding et al., 2013). The ICP acts as a map of
HIV infection is a major global concern. In 2015, the patient’s journey through care and was devised
36.7 million people were living with HIV, and it was through a development process following a recog-
the cause of 1.1 million deaths worldwide (UNAIDS, nised methodology (ICPUS, 2007) that involved mul-
2016). HIV care is complex and lifelong, which tidisciplinary HIV care teams – consultants, nurses,
makes the efficient collaboration of multidisciplinary pharmacists, other health professionals – and pa-
teams at local, regional and national levels important tient representatives. Its creation proceeded mainly
(HIS, 2011). In Scotland, a recognition of the incon- through an adhoc identification of the various activ-
sistency of existing HIV services has led in 2011 to ities involved in the provision of care and resulted
the consideration of Integrated Care Pathways (ICPs) in documents intended to capture a multidisciplinary,
as a key priority area within HIV standards (Standard chronological and structured case-record for each pa-
9 (HIS, 2011)). ICPs are recognised as valuable in the tient. The developed ICP pathway documents were
long term management of HIV as a chronic disease, first used in paper, and since 2014, electronic form.
but the particular complexity of the first 3 months of The development and use of the NHS Lothian
care following diagnosis resulted in a prioritisation of HIV ICP helped not only improve and maintain a
support for developing ICPs for the first 3 months of consistent standard of care amongst patients, but also
HIV care across the NHS Boards (HIS, 2013). identify a range of potential improvements to care de-
An ICP is defined as “a structured chronological, livery. These included, for example, routinely check-
multidisciplinary clinical record, developed by local ing vaccination status prior to clinic visits, checking
development groups, to suit a local situation” (SPA, results prior to patient attendance, cutting down on
2016) and NHS Scotland uses the one proposed by the redundant documentation and instigating some self-
Scottish Pathways Association (SPA). The SPA also completion of social and mental health status infor-
points out that an ICP could contain a chronological mation. Implementing such changes requires an on-
plan of a patient’s care or treatment, usage protocols, going re-thinking and recording of the flow of pro-
information on guidelines or instructions, sign off cesses. This is not uncommon, as ICPs are regarded
sections for allocating responsibilities for entries and by the research community as continuous care process
variance tracking sections for recording cases when improvement interventions (Vanhaecht et al., 2010).
the patient does not follow the usual pathway. As part of the continuous improvement process,
The NHS Lothian Board has been using an ICP we started a detailed, post-hoc mapping of the work-
457
Alexandru, C-A., Clutterbuck, D., Papapanagiotou, P., Fleuriot, J. and Manataki, A.
A Step Towards the Standardisation of HIV Care Practices.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 457-462
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
458
A Step Towards the Standardisation of HIV Care Practices
nurses vary from doing basic clinical tasks such as care in the Lothian Sexual and Reproductive Health
taking bloods or doing urine analysis (Band 2, also Service in 2011 and adopted for use in HIV care in
known as clinical support workers), to giving pre- 2014. Both of the systems are important for HIV care
scribed vaccines and treatments (Band 5), deciding on in Chalmers. NaSH is used in all clinics in Scotland
treatment and seeing patients independently (Band 6, for sexual and reproductive health care and facilitates
the majority in Chalmers) and having all of the pre- communication with other sexual health clinics, re-
vious responsibilities but also a leadership role in the placing paper records. The HIV database facilitates
management of HIV care (Band 7). Senior nurses prescribing and helps ensure that all of the necessary
(Bands 6 and 7) are usually the first point of con- steps for the first 3 months of care have been per-
tact for new patients. They also have health advi- formed. However, the two systems are not integrated
sor roles within their team, and thus can discuss part- and they contain numerous common fields, thus lead-
ner notification with patients. Additionally, during the ing to a lot of duplication. Keeping information up-
first 3 months of care they act as ICP Leads, making to-date and consistent between them is time consum-
sure that the ICP documents are completed within this ing and an ongoing concern. Common fields are of-
time. Senior nurses have their own appointments with ten in different formats. Moreover, each of the sys-
patients for completing the required elements of care tems has additional fields and functionality, making
and filling in the ICP documents. Consultants are information very scattered and requiring clinicians to
specialist HIV clinicians who see patients for a med- frequently move between the two systems. To speed
ical review and decide on their treatment. They work this up at regular meetings discussing the manage-
during Monday or Thursday afternoon clinics to see ment of each patient who is to be seen that week,
their own patients (6-8 appointments). They may also workarounds have evolved. Standard patient letters
be contacted about them outside of these clinics. On developed on NaSH have been introduced, contain-
a rotational basis, they occupy the role of senior gen- ing an overview of the patient’s health status, medi-
itourinary medicine (GUM) consultants covering cation, immune status and serology and highlighting
the clinic throughout the day, which involves being any issues or outstanding tasks and gaps in the ICP
available for consultation with the senior nurses, see- documentation. These are updated by clinicians af-
ing patients in person for urgent cases (e.g. a patient ter each patient appointment with the primary purpose
being unwell), or liaising with the pharmacist regard- of forwarding them to the general practitioners (GPs)
ing emergency medication requests. Pharmacists are or using as transfer letters, but also serving as a con-
responsible for medicine reconciliation (i.e. checking cise summary of the ICP and its completion during
what other medication patients are already on, what meetings. After each appointment, consultants and
drug allergies they have and checking for interaction nurses also write clinical note summaries on NaSH,
with their ARV regimen), advising patients on treat- which are also used in meetings. Moreover, pharma-
ment options and dispensing drugs. Clinical pharma- cists use a paper care plan when discussing prescrip-
cists also take part in formal and informal meetings tions, which is pre-populated with blood results and
with doctors and senior nurses to decide on HIV treat- clinical issues from the two systems.
ment initiation and treatment changes, providing ex- HIV clinicians may sometimes need to consult
pertise on appropriate drug choices, interactions and other computer systems that do not currently commu-
suitability. During the first 3 months of HIV care, the nicate with NaSH or the HIV database: Trak for de-
clinical coders are responsible for keeping the com- mographics, lab results, ordering other tests including
puter records up-to-date and consistent and moving imaging, and for onward referral to other specialities
information on blood results from electronic form to a (Trak is the main patient management system for hos-
paper care plan for pharmacists for weekly meetings. pital services in Lothian, so patients will have a record
there if they are seen for other conditions), Apex for
4.2 Resources Used lab results and SCCR for cervical smear test results.
Chalmers currently use two main computer systems 4.3 First 3 Months of HIV Care
to support HIV care: an Access database, initially
developed for infectious diseases in the Western Gen- A patient may enter the HIV care pathway through
eral Regional Infectious Disease Unit (RIDU), which different means: he/she may be newly diagnosed with
now also contains forms for the ICP checklists, and HIV – either in Chalmers or in one of the numerous
the National Sexual Health System (NaSH), a com- Outreach clinics doing point of care testing in Lothian
prehensive patient management system for sexual and – or transferred from another HIV health centre, or re-
reproductive health which was introduced for clinical ferred from their GP. Once he/she enters the pathway,
459
HEALTHINF 2017 - 10th International Conference on Health Informatics
the ideal workflow involves the following processes: ation. The pharmacist may discuss treatment op-
1. No matter how he/she entered the pathway, the tions with the patient, help him/her make a deci-
patient is seen for a one hour first visit by one sion and provide the drugs.
of the senior nurses. Patients who were recently 4. For most patients, the baseline assessment and
diagnosed in Chalmers are given their diagnosis ICP are completed within 3 months of entering the
during this visit. Moreover, all patients have a pathway. Appointment frequency then decreases
confirmatory HIV antibody test and other baseline once patients become more stable and their vi-
investigations (depending on whether they have ral load is undetectable (usually within 6 months).
done some of them previously) and have an initial For patients who have an undetectable viral load
discussion with the senior nurse which varies very on therapy and do not have significant psycholog-
much case-by-case, but usually is about how they ical or social problems or other physical comor-
feel, what HIV means to them and how they are bidities, visits then occur every 6 months as part
going to cope. Very importantly, during the first of the organised programme of routine care.
visit with a patient the senior nurse fills in as much
as possible of his/her NaSH record, registers the These processes seem mostly sequential and quite
patient on the database and fills in as much as straightforward. However, we have marked them as
possible of the ICP checklist from the database to- ideal because they only apply to patients who do not
gether with the patient. The senior nurse must also require a lot of support, who are at a stage in their
discuss with the patient about his/her availability disease when things can progress at a normal pace,
and preference for a certain consultant (e.g. some not needing an urgent medical review, and for cases
patients may wish to be seen by the same con- where emergencies never occur. Moreover, they rely
sultant as their partners). This, together with the on the availability of staff and patients, and in partic-
availability of the consultants and the day of the ular limited numbers of staff and increasing numbers
patient’s first visit, will inform the senior nurse’s of patients in Chalmers are an issue. In reality, the
decision regarding the team (Monday or Thurs- ideal workflow occurs rarely. More often than not the
day) and consultant to whom to allocate the pa- workflow has variances such as exceptions, optional
tient. A diagrammatic representation of the work- processes, repeated processes, or processes happen-
flow for the first visit for new patients after they ing in any order, making it very complex. Such vari-
have received their diagnosis is presented in Fig. ances are due to the patients’ state, need for support
1, and will be discussed in subsection 4.4. Af- and how this evolves over time:
ter the first visit, the senior nurse books an ap- 1. Sometimes a senior nurse must make a decision
pointment for the patient with his/her consultant to bypass a patient’s first visit in order to have
(the medical review visit) within the following 2 him/her see a consultant sooner. In such situa-
weeks, when investigation results are back. tions, the items from the first visit usually need
2. The patient attends the first medical review visit, to be deferred to later, one or more, regular (30
during which the consultant usually discusses minute) appointments with the senior nurse. The
with him/her presenting issues, past medical his- most important cases are the following:
tory, medications, sometimes family history, and
• If a new transferred in or referred patient is
decides on a management plan. Depending on the
found during an initial prioritization before the
patient, antiretroviral treatment options may also
first visit (by checking the transfer/referral let-
be discussed at this time. The consultant ideally
ter or calling the patient on the phone) to be
fills in medical fields on NaSH and the database
unwell or already taking antiretrovirals and not
during this discussion. After the visit, the consul-
having enough medication left, the senior nurse
tant summarizes the discussion in a NaSH clinical
will set up an early medical review appointment
note and fills in the standard patient letter from
for him/her with an available consultant.
NaSH which, with the patient’s approval, is for-
warded to his/her GP. • When a patient seems unwell and needs an ur-
gent review when coming in for his/her first
3. If an antiretroviral treatment regimen has been
visit, the senior nurse contacts the senior GUM
decided, the consultant contacts the pharmacists
consultant to see him/her immediately.
about the treatment decision or proposed op-
tions. One of them will meet with the patient 2. Especially if newly diagnosed, a patient may feel
(pharmacist visit) within the same clinic to col- distressed and need additional support, and so the
lect information on medications and drug aller- senior nurse may need to meet with him/her re-
gies and make a decision on medicine reconcili- peatedly (regular nurse 30-minute visits) after the
460
A Step Towards the Standardisation of HIV Care Practices
Figure 1: Workflow for the first visit after diagnosis for new patients.
first visit. The nurse will usually try to fit such there is also important background work happening
subsequent appointments in the same day with the in Chalmers during the first 3 months of care. In
patient’s medical review visit with the consultant, particular, the two Chalmers HIV teams, the Monday
but this is not always possible. and the Thursday team, meet every week to discuss
3. Following a senior GUM consultant visit, or the the management of the patients who are scheduled in
first visit with the senior nurse, depending on clinic that week, and to check progress with the ICP.
his/her state a patient may require an early review Patients are discussed in turn, using the NaSH sum-
appointment (occurring earlier than the default 2 mary page (projected onto a screen from the system),
weeks) to be booked with a consultant. the pharmacists’ care plan with pre-filled bloods and
clinical details and their printed provisional prescrip-
4. Following a medical review visit, a consultant tions. If a patient’s status is not clear or more up to
may decide that early follow-up appointments are date information is needed, the team may also browse
necessary, e.g. if the patient has abnormal results, through clinical notes or other pages from NaSH, the
medical issues, mental issues, is vulnerable, has HIV database and even other systems such as Apex.
comorbidities that affect his/her immune status or Once a week, clinical coders move any additional in-
will require an STI screen or vaccination. formation from NaSH onto the ICP checklists from
Another important exception is given by the fact the database. The ICP leads (senior nurses) check
that senior nurses often do not manage to finish filling progress with the ICP checklists on the database for
in all of the relevant parts of the NaSH and ICP check- each patient and flag up missing information before
lists from the database during first visits. In this case, the meeting during their admin time. They may use
they need to, sometimes repeatedly, book additional clinical notes to remind consultants to fill it in. Once
routine nurse appointments with the patients. information of a form is complete, they sign it off.
The steps required for filling in information on
the systems are, actually, often performed in an order 4.4 Rigorous Workflow Modelling
which depends on the patient’s state and needs, and
earlier or later within the actual visits, which makes As mentioned previously, we model and compose the
them optional at different times. Although there is an workflows involved in the first 3 months ICP using
expectation for consultants to fill in some information WorkflowFM, a graphical tool built on top of logi-
on the systems, we have found that this is not done cal foundations. Processes in WorkflowFM are rep-
consistently, as they prioritise patient care. Some have resented visually as rectangles, and their inputs and
expressed their concern about the unclear sharing of outputs as edges. An example diagram of the work-
responsibility for filling in the ICP checklists, and the flow for the first visit for new patients after they have
lack of time to do this during an appointment. received their diagnosis is provided in Fig. 1.
Another less frequent exception is given by the In this, one can clearly identify processes that are
case of patients whose level of urgency for being seen independent and can therefore be performed concur-
for a medical review is not completely clear to the se- rently, in any order. For example, once the patient
nior nurse after their first visit. In such circumstance, attends for the first visit, the senior nurse can per-
the senior nurse first discusses with a consultant be- form different investigations, have an initial discus-
fore booking subsequent appointments for the patient. sion with the patient, commence the NaSH clinical
Apart from the work directly involving patients, record, register him/her on the database or discuss
461
HEALTHINF 2017 - 10th International Conference on Health Informatics
462
Sharing of Big Data in Healthcare: Public Opinion, Trust, and Privacy
Considerations for Health Informatics Researchers
Laura Moss1,2 , Martin Shaw2 , Ian Piper2 , Christopher Hawthorne3 and John Kinsella1
1 Department
of Anaesthesia, Pain & Critical Care, School of Medicine, University of Glasgow, Glasgow, U.K.
2 Department of Clinical Physics, NHS Greater Glasgow & Clyde, Glasgow, U.K.
3 Department of Neuroanaesthesia, NHS Greater Glasgow & Clyde, Glasgow, U.K.
Keywords: Big Data, Privacy, Critical Care, Data Analysis, Trust, Data Security.
Abstract: Advances in technology has transformed clinical medicine; electronic patient records routinely store clinical
notes, internet-enabled mobile apps support self-management of chronic diseases, point-of-care testing enables
laboratory tests to be performed outside of hospital environments, patient treatment can be delivered over wide
geographic areas and wireless sensor networks are able to collect and send physiological data. Increasingly,
this technology leads to the development of large databases of sensitive electronic patient information. There
is public interest into the secondary use of this data; many concerns are voiced about the involvement of private
companies and the security and privacy of this data, but at the same time, these databases present a valuable
source of clinical information which can drive health informatics and clinical research, leading to improved
patient treatment. In this position paper, we argue that for health informatics projects to be successful, public
concerns over the secondary use of patient data need to be addressed in the design and implementation of the
technology and conduct of the research project.
1 INTRODUCTION 2 BACKGROUND
Healthcare is rapidly changing and advanced technol- As technology advances, data is increasingly col-
ogy is enabling the collection of vast amounts of pa- lected through a variety of mechanisms. It is esti-
tient data. Consequently healthcare is experiencing mated that 2.5 quintillion bytes of data is currently
a Big Data phenomenon. Whilst health informatics generated each day (IBM a, 2016). Big Data is a term
research is focused on the development of novel ap- which is now commonly used to describe such large
proaches to enable the intelligent analysis of this data, and complex datasets. Advanced analytics are often
the use of electronic patient data to advance these ap- applied to Big Data to extract meaning, insights and
proaches and the implementation of these technolo- discovery of new knowledge. However, using these
gies within real world healthcare environments raises large datasets presents challenges due to the data’s
many ethical questions and divides public opinion. volume (many sources e.g. sensors, social network-
In this paper we explore some of the issues regard- ing), variety (many formats, e.g. videos, text) and ve-
ing the use of electronic patient data for secondary locity (speed at which data is produced and require-
purposes, specifically trust, security and patient con- ments for near-real time processing). Other attributes
fidentiality. The paper is organised as follows: section can include veracity (noisy, messy data), variability
2 describes the prominence of Big Data within health- (meaning of the data can be constantly shifting) and
care and challenges faced; section 3 discusses issues fine-grained (Kitchen and McArdle, 2016).
raised in the sharing of data, in particular the involve- Within healthcare, the increasing use of technol-
ment of private companies and views of the general ogy is creating large volumes of clinical data; in 2011,
public; section 4 illustrates real-world issues faced the global size of healthcare data was estimated to be
whilst implementing a big data analysis platform into 161 billion gigabytes (IBM b, 2016). This influx of
a healthcare environment; section 5 discusses consid- data is from a variety of technical advances: e.g. en-
erations and opportunities for health informatics re- hanced clinical imaging, electronic medical records,
searchers; finally, section 6 concludes the discussion. and physiological sensors. Additionally, the growth
463
Moss, L., Shaw, M., Piper, I., Hawthorne, C. and Kinsella, J.
Sharing of Big Data in Healthcare: Public Opinion, Trust, and Privacy Considerations for Health Informatics Researchers.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 463-468
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
of wearable sensor devices (e.g. smart watches) is other research organisations can resolve many prac-
leading to patients themselves being able to generate tical issues for healthcare providers, it often involves
large amounts of healthcare data. the transfer of sensitive patient data to these organ-
The potential clinical benefit of using this data isations for research development and this can raise
is well established. Analysis of healthcare data can many questions. For example:
drive improvement in many areas, including: clini-
• Should electronic patient data be used for sec-
cal and organisation processes, optimisation of treat-
ondary research purposes?
ments, and reduction of healthcare costs through in-
tervention at an earlier point and more proactive and • Who does the electronic patient data belong to?
targeted care. Patient data can be used to predict clin- • Who should be able to use the electronic patient
ical risk, targeting resources where they are needed data? Public sector healthcare organisations (e.g.
most and identifying problems that would benefit NHS) and/or commercial companies?
from early intervention. Technologies that aid clin-
ical decision-making and help clinicians to manage • Who is collecting the data and where is it stored?
the exponential growth in medical knowledge offer • What safeguards should be put in place to protect
substantial opportunities to reduce variation, improve patient confidentiality?
the quality of care, and possibly lower costs (Jaspers • How do patients and relatives feel about the col-
et al., 2011), (Fillmore et al., 2013). lection and use of this data?
Whilst a thriving health informatics community is
focused on the development of novel approaches and Most countries have some form of regulation or
tools to enable the intelligent and sophisticated anal- processes which have been legally put in place to re-
ysis and use of healthcare data, the transfer of these solve some of the above issues. Additionally, insti-
technologies and ideas to real world clinical environ- tutions often have internal procedures and practices
ments faces many challenges. Healthcare providers in place to protect patient data. However, public
often do not have access themselves to data sci- perception of the adequacy of these frameworks can
ence expertise, required technology infrastructure and be divided and concerns raised about whether pri-
funding to do this themselves. In many cases, to en- vate companies, in particular, can be trusted with pa-
able the potential for big data analysis to improve tient data. For example, the public sector can be per-
healthcare, partnerships have to be formed between ceived as more trustworthy than profit-making organ-
healthcare providers, research organisations and pri- isations when using patient data (Focus Groups et al.,
vate companies. High profile examples include Deep- 2013). Recent publicity in cases such as DeepMind’s
Mind and IBM Watson technology. IBM’s Watson is arrangement with the Royal Free Hospital, London,
being used within oncology in US and Canadian hos- has been controversial and highlighted the require-
pitals to assess tumours (IBM c, 2016) and DeepMind ment for more robust safeguards to be put in place to
is using patient data from UK hospitals to develop ensure patient data is adequately secured (New Sci-
diagnostic tools in areas such as acute kidney injury entist, 2016). Additionally, there are constant reports
(DeepMind a, 2016) and ophthalmology (DeepMind in the media about data leaks and unsuccessful, large-
b, 2016). scale, health I.T projects (Presser et al., 2015).
It also raises issues about whether patient con-
sent and public awareness of healthcare data shar-
ing is adequate. A number of studies have identified
3 TRUST, SECURITY AND that there is low awareness by the general public of
PRIVACY electronic patient record systems and how and why
healthcare data might be used (BMA, 2016) (Rior-
Trust and confidentiality between a clinical provider dan et al., 2015). Riordan et al (Riordan et al., 2015)
and patient is not new: it is central to the practice found that most people would prefer to opt-in before
of healthcare and has been focused on since Hip- their identifiable records were used and half of partic-
pocrates. Whilst the concept of patient confidential- ipants would share their de-identified records under
ity has endured as an ideal throughout history, the implicit consent. A recent consultation with the gen-
precise nature of it has changed with the sociohis- eral public in the UK on this issue identified that they
toric context (for a detailed review see (A.Ferguson, had little confidence in the safeguards put in place to
2012)). In the digital age, patient confidentiality is protect data. Additionally, it was felt that there was
often framed within the context of electronic patient a lack of accountability within the system, and ma-
records and the potential involvement of third parties. licious use of data by private companies (e.g. phar-
Whilst the involvement of private organisations and maceutical and insurance) was a concern for many
464
Sharing of Big Data in Healthcare: Public Opinion, Trust, and Privacy Considerations for Health Informatics Researchers
people (BMA, 2016). Lessons learnt from the fail- care data can be divided and it is clear from these stud-
ure of large scale patient data sharing projects show ies and the opinions of other researchers (e.g. (van
the requirements for clear communication to the pub- Staa et al., 2016)), that for health informatics projects
lic, easy to understand consent rules and strong over- involving transfer and analysis of patient data by third
sight and communication regarding distribution and parties to be a success, the trust of the general public
use of patient data (Presser et al., 2015). For a more needs to be earned and respected by all involved.
detailed systematic review of the literature regarding
public responses to sharing of health data see (Aitken
et al., 2016b).
4 CHART-ADAPT CASE STUDY
To investigate the opinions of the general pub-
lic further, in a small study we asked the audience To illustrate some of the issues which may need to
at a science festival their thoughts on the topic of be considered in collaborative health informatics re-
secondary use of patient data (Kinsella et al., 2017). search projects, in this section we discuss some of the
Questions covered included: whether the participants actions which the CHART-ADAPT project instigated
were aware of the potential of using their medical to try and overcome data sharing concerns (CHART-
data for secondary research purposes; whether pa- ADAPT, 2016).
tient data should be used for research purposes and
The CHART-ADAPT platform allows the fast
how likely would they be themselves to share their
analysis of high and low frequency data collected
own personal data for research; if they trust clinicians
from a critical care unit; enabling the creation and
with their data; and their opinions on the role of pri-
assessment of novel, closed loop, diagnostic or ther-
vate/commercial companies in supporting and/or car-
apeutic models and algorithms. Routinely recorded
rying out research on their own medical data. 39 out
patient data is automatically transferred from the elec-
of 41 adults responded to the survey (from which we
tronic patient record system in the critical care unit to
have full results for 37 adults). Table 1 shows re-
a high performance computing platform implement-
sults from the survey. The vast majority of respon-
ing a Spark (Apache a, 2016), Scala (Scala, 2016) and
dents felt that their medical data should be used for
Hadoop (Apache b, 2016) technology stack. Complex
research purposes and would be happy to share their
physiological algorithms are then applied to the data
data. This is in keeping with a number of other studies
to derive clinically useful variables which are returned
(as summarised in (Aitken et al., 2016b). Addition-
back into the clinical environment and integrated with
ally, most respondents trusted clinicians, but when it
the existing electronic patient record system.
came to private companies, the response was mixed.
A lack of the required technical infrastructure
This difference in perceived trustworthiness between
within the hospital to process the patient data within
clinicians and private companies has been found pre-
clinically meaningful timescales meant it was es-
viously (e.g.(Aitken et al., 2016a),(BMA, 2016)).
sential for the healthcare provider and academic re-
We also looked for any age divide in the partici- searchers to form a collaborative team which included
pant’s responses. We asked which age category par- commercial partners to provide the required high per-
ticipants fell into (21 and under, 22-34, 35-44, 45- formance computing infrastructure.
54, 55-64, 65 and over) and three questions regarding Due to the nature of the collaboration and the re-
the involvement of private companies: 1) Would you quirement to transfer patient data, the project team
trust a private company to do research with your med- was aware of the need to maintain patient confi-
ical data? 2) Would you trust a private company to dentiality, the governance of patient data, and the
do research with anonymous medical data? 3) Would need to gain the confidence of patients and unit
you be comfortable with a private company provid- staff. Several concerns were identified: 1) failure of
ing the support to medical researchers to enable them the de-identification software and subsequent trans-
to do medical research? Tables 2 and 3 display the fer of identifiable patient data outside the health-
results of this analysis. In both age groups, more peo- care provider’s network, 2) secure handling of the
ple had positive responses (agreed or strongly agreed) anonymised patient data by the commercial partner,
than negative ones (disagree or strongly disagree). Al- 3) correct re-identification of patient data when it re-
though younger people are often thought to be more entered the healthcare provider’s network, and 4) pub-
confident with technology and data sharing, no siz- lic perception of a commercial partner supporting the
able difference between the two age groups was found patient data analysis. These concerns were considered
in this study. A larger sample size would be required from the start of the project and all the collaborating
to show statistical significance. organisations worked together to integrate the follow-
Public opinion and perception of the use of health- ing activities into the project plan:
465
HEALTHINF 2017 - 10th International Conference on Health Informatics
• Regulatory approval (beyond minimum require- and gather feedback which was fed into the devel-
ments) was acquired for the transfer of pa- opment of the project.
tient data (e.g. NHS Research Ethics, Caldicott
Although some activities were time-consuming
Guardian approval)
and beyond the usual scope of a research project, it
• The project developed software to automatically was beneficial not only for development of the plat-
anonymise the patient data before it left the form, but also to make sure, to aid future acceptance
healthcare environment. A rigorous testing plan of the technology, that we took the clinical staff and
was followed and repeated at regular intervals to general public with the project, rather than exclude
ensure confidentiality was maintained. them and present the technology as a fait accompli.
• The commercial partner responsible for techni-
cal support of the data analysis (Aridhia) devel-
oped an Information Governance Strategy for the 5 OPPORTUNITIES FOR
project which made explicit the data handling and HEALTH INFORMATICS
security procedures put in place. Close communi-
cation was also maintained between the personnel
RESEARCH
responsible for Information Governance in both
organisations (healthcare and commercial). Whilst public opinion on trust, security and privacy
of patient data needs be carefully considered in re-
• Public engagement initiatives were implemented. search projects, there is also an opportunity for the
For example, posters and leaflets were made avail- health informatics community to develop tools and
able in the unit, staff were briefed and updated on technologies to address these concerns. Below are
project progress, and a public event was hosted to some suggestions (although this is not exclusive) and
discuss patient data sharing within critical care. comments on how the health informatics community
may be able to contribute:
• Attendance at relevant academic and healthcare
events was scheduled into the project. This gave • Communication of Health Informatics Projects
the team the opportunity to discuss the platform - There is a need to develop clear, concise, up-to-
466
Sharing of Big Data in Healthcare: Public Opinion, Trust, and Privacy Considerations for Health Informatics Researchers
date summaries of health informatics projects to • Re-identification of Patient Data - Even when
aid transparency, in particular regarding the use patient data has been de-identified, there is still a
of patient data. Researchers should consider how possibility that it can be re-identified through the
they will engage the public when designing and use of other, publicly available, datasets. This is
implementing the health informatics project. likely to be a growing concern, especially with
initiatives to make more data available and ma-
• Dynamic Consent - Current mechanisms of in- chine readable (e.g. Semantic Web). Some so-
formed consent for patient data sharing are static, lutions to reduce the chances of this happening
paper-based and designed around legal frame- include: removal of high risk variables from a
works and regulation. They are also specific to in- dataset (e.g. features which are available in multi-
dividual research studies and have to be repeated ple documents and publicly available); and gener-
for subsequent studies. There is a growing aware- alisation of patient data into ‘bins’ of data (e.g.
ness that this is inadequate and future policies are values are generalised over 5 patients). Again,
moving towards a more sophisticated form of con- computing and artificial intelligence fields are
sent (e.g. the proposed EU General Data Protec- well placed to develop tools which enable the au-
tion Regulation (GDPR, 2016)). Dynamic con- tomatic identification of high risk attributes.
sent provides patients with a personalised inter-
face, placing them in control of how their health-
care data is used; data sharing preferences can
be stated and often they can view how their data 6 CONCLUSION
is being used by researchers (Kaye et al., 2015),
(Williams et al., 2015). Once consent has been The health informatics community has an important
specified by patients, new tools and technologies role to play in the development of novel technology
are required which enable their preferences to and algorithms to enable advances in clinical knowl-
be dynamically and automatically applied across edge and the quality of patient care. This type of re-
multiple clinical databases and research studies. search requires access to sufficient volumes of patient
data which raises important issues by the general pub-
• Safe Havens - To control how electronic pa- lic regarding ethics, trust and security of patient data,
tient data is used by researchers, many healthcare especially if private companies are involved in the re-
providers are making it accessible through Safe search activities. Our position is that, despite these
Havens (i.e. it doesn’t leave an authorised envi- concerns, it is necessary for private companies, re-
ronment) (Caldicott, 2016). Safe Havens pull to- search institutions and healthcare providers to work
gether data from multiple healthcare sources and together to successfully transition technology projects
links made between the datasets whilst maintain- from research to real-world environments. However,
ing patient confidentiality. Safe Havens require a it is vital that patient confidentiality is maintained dur-
suite of software tools to: ensure security of the ing all stages of development. There is a role for
centrally stored data (e.g. defend against cyber at- policy makers to ensure that existing legislation and
tacks), enforce data access controls, and audit the procedures are adequate for a fast moving technology
use of the patient data. Whilst basic tools have industry and that there is clear accountability. Addi-
been implemented, there is still potential for more tionally, there needs to be greater public engagement
sophisticated software to support these activities. on health informatics projects and open communica-
• De-identification of Patient Data - Generally, tion regarding the potential use of their data.
there is public support for the sharing of de-
identified data for research purposes. National
and international guidelines specify methods for ACKNOWLEDGEMENTS
de-identification and can include the removal or
generalisation of certain attributes. Experts can The CHART-ADAPT project is a collaboration be-
also be asked to identify attributes with an associ- tween the University of Glasgow, Aridhia, NHS
ated risk leading to patient identification. As re- Greater Glasgow & Clyde, and Philips Healthcare.
moval of data can lead to a lack of quality of the It has been co-funded by Innovate UK (ref:102113).
dataset overall, there is a balance to be struck be- Approval for the CHART-ADAPT work was granted
tween usability and patient confidentiality. This is by the West of Scotland Research Ethics Committee
a non-trivial optimisation problem which comput- (REC ref: 15/WS/0222) and local Caldicott Guardian
ing and artificial intelligence fields are well placed approval has been provided. Approval for the sur-
to contribute towards workable solutions. vey (section 4) was provided by MVLS, University of
467
HEALTHINF 2017 - 10th International Conference on Health Informatics
468
The Virtual Enterprise Data Warehouse for Healthcare
Abstract: Healthcare organizations have access to more data than ever before. Healthcare analytics is a vital tool for
healthcare organizations and hospitals to analyze performance, identify opportunities to improve, make
informed decisions, and comply with government and payor regulations. However, the field of medicine and
the political and regulatory landscape are constantly changing, thus these requirements and opportunities
rapidly evolve. The traditional best practice solution for business analytics is to organize and consolidate the
data into a dimensional data warehouse for analytics purposes. Due to the size of the data, the number of
disparate sources and the volume of analytics needs, the overhead to create and maintain such a data
warehouse is becoming prohibitive. In this paper, we introduce a virtual data warehouse solution that
combines the design and modelling principles of traditional dimensional modelling with data virtualization
and in-memory database architectures to create a system which is more agile, flexible and scalable.
469
McGlothlin, J., Madugula, A. and Stojic, I.
The Virtual Enterprise Data Warehouse for Healthcare.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 469-476
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
470
The Virtual Enterprise Data Warehouse for Healthcare
3 IMPLEMENTATION
3.1 EMR Data
For a hospital, the most important data source is the
hospital electronic medical record (EMR). Many
EMRs now supply data warehouse and analytics
solutions. Our goal is certainly to leverage these
solutions. However, we have found many instances
where we had to add custom extension tables because
of different processes at our hospital or different
analytics needs. Here are some of many examples:
a. Blood pressure on an office visit to be lowest
Figure 2: SAP HANA Platform. rather than last
b. Discharge provider on a hospital visit to be
physical source of the data. This allows us to move based on the bill rather than the treatment
the most important data to SAP HANA and to adjust team log
which data is stored in HANA based on optimization c. Provider attribution
needs. This has been shown to improve some d. Quality metrics that look for clinical events
queries’ performance by over 100x. There is no in both clinical documentation and the bill
impact or change required to the tools, reports or and claim
dashboards. We are terming our use of HANA as e. DRGs to include the secondary DRG coded
physical cache. Cisco DV handles moving the data on the bill
from the original source into HANA so no extra f. Cancellation reasons for cancelled
development effort is required. appointments or surgeries
We continue to use industry standard Kimball g. Different documentation data points for
dimensional modelling design for our virtual expected discharge delay reasons
enterprise data warehouse (Kimball, 2011). All of
Our challenge is that the vendor does not allow us
our data models are defined using facts, dimensions,
to change their tables. We can create our own tables
bridges and other standard data warehouse design
techniques. We implemented algorithms needed for but now extra logic and table joins is needed when
doing analysis and reports.
data integration such as patient matching, provider
We have defined a pure data model and metadata
attribution, cross walk tables, and standard code sets.
We created flexible, source-agnostic business model layer in our virtual data warehouse. In accordance
with traditional Kimball dimensional modelling, our
for healthcare using dimensional modelling. The
model matches the business model and analytics
primary difference is that this is a logical model, we
are not always physically populating tables that match needs, rather than the source (Kimball, 2011). So
even though three or four tables from the EMR
the model schema. Instead, we are using data
vendor data warehouse and extensions may be
virtualization views as appropriate. Figure 3 shows
the solution architecture. required, it will look like a single table in the virtual
enterprise data warehouse. This allowed us to cover
all of the information in the vendor data warehouse
with 40 less tables and to considerably reduce the
complexity of the queries used by reports and
dashboards.
For example, the vendor data warehouse has fact
tables for hospital visits, billing accounts, and
services. We wish to know the discharge provider
and last service for the hospital visit. For our hospital,
Figure 3: Cisco DV/SAP HANA Solution.
the discharge provider is inaccurate on the hospital
visit fact, but correct as the attending provider on the
hospital account fact. The last service is not the
hospital service on the hospital visit fact, but can be
determined by determining the last service for the
471
HEALTHINF 2017 - 10th International Conference on Health Informatics
patient chronologically. This logic is complex for a Bringing in these data sources is challenging. We
report writer and is very likely to create reporting have to match the patients and providers with those
errors. Specifically, the discharge provider on the already in our enterprise data warehouse. We have to
source table is not the correct discharge provider. We maintain the original source system identifiers, so we
were able to use data virtualization to create a single will be able to process updates or additional patient
hospital visit fact with the correct values for these information in the future. This information comes in
columns for our business. This allows our data at various times which we do not control, so we
governance team to choose the correct business cannot perform a daily extract as easily as our process
definition and us to expose it to the entire enterprise. for our EMR extraction. The data comes in many
The complex logic and the inaccurate columns from different formats and uses different code sets. So, the
the EMR vendor data warehouse are not exposed to logic needed to conform the data can vary depending
the user. However, the EMR vendor data warehouse on the source.
is still utilized to source the data. This allows us to We have brought in claims data both from payors
create a much better data warehouse for our clinical and from network affiliate providers. We have used
EMR data and our end users. custom extracts to bring in specific clinical
information from affiliate providers EMRs. In the
3.2 Other Clinical Sources future, we plan to bring in lab and pharmacy data.
We developed logic for patient matching and
With the current focus on preventive care and persisted the patient matching results and a crosswalk
population health, it is becoming more imperative to to the source system in our data warehouse. We then
have all information related to a patient’s health. This virtualized all of the other data. The end result was
can include data from outside of the hospital’s EMR that we created quality dashboards that examined
including claims, pharmacy and lab data. This can patients’ entire health across all of the clinical source
also include clinical data from independent providers systems. This dashboard only accessed the virtual
or Health Information Exchange(s). Furthermore, metadata abstract layer so the reports did not need any
hospital networks continue to consolidate, and often information about the source systems or formats.
the different hospitals and clinics are using different However, we did include metadata about the source
EMR systems. One key challenge health care system, so that users could know the data lineage of
business intelligence teams face is integrating clinical the information. This allows a physician at our
and operational data from multiple sources. hospital to know that his patient had a lab result from
Integrating data allows a provider or care coordinator an outside provider.
to be aware of patient office visits, diagnoses, lab
results, prescriptions, images and hospital visits 3.3 Non-clinical Systems
which occur outside of their primary EMR. This
improves care management and risk assessment, Our hospital has many sources of data which are not
allows gaps in care to be addressed and makes it clinical. However, all of these systems provide
possible to do quality metrics with complete increased value when analytics which includes the
information. Also, outside data can be used to better clinical data can be provided.
stratify patient risk. For example, decision support costing systems
For example, if we have pharmaceutical claims allow us to determine the costs associate to a billing
information, we can know if the patient received their transaction, a surgery, an order or a medication. This
flu vaccine at the local grocery store, and we can can include fixed and variable costs in many different
assess their adherence to medication orders. If we accounting buckets such as labor, supply and
have information from an affiliated overhead. Integrating this data with the clinical data
ophthalmologist’s EMR, we can know whether the warehouse lets us analyze costs related to specific
patient received their diabetic eye exam. If we have diseases, patient cohorts, locations, providers,
claims information, we can know about hospital procedures, etc. Because this data is managed in a
admissions while the patient was on vacation. We different system and is quite large, we do not want to
can connect with risk stratification engines to know physically consolidate this data so we are using our
what potential events the patient is most at risk for, data virtualization platform.
and what preventive care measures might help avoid We also have materials management and supply
these issues. We can use benchmarks to see how our chain information. This allows us to evaluate
admission rates, length of stay, supply cost and other inventory and purchasing contracts. This information
information compare to others in the industry. feeds our cost algorithms. There is significant value
472
The Virtual Enterprise Data Warehouse for Healthcare
in making this data available in our data warehouse information. We plan to use data virtualization to
for analytic purposes. integrate these benchmarks into the enterprise data
Another example is HR information. This warehouse so we can show opportunities, targets and
information often involves many different systems concerns in our dashboards and visualizations. We
and forms including position information, salary and have brought in many of the simple ones, and plan to
benefits information, provider credentialing and time bring in more comprehensive and detailed
and attendance. Including time and attendance with benchmarks in the future such as critical care length
the clinical events performed by the employee allows of stay by service and comorbidity.
us to evaluate productivity. We can analyze wages
and overtime to determine opportunities for improved 3.6 Patient Experience
resource management, training information and cost.
Other examples of peripheral non-clinical data It is important for a hospital to monitor patient
include accounts receivable collections information satisfaction. Patient satisfaction is measured through
and budgeting information. customer surveys. Generally, these surveys are
outsourced so they can be objective, fair and
3.4 Clinical Support Systems consistent. Analyzing the results of this external
information can provide the hospital valuable insight
There is a vast amount of clinical information into improvement opportunities.
available in hospitals which many not be in the central
EMR. This includes case management systems 3.7 Precision Medicine
which monitor physician reviews, expected
discharges, avoidable days, etc., statistical systems Precision medicine uses patient information to tailor
which are used for clinical details such as Apache personalized treatment. For example, analysing
(Knaus et al, 1981) and Prism (Murray et al, 1988) patients’ genomes can allow the most effective cancer
critical care evaluation techniques, lab systems treatment medication and therapy to be chosen. There
which have more detailed information about is considerable research funding being applied to
specimens collected or blood units supplied, precision medicine and it is considered a very
radiology systems which have detailed information significant development for improving healthcare
about images, and clinical engineering systems for treatment. (Jameson and Longo, 2015)
oncology, pathology, cath labs, etc. These systems Clinical information such as medications
vary for each hospital we have worked with. administered, medication reactions, diagnoses,
Generally, we have found it is not necessary to pathology results, and precise imaging information is
bring in all of the data from these ancillary systems. vital to properly tailor a personalized medicine
However, often specific key data points are very approach. So, important information exists in the
important to our data warehouse. We have used data enterprise data warehouse to identify the appropriate
virtualization to target and pull out specific data patient cohorts and monitor the progress of treatment.
elements which augment data structures we already However, precision medicine almost always
have in our data warehouse. involves gene analysis. Clearly, genome databases
are huge and cannot be consolidated physically into
3.5 Benchmarks our data warehouse. Thus, the data virtualization
approach is absolutely vital to implementing
Every hospital and healthcare organization wants to precision medicine.
know how it is performing relative to its peers. This
provides valuable insight identifying opportunities 3.8 FHIR
for achievable improvement. There are hundreds of
sources for benchmarks of all different varieties. Fast Healthcare Interoperability Resources (FHIR) is
Examples include quality benchmarks like Medicare a framework for next generation intercommunication
Stars ratings and Pay for Performance percentiles, between healthcare data systems. FHIR uses RESTful
financial benchmarks like supply cost for OR in the (representational state transfer) application
region, benchmarks like Centers for Medicare and programming interfaces (APIs) and defined data
Medicaid Services (CMS) length of stay by DRG. points and elements (resources) to exchanging
These are simple benchmarks but there are much information electronically. FHIR is a standard
more complicated clinical benchmarks and whole managed by the HL7 organization, the major
companies which special in providing benchmark standardization organization for healthcare data
473
HEALTHINF 2017 - 10th International Conference on Health Informatics
In addition to allowing us to integrate so many Many business intelligence tools such as SAP provide
different sources, our virtual enterprise data a metadata layer. However, our experience is
warehouse approach solves many problems we have different tools are required for different purposes.
encountered in our traditional healthcare data Many hospitals use both SAP tools and Tableau, Qlik
warehouses. or other visualization tools. In the past, it was
necessary to recreate the metadata layers and security
for each tool set or risk inconsistencies between
4.1 ETL Performance
applications. In our virtual data warehouse solution,
Because of the complexity of the healthcare data and the metadata is persisted in the data virtualization
EMR, we have found the daily process of extracting layer and consumed by all of our business intelligence
tools.
the data time-consuming. Best practice requires us to
have multiple data warehouses for production,
development and user acceptance testing. Generally, 4.4 Security
they source from the same operational data store for
the EMR. It has been a constant challenge to have Few things are more important to healthcare
this ETL finish in a timely manner. If we were to organizations than security. Compliance and privacy
increase the logic in this data warehouse regulations are very strict. The organization must
transformation, the ETL time would grow. If we were define who can see each piece of data. This includes
to bring other sources into the physical data object level security (can the user see this type of data
warehouse, the ETL time would definitely grow. Data at all based on their role) and row level security (can
virtualization allows us to avoid bringing other data the user view this specific data element based on the
sources into our physical data warehouse. It also value - such as location, patient, provider). The data
allows us to move some of the logic out of the virtualization layer provides a single place to define
physical data warehouse and into the abstraction and enforce security which will then be consumed
layer. consistently across the organization.
Healthcare information is very detailed. A week long Our source data becomes available at different times.
hospital stay can have as much as 10,000 separate Some data such as census we have enabled for almost
data points documented. There is a challenge both on realtime access. Much of the EMR data is available
disk space and ETL load time to get all this data into daily. Some external data such as claims may only be
the data warehouse. This problem is magnified when provided monthly. Some calculated data is only
data outside the organization such as claims updated quarterly. By disconnecting the source from
information and affiliate provider data is brought in the abstraction layer, we can have greater control over
and integrated. The growth in this data can be hard to when data is refreshed and can support on-demand
predict as can the additional data needs of the access, custom extracts, and pipeline push
organizations which are constantly evolving. consumption.
Clearly, the virtual data warehouse reduces the Additionally, it is important to make the data
physical disk space requirement by leaving some data always available and consistent to the user. We want
in place. Moreover, it is inherently scalable. Because to avoid restricting access during loads, but we never
the data transformation is not tied to the data storage want to provide partial or inconsistent information.
and consumers of the data are not connected to the The data virtualization layer gives us a place to
data storage, we can easily move where the data is manage this. Generally, we can provide stale data or
stored. This allows us the flexibility to integrate cloud cached data during updates.
474
The Virtual Enterprise Data Warehouse for Healthcare
4.6 Data Governance Miliard, M, 2014. Data variety bigger hurdle than volume.
In Healthcare IT News.
Sikka, V., Färber, F., Goel, A., Lehner, W., 2013. SAP
Data governance is a methodology and process for
HANA: the evolution from a modern main-memory
managing information as an asset. As part of the data data platform to an enterprise application platform. In
governance program, the hospital chooses which data Very Large Databases.
points are important, a standard name and definition Stonebraker, M., Abadi, D, Batkin, A. et al, 2005. C-Store:
for that data point, a correct source of truth, and who A Column-oriented DBMS. In Very Large Databases.
should be allowed to see the data. Data governance Kimball, R, 2011. The data warehouse toolkit: the
and metadata management is vital to obtaining “a complete guide to dimensional modelling. Wiley
single version of the truth”, which is a important yet Computer Publishing.
difficult goal. The virtual data warehouse gives all Bender, D, 2013. HL7 FHIR:An agile and RESTful
approach to healthcare information exchange. In
analytics and reporting users a single place to go to
CBMS.
obtain data. The data and logic can be defined in an Zikopoulos, P, Eaton, C, 2011. Understanding Big Data:
organized manner. The data dictionary provides the Analytics for Enterprise Class Hadoop and Streaming
definition in business terms and the data lineage in Data. McGraw-Hill Osborne Media.
technical terms. Users and data stewards can search Ellisman, M. and Peltier, S., 2003, December. Medical data
the data dictionary so that data is used consistently federation: The biomedical informatics research
rather than extracted repeatedly. All business network. In The Grid (Vol. 2).
intelligence tools can source the data from the data Bloom, K. and Cms Collaboration, 2014. CMS Use of a
virtualization layer allowing the logic and naming to Data Federation. In Journal of Physics: Conference
Series (Vol. 513, No. 4, p. 042005). IOP Publishing.
be consistent across the organization.
Kahn, B.K., Strong, D.M. and Wang, R.Y., 2002.
Information quality benchmarks: product and service
performance. Communications of the ACM, 45(4),
5 RESULTS AND CONCLUSION pp.184-192.
Tesch, T. and Levy, A., 2008. Measuring service line
success: the new model for benchmarking: the service
We have implemented our data virtualization line model benefits nearly all stakeholders involved in
approach at several major hospitals and continue to healthcare delivery. But how is its success measured?.
expand these projects. We have been able to Healthcare Financial Management, 62(7), pp.68-75.
successfully deploy the virtual data warehouse and Schneider, Polly. "How Do You Measure Success?." In
enable access to the physical EMR data warehouse Healthcare Informatics 15.3 (1998): 45-56.
quite quickly. Then, we grow and adjust this model to Raghupathi, W. and Raghupathi, V., 2014. Big data
bring in the other sources important to the enterprise analytics in healthcare: promise and potential. Health
analytics. All of our projects are still growing but we Information Science and Systems, 2(1), p.1.
have seen very encouraging early results including Goth, G., 2007. Virtualization: Old technology offers huge
new potential. IEEE Distributed Systems Online, 8(2),
faster project development times, user adoption of the p.3.
metadata, improved data governance implementation Feldman, B., Martin, E.M. and Skotnes, T., 2012. Big Data
and significant reduction in model complexity. in Healthcare Hype and Hope. October 2012. Dr.
With the growth in healthcare data in both volume Bonnie, 360.
and variety, and the growth in analytics needs, the Hopkins, B., Cullen, A., Gilpin, M., Evelson, B., Leganza,
traditional data warehouse and analytics approach is G. and Cahill, M., 2011. Data virtualization reaches the
simply not agile enough to scale for the needs of the critical mass. Forrester Report.
healthcare industry. By introducing data Lupúe, O.S., Vida, M.M. and Tivadar, L., 2012. Cloud
virtualization and in-memory persistent caching, and computing and interoperability in healthcare
information systems. In The First International
by preserving the dimensional model foundation of Conference on Intelligent Systems and Applications
the data warehouse approach, we assert that we have (pp. 81-85).
created a solution that is sufficiently agile to scale and Koufi, V. and Vassilacopoulos, G., 2008. Context-aware
grow with the needs of the modern hospital. access control for pervasive access to process-based
healthcare systems. Studies in health technology and
informatics, 136, p.679.
Knaus, W.A., Zimmerman, J.E., Wagner, D.P., Draper,
REFERENCES E.A. and Lawrence, D.E., 1981. APACHE-acute
physiology and chronic health evaluation: a
Leventhal, R, 2014. Report: Healthcare Data is Growing physiologically based classification system. Critical
Exponentially, Needs Protection. In Healthcare care medicine, 9(8), pp.591-597.
Informatics.
475
HEALTHINF 2017 - 10th International Conference on Health Informatics
476
Exercise and Wellness Health Strategy Framework
Software Prototype for Rapid Collection and Storage of Heterogeneous Health
Related Data
Petr Brůha1,2 , Roman Mouček1,2 , Pavel Šnejdar1 , David Bohmann1 , Václav Kraft1 and Peter Rehor1
1 Department of Computer Science and Engineering, Faculty of Applied Sciences, University of West Bohemia,
Univerzitnı́ 8, Pilsen, Czech Republic
2 NTIS - New Technologies for the Information Society, Faculty of Applied Sciences, University of West Bohemia,
Keywords: Exercise and Wellness, Chronic Disease, Health Related Data, Health Informatics Systems, Software
Prototype.
Abstract: Unwillingness of many people to assume responsibilities for a personal health, fitness and wellness seems to
be widespread. This can be partially remedied by individualized exercise and wellness program that integrates
the basic knowledge domains: lifestyle, sports and fitness, and nutrition and personal/environmental health.
However, collection, management and analysis of data and metadata related to these domains is demanding
and time consuming task. Moreover, the appropriate annotation of raw data is crucial for their next process-
ing. To promote such a program a software infrastructure for collection, storage, management, analysis and
interpretation of health related data and metadata has been proposed and part of this infrastructure has been
developed and tested outside laboratory conditions. This software prototype allows experimenters to collect
various heterogeneous health related data in a highly organized and efficient way. Data are then evaluated and
users can view relevant information related to their health and fitness.
477
Brůha, P., Mouček, R., Šnejdar, P., Bohmann, D., Kraft, V. and Rehor, P.
Exercise and Wellness Health Strategy Framework - Software Prototype for Rapid Collection and Storage of Heterogeneous Health Related Data.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 477-483
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
HEALTHINF 2017 - 10th International Conference on Health Informatics
to introduce such exercise and wellness health strat- ten make it difficult to carry on with daily routines and
egy framework and related academic program within relationships. Over the past decades, considerable
the European Union. Its attempt is to create profes- knowledge has accumulated concerning the signifi-
sionals who are capable influence self-care practices cance of exercise in the treatment of a number of dis-
positively, reinforce healthy habits and prepare re- eases, including diseases that do not primarily mani-
sponsible citizens for the future. This innovative, ap- fest as disorders of the locomotive apparatus. Today,
plied and unique initiative combines three tradition- exercise is indicated in the treatment of a large num-
ally exclusive disciplines (Etiology of Chronic Dis- ber of additional medical disorders. In the medical
ease, Exercise Science and Behavioral Psychology) world, it is traditional to prescribe the evidence-based
into one comprehensive curriculum that addresses treatment known to be the most effective and entail-
two major front page challenges in Europe: chronic ing the fewest side effects or risks. The evidence sug-
disease management and sedentary lifestyle. It is be- gests that an exercise therapy is just as effective as
ing applied through extensive clinical and fieldwork medical treatment in selected cases and even more ef-
experiences, the degree will provide students with the fective or improving the final effect in special situa-
theoretical knowledge, practical skills, and prerequi- tions. In this context, exercise therapy does not repre-
sites that are necessary to provide a professional guid- sent a paradigm change, it is rather that the accumu-
ance during lifestyle changes. lated knowledge is now so extensive that it has to be
Such exercise and wellness health strategy frame- implemented.
work needs a supportive software infrastructure that There is a growing interest in the use of exercise
besides others promotes collection of health related for clients with chronic diseases and disabilities. It
data and metadata followed by their further annota- is thus suitable to provide a framework for determin-
tion, processing and visualization. This paper intro- ing functional capacity and developing exercise strat-
duces the first version of such software infrastruc- egy in persons with chronic diseases and/or disabil-
ture,a software prototype that focuses on definition ities. The basic principles for exercise testing and
and automation of the data collection process in order training stated provides the foundation for program
to capture a huge amount of heterogeneous health re- design. However, some special situations created by
lated data from many users in various environment in a disease pathology, disability, or treatment alter these
a short time. It is assumed that the procedure of data basic principles. For example, exercise testing is an
collection has to be as short and user friendly as pos- important aspect of the approach used, but some peo-
sible to significantly promote the initial participants’ ple will not have completed an exercise test before
motivation to cope with the most important step, a de- starting an exercise program. Participation in regular
sired change of participants’ behavior leading to their physical activity can enhance functional capacity, and
better physical, emotional and mental health. a primary goal is to get more individuals physically
The paper is organized in the following way. active. Thus, for many people, exercise testing may
The next section discusses some questions related to not be absolutely necessary before starting a low-level
chronic illnesses, personal physical, emotional and physical activity program.
mental well-being and the necessity of exercise and Many people who have chronic disease or disabil-
wellness strategy framework to cope with these mat- ity enter a downward spiral toward exercise intoler-
ters. The third section introduces a supportive soft- ance, so exercise intervention programs should be de-
ware infrastructure for such a framework. The sub- signed to resist this spiral and optimize functional ca-
sections then present the first version of this software pacity. Within any given population, there is a wide
infrastructure from architectural, implementation, de- range of abilities determined by several factors; pro-
ployment and testing points of view. The last section gression of the disease, response to treatment, and
brings concluding remarks and introduces future steps presence of other concomitant illnesses. Expected
and improvements. outcomes of exercise training are not always known.
Realistically, optimal exercise and medical program-
ming may yield improvements or merely prevent fur-
2 EXERCISE AND WELLNESS ther deterioration. There may be recommended tests
or programs that have not been validated, but that ex-
HEALTH STRATEGY perience has shown to be successful. It is hoped that
FRAMEWORK optimal management will bring the individual greater
independence and improved quality of life.
Chronic illness has profound effects on a persons In general, our society has a bias toward curative
physical, emotional, and mental well-being, which of- rather than palliative medicine, toward making the
478
Exercise and Wellness Health Strategy Framework - Software Prototype for Rapid Collection and Storage of Heterogeneous Health Related
Data
disease go away rather than finding ways to cope with Since big health related data (from at least thou-
disease. An unfortunate consequence of this perspec- sands of people) are planned to be stored in the reposi-
tive is that for persons with chronic disease or dis- tory of this software infrastructure, the future analysis
ability, we devalue the palliative benefits of preserv- of interdependence between brain parameter values,
ing functionality and well-being. Since the 1960s, other physiological and body proportion values and
exercise has been promoted as a method of extend- personal lifestyle records would bring valuable results
ing life, largely through prevention and moderation of for the targeted application of exercise and wellness
cardiovascular disease. In recent years we discovered, health framework strategies.
however, that perhaps the greatest potential benefit Thus the whole infrastructure will enable to find
of exercise is its ability to strengthen musculoskele- out complex information related to health conditions
tal system structure and function, enhance function- of each participant and derive statistical results when
ing of cardiovascular, digestive and endocrine system defining various cohorts. With long-term and re-
and to augment mental capacity through changes in peated measurements appropriate software modules
body chemistry. Its side effects unlike other pharma- will be able to detect and depict personal trends and
cological interventions are positive (improvement and changes in measured values.
preservation in functional capacity, freedom, and in- However, the preliminary version of the soft-
dependence). ware infrastructure presented in this article (hereafter
The frameworks and applications that cope with called a software prototype) is required to help exper-
the questions of health and wellness and that are avail- imenters to efficiently collect all health related data
able to the broad public audience are described e.g. and metadata outside the laboratory environment in
in (Banos et al., 2015; Joo et al., 2012; Laakko et al., one session according to the procedure that could be
2008). defined even on site. The schema of such experimen-
tal procedure (that contains a limited set of measure-
ments) is depicted in Figure 1.
3 SUPPORTIVE SOFTWARE
INFRASTRUCTURE
479
HEALTHINF 2017 - 10th International Conference on Health Informatics
measurements are grouped into sections depending on • Average reaction time [ms]
measured parameters of human body. Every section • Best reaction time [ms]
includes one or more physical sites where the exper- • Worst reaction time [ms]
imenter takes the measurement. When a single mea-
surement is completed, the acquired data are inserted • Standard deviation [ms]
via a user interface into the system and sent to the 9. Flexibility
server. When the whole set of measurements is com-
• Difference between fingers and foot during
pleted, the data are evaluated, sent back to the client
deep forward bend [cm]
application and the participant can see his/her results
extended with additional information. The whole pro- 10. Color vision
cedure shown in Figure 1 takes approximately 10–15 • Number of wrongly recognized pseudoisochro-
minutes. matic tables
The following list contains the current set of de-
fined physical sites and health related data acquired at The whole software infrastructure as well as the
these sites: current software prototype is designed in a way that
allows easy enrollment of any future health related
1. Brain
data category, it means with any new collection of
• P300 latency [ms] health related data and metadata that could be de-
• Fundamental frequency during concentration fined even on site (just before the measurement). This
[Hz] put further requirements on the flexibility of the data
• Fundamental frequency during meditation [Hz] model itself and the technologies used for its repre-
sentation.
2. Body proportions
The software prototype can work in the online (de-
• Height [cm] fault) or offline mode. When it is connected to the
• Weight [kg] Internet, it sends all input data directly to the main
• Muscle mass [kg] or [%] server and receives back results and additional data.
• Body fat [kg] or [%] When the Internet connection is not available, the pro-
totype switches to the offline mode. In this mode all
• Body water [kg] or [%]
data are stored to a local repository and sent to the
• Body Mass Index (BMI) server immediately when the Internet connection is
3. Electrocardiography (ECG) again available.
• Heart rate [BPM] The parametric requirements on the prototype ap-
plication include its performance (input of health re-
• ST segment [ms]
lated data does not produce any visible delay), mobil-
• QRS complex [ms] ity (application can be used outside laboratory con-
4. Blood pressure ditions when several hundreds people are measured
• Heart rate [BPM] during a day), simplicity and user friendliness (exper-
imenters are able to work with the application after
• Systolic pressure [mm Hg] five minutes of training in the worst case).
• Diastolic pressure [mm Hg]
5. Blood sugar 3.2 Architecture and Design
• Concentration of glucose [mmol/l]
6. Spirometry The architecture of the software prototype is shown
in Figure 2. It follows the MVC architectural pattern
• FVC (Forced Vital Capacity) [l] and client server architectural style.
• FEV1 (Forced Expiratory Volume in 1st sec- The functionalities are encapsulated in modules
ond) [l] that can be added as plugins.
• PEF (Peak Expiratory Flow) [l/s]
• The General module covers functionalities afford-
7. Hand reaction time able also for non-logged users.
• Average reaction time [ms] • The Admin module serves for the administration
• Number of falsely pressed buttons of users and application setting.
• Number of missed buttons • The Auth module is responsible for user registra-
8. Leg reaction time tion and login.
480
Exercise and Wellness Health Strategy Framework - Software Prototype for Rapid Collection and Storage of Heterogeneous Health Related
Data
481
HEALTHINF 2017 - 10th International Conference on Health Informatics
482
Exercise and Wellness Health Strategy Framework - Software Prototype for Rapid Collection and Storage of Heterogeneous Health Related
Data
tions, overall data evaluation or improved data visual- int/chp/chronic disease report/en. International Jour-
ization. nal of Epidemiology, 35(4):1107–1107.
Webber, L., Divajeva, D., Marsh, T., McPherson, K.,
Brown, M., Galea, G., and Breda, J. (2014). The
future burden of obesity-related diseases in the 53
ACKNOWLEDGMENTS who european-region countries and the impact of ef-
fective interventions: a modelling study. BMJ open,
4(7):e004787.
This publication was supported by the UWB grant
SGS-2016-018 Data and Software Engineering for
Advanced Applications, the project LO1506 of the
Czech Ministry of Education, Youth and Sports under
the program NPU I and the 2nd Internal grant scheme
of UWB School of Computing, 2016.
REFERENCES
Banos, O., Amin, M. B., Khan, W. A., Ali, T., Afzal, M.,
Kang, B. H., and Lee, S. (2015). Mining minds:
An innovative framework for personalized health and
wellness support. In Pervasive Computing Technolo-
gies for Healthcare (PervasiveHealth), 2015 9th Inter-
national Conference on, pages 1–8. IEEE.
Blair, S. N., Cheng, Y., and Holder, J. S. (2001). Is physical
activity or physical fitness more important in defining
health benefits? Medicine and science in sports and
exercise, 33(6; SUPP):S379–S399.
Busse, R. (2010). Tackling chronic disease in Europe:
strategies, interventions and challenges. Number 20.
WHO Regional Office Europe.
Joo, M.-I., Chung, G.-S., and Lee, T.-G. (2012). Wellness
information system for smart healthcare. Journal of
Advanced Information Technology and Convergence,
2(2):25–34.
Laakko, T., Leppanen, J., Lahteenmaki, J., and Nummi-
aho, A. (2008). Mobile health and wellness applica-
tion framework. Methods of Information in Medicine,
47(3):217–222.
Lee, I.-M. and Skerrett, P. J. (2001). Physical activity and
all-cause mortality: what is the dose-response rela-
tion? Medicine and science in sports and exercise,
33(6; SUPP):S459–S471.
Organization, W. H. et al. (2010). Global recommendations
on physical activity for health.
Shephard, R. J. (2001). Absolute versus relative intensity of
physical activity in a dose-response context. Medicine
and science in sports and exercise, 33(6 Suppl):S400–
18.
Taylor, R. S., Brown, A., Ebrahim, S., Jolliffe, J., Noorani,
H., Rees, K., Skidmore, B., Stone, J. A., Thompson,
D. R., and Oldridge, N. (2004). Exercise-based re-
habilitation for patients with coronary heart disease:
systematic review and meta-analysis of randomized
controlled trials. The American journal of medicine,
116(10):682–692.
Tunstall-Pedoe, H. (2006). Preventing chronic diseases. a
vital investment: Who global report. geneva: World
health organization, 2005. pp 200. chf 30.00. isbn
92 4 1563001. also published on http://www. who.
483
An Adaptive Scrum Model for Developing Disease Registries
Abstract: This paper presents an adaptive model for developing disease registries. The proposed model is based on the
Scrum methodology. It can be used to draw a road map to identify priorities, inputs, outputs, team members
and exchanges for all tasks required to develop disease registries. Our model has been applied to real cases
from several Tunisian hospitals where it has improved the efficiency of the team members. The developed
disease registries are currently used in Tunisia. They allow medical researchers to identify origins of diseases,
establish new protocols, perform surveys and compute morbidity.
484
Bellaaj, H., Mdhaffar, A., Jmaiel, M. and Freisleben, B.
An Adaptive Scrum Model for Developing Disease Registries.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 484-491
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
An Adaptive Scrum Model for Developing Disease Registries
to (1) review and study health records of many in- ware projects, associated with corporate systems run-
dividuals, (2) answer questions about diagnostic dis- ning on mainframes. It is a structured methodology,
ease parameters and (3) build a knowledge database designed to manage complex projects that implicate
for each disease. many programmers and systems, having a high im-
A disease registry is a tool for tracking the clin- pact on the organization (Bourgeois, 2016).
ical care and outcomes of a defined patient popula-
tion. Most disease registries are used to support care 3.1.2 Rapid Application Development (RAD)
management for groups of patients suffering from one
or many chronic diseases, such as diabetes, coronary RAD is a software development methodology that
artery disease and asthma. In contrast to paper-based favors rapid prototyping on complex planning. In
registries that have been used to track patients suffer- RAD, modules are developed in parallel as proto-
ing from chronic diseases, digital registries provide types. Later, they are merged to the final product
users with an automated way to (1) store data, (2) cre- for faster delivery (Vickoff, 2000). The RAD method
ate, sort, and display lists of patients and (3) extract presents a secured and short development cycle fol-
data used for planning, quality improvement, report- lowing different phases: framing, design, building
ing, and direct care delivery (Hummel, 2000). with fixed duration. Each phase takes about 90 to 120
Digital disease registry functionality is included days. RAD includes methods, techniques and tools
(i.e., available as an add-on) in electronic health to achieve four potentially contradictory objectives:
record (EHR) products. In addition, stand-alone op- budget, deadlines, technical quality, functional qual-
tions can be implemented and are usually simpler to ity and visibility (Vickoff, 2000). The most important
set up than EHRs. Based on their priorities, some aspect for this model to be successful is to make sure
organizations may choose to implement digital dis- that developed prototypes are reusable.
ease registries as an interim step prior to implement-
ing a more comprehensive EHR system. Disease reg- 3.1.3 Agile Methods
istries can also provide more flexibility for reporting
and aggregating data from multiple data sources. To Agile methods aim to reduce the life cycle of soft-
implement a digital disease registry, an organization ware development by creating a minimal version and
needs to analyze and adjust practice workflows to sup- then integrating functionality by an iterative process
port new data collection requirements and to integrate based on a customer listening and tests throughout
the new information from their registry into decision the development cycle. The origin of agile methods is
making and planning (Hummel, 2000). linked to the instability of the technological environ-
ment and the fact that the client is often unable to de-
fine his or her needs exhaustively from the beginning
of the project. The term ”agile” thus refers to the abil-
3 RELATED WORK ity to adapt to changes in the context and changes in
specifications occurring during the development pro-
3.1 The Process cess. It was first coined in 2001 in the Manifesto
for Agile Software Development (Agile Manifesto)
A software development methodology is used to (Beck et al., 2001). Now, agile refers to any process
structure, plan, and control the process of develop- that follows concepts of the Agile Manifesto. There
ing an information system. Several methodologies to are four main points in the Agile Manifesto:
develop software have been proposed, such as Agile 1. Individuals and interactions over processes and
Software Development, Crystal Methods, Dynamic tools
Systems Development Model (DSDM), Extreme Pro-
2. Working software over comprehensive documen-
gramming (XP), Feature Driven Development (FDD),
tation
Joint Application Development (JAD), Lean Develop-
ment (LD), Rapid Application Development (RAD), 3. Customer collaboration over contract negotiation
Rational Unified Process (RUP), Scrum, Spiral, and 4. Responding to change over following a plan
Systems Development Life Cycle (SDLC). Three of-
The Agile Manifesto lists 12 principles to guide
ten used methods are discussed below.
teams on how to execute with agility. The principles
3.1.1 Systems Development Life Cycle (SDLC) are described below.
1. Our highest priority is to satisfy the customer
SDLC is considered to be the oldest project execu- through early and continuous delivery of valuable
tion framework. It can be used to manage large soft- software.
485
HEALTHINF 2017 - 10th International Conference on Health Informatics
2. Welcome changing requirements, even late in de- • ISO 13119:2012 describes metadata that re-
velopment. Agile processes harness change for lates to resources including medical knowledge.
the customers competitive advantage. This standard applies mainly to digital docu-
3. Deliver working software frequently, from a cou- ments, such as WWW resources, accessible from
ple of weeks to a couple of months, with prefer- databases or file transfers. It can also be applied
ence to the shorter timescale. to paper documents, such as articles in the medi-
cal literature (ISO 13119, 2012).
4. Business people and developers must work to-
gether daily throughout the project. • ISO 13606-1:2008 describes the communication
of some or all of the electronic health record
5. Build projects around motivated individuals. Give (EHR). The record of a patient is identified be-
them the environment and support their need, and tween the DSEs, or between this latest and a cen-
trust them to get the job done. tralized repository. It can be used to communi-
6. The most efficient and effective method of convey- cate an EHR system or repository with clinical ap-
ing information to and within a development team plications or middleware components that need to
is face-to-face conversation. access or provide EHR data (ISO 13606-1, 2008).
7. Working software is the primary measure of
3.2.2 Security Layer
progress.
8. Agile processes promote sustainable develop- We distinguish between different kinds of users: sys-
ment. The sponsors, developers, and users should tem administrator, group administrator (who estab-
be able to maintain a constant pace indefinitely. lishes the disease registry form, statistics parameters,
9. Continuous attention to technical excellence and therapy protocol, etc.), reference doctors, participant
good design enhances agility. doctors, analysts, developers, patients, simple users,
etc. A set of rules that defines the behavior of each
10. Simplicity: the art of maximizing the amount of
kind of users must be specified at the start of the
work not done – is essential.
project. Different security norms are defined for such
11. The best architectures, requirements, and designs systems. Two of them are described below:
emerge from self-organizing teams.
• ISO / TR 11633-1, 2009 concerns remote main-
12. At regular intervals, the team reflects on how to tenance services (RMS) for information systems
become more effective, then tunes and adjusts its in healthcare facilities. It presents an example
behavior accordingly (Beck et al., 2001). of a risk analysis that protects the information in
the medical information system (ISO/TR 11633-
3.2 The Product 1, 2009).
• ISO / TS 14441, 2013 examines the electronic pa-
The basic architecture of a digital disease registry
tient records systems at the point of clinical care
consists of four layers. They are described below.
that are also interoperable with EHRs. It treats
3.2.1 Data Layer their protections in terms of security and privacy
through a set of security and privacy rules. It in-
Data is stored in a specific electronic health record cludes guidelines and practices for conformity as-
(EHR), with data corresponding to parameters related sessment (ISO/TS 14441, 2013).
to the diagnosis of the disease, such as responses to a
3.2.3 Dashboard Layer
treatment. The included data respects specific proper-
ties, such as persistence, accuracy (Staroselsky et al.,
The dashboard layer is the main goal of disease reg-
2008) and validity (Carroll et al., 2007). There are
istries. It shows morbidity, mortality, survey curves,
three main ways to populate the registry with data:
treatment responses and illness origins. The plurality
1. directly through the fields in the disease form. of dashboard components is associated with a plural-
2. importing data using standard interoperability ity of types of health-care content and are based on
mechanisms, such as HL7 or CCD. Data is au- parameters received from a user.
tomatically inserted into the database.
3.2.4 Interoperability Layer
3. combining these two approaches.
The data layer must respect the international stan- Interoperability consists of communication between
dards. Among them are: healthcare organizations. The medical information
486
An Adaptive Scrum Model for Developing Disease Registries
5.1.2 Inspection
4 SCRUM
There are three levels of inspections that can be done
Scrum originates from the sporting term rugby mean- sequentially and at the same time according to the it-
ing: melee. Like this technical aspect of the game, the eration in question:
methodology asks its actors to be united in the accom- • functional validation by computer scientists
plishment of a project, in achieving a goal. A melee
is not a unique process. This is a part of the game • medical validation of the distribution of the fields
that is often found to move the team forward. In the to be entered, the logical and mathematical links
same concept Scrum uses a procedure that we name of the different variables
sprint. Each iteration or sprint provides a functional • validation of the possibility of statistical interpre-
part of product. Three pillars uphold every implemen- tation of the different variables
tation of empirical process control: transparency, in-
The second type of validation often leads to the
spection, and adaptation (Schwaber and Sutherland,
addition, deletion or modification of the type of pre-
2001). Scrum includes definitions, descriptions, con-
sentation of some fields. Development constraints
cepts and methods for better running projects. It de-
cause developers to modify a type of representation
fines details for: the Scrum team, the product owner
or an operating logic that can essentially lead to poor
(PO), the development team, the Scrum master, the
statistical quality. Inspection becomes foolish and can
Scrum events, the sprint, the daily Scrum, the sprint
greatly slow down the development process.
review, the sprint retrospective, the artifacts, the prod-
uct backlog, the sprint backlog and the artifact trans- 5.1.3 Adaptation
parency.
Scrum prescribes four formal events for inspection
and adaptation: sprint planning, daily scrum, sprint
5 AN ADAPTIVE SCRUM MODEL review and sprint retrospective. The fact that the
FOR DISEASE REGISTRIES project is carried out by people of different special-
ties, a misunderstanding of need can delay and burden
This section presents all adapted pillars, mechanisms, the concept of adaptation. Reports of daily meetings
and concepts for developing disease registries using at a frequency of maximally three days can be sent to
the Scrum model. the head of the medical study group.
487
HEALTHINF 2017 - 10th International Conference on Health Informatics
teams are self-organizing and cross-functional. In the In Scrum, it is recommended that the development
following, the needed skills, the specific mission, re- team includes 3 to 9 members to insure efficiency
lations and input / output of each of them are detailed. and global efficacy. For a disease registry, we have
For a disease registry, three teams should be estab- adopted this structure: 1 designer, 1 tester, 1 archi-
lished, which will work together and simultaneously: tect, 1 to 2 developers for security management and 3
the doctors who are members of the study group, to 9 Java developers.
statisticians and developers. The PO leads these three
teams and takes decisions after meetings including all 5.2.3 The Scrum Master
the teams or representative members of each of them.
Therefore, (s)he is the first person responsible for the The Scrum master is responsible for ensuring that
product backlog. Scrum is understood and implemented. It will play
The team model in Scrum is designed to optimize exactly the same roles as defined in the Scrum guide.
flexibility, creativity, and productivity. For disease Thus, it will ensure the availability of tools necessary
registries, flexibility is guaranteed by trust, designing, for the good understanding and adherence to Scrum
and good communication. Trust means the capability for the product owner and the development team.
of achieving a good job, possibly by young employ- Ideally, the Scrum master is a member of the de-
ees. Designing consists of giving priority to dispatch- velopment team. He or she is supposed to master no-
ing the members of the team and not the tasks. Pro- tions of statistics. In his or her profile, conducting
ductivity is increased by communication (e.g., regular research in medical informatics or participating in a
meetings), tools (e.g., management version applica- similar project is appreciated.
tions) and documentations.
Scrum teams deliver products iteratively and in- 5.3 The Scrum Events
crementally, maximizing opportunities for feedback.
An average incremental delivery period can be de- In Scrum, we attempt to fix regular events and to min-
fined as about 10% of the number of fields for form imize the need for unplanned meetings. All events
and dashboard pages. For the user management mod- are timed, so that each event has a maximum dura-
ule, 25% of the total number of user groups is appreci- tion. Once a sprint starts, it can not be shortened or
ated. For other modules, these values must be defined lengthened. Events end each time the associated goal
at the start of the project but cannot exceed two weeks is reached. Appropriate time must be allocated for
as a period to increase profitability. each sprint to avoid having waste in the process.
488
An Adaptive Scrum Model for Developing Disease Registries
0HGLFDO'LVHDVHIRUPGHYHORSPHQW
S
(OHFWURQLF'LVHDVHIRUPGHYHORSPHQW
5HTXLUHPHQWV $FFHSWDQFHWHVWLQJ
*HQHUDOGHVLJQ
&RPSRQHQWWHVWLQJ
VSHFLILFDWLRQ
'HWDLOHGGHVLJQ
8QLWWHVWLQJ
VSHFLILFDWLRQ
6RXUFHFRGH
The tip of the V represents the stage of realization of team meet the sprint goal?
the project. Each phase of the descending branch is
• What will I do tomorrow to help the development
related to a phase of the rising branch.
team meet the sprint goal?
In disease registry development, we have adopted,
for the first time, this kind of project organization • Do I see any impediment that prevents me or the
method. The same thing is done with the medical development team from meeting the sprint goal?
team to establish the disease form and the list of in-
cluded elements in a dashboard (statistics). For this 5.3.4 Sprint Review
purpose, two V cycles (i.e., a W cycle) are estab-
lished with intersection points (see Figure 1). These A sprint review is held at the end of the sprint to in-
points represent meetings between members of medi- spect the increment and adapt the product backlog if
cal and development staff. In addition to the compli- needed. During the sprint review, the Scrum team and
cated problems of return in the cycle for both teams, doctors (two or three doctors who have different spe-
the meeting management presented by the intersec- cialities), and members of the study group collaborate
tion points in Figure 1 must be handled. about what was done in the sprint.
In disease registry development, we recommend For the first six months, the sprint review should
that a sprint duration is between 1 and 2 weeks. The be done twice a month. After that, the frequency can
reduction of this value increases the profitability of be decreased to once a month. The meeting can take
the team, but may make the management of the dif- between 15 minutes and 1 hour.
ferent tasks complicated. In this stage, it is important In addition to the elements defined in the Scrum
to take into account the source version management guide, the sprint review includes (1) the team prob-
process. Two methods can be used: distribution ac- lems to understand field types and relations; (2) doc-
cording to functionalities or according to teams. The tors’ comments and validation about cognitive work-
first is strongly recommended for disease registries. load; (3) the steps to do by participating doctors and
(4) discussion of technical issues, system interoper-
5.3.3 Daily Scrum ability, privacy, confidentiality and lack of health in-
formation data standards.
The daily scrum is a 15-minute time-boxed event for
the development team to synchronize activities and 5.3.5 Sprint Retrospective
create a plan for the next 24 hours (Schwaber and
Sutherland, 2001). It is recommended that a mem- The purpose of the meeting is to improve the process
ber of the study group participates in the daily scrum. for the next sprint. The entire Scrum team partici-
Since doctors are usually solicited by their patients, pates in the meeting. The retrospective takes place
it is recommended to establish these meetings at the just after the sprint review, and the speakers who have
end of the day. Thus, a meeting should answer the attended can remain for the retrospective as observers
following questions: (Schwaber and Sutherland, 2001). The retrospective
• What did I do today that helped the development sprint clarifies the points of interference with the doc-
489
HEALTHINF 2017 - 10th International Conference on Health Informatics
490
An Adaptive Scrum Model for Developing Disease Registries
and institutes. The project was developed by 6 mem- Bourgeois, D. (2016). Information Systems for Business
bers. The product backlog has been updated several and Beyond. Textbook Equity Edition.
times due to the instability of both medical and devel- Carroll, N., Ellis, J., Luckett, C., and Raebel, M. (2007).
oper teams. Improving the validity of determining medication ad-
herence from electronic health record medications or-
During these projects, our new methodology has
ders. J. Am. Med. Inform. Assoc., 18(5):717–720.
improved the following indicators: dedication (ad-
Hammami, R., Bellaaj, H., and Kacem, A. (2014). In-
ditional sponteneous working hours reached up to teroperability for medical information systems: an
80%), focus (90% of the tasks were completed within overview. Health and Technology, 4(3):261–272.
deadlines), openness (the rate of misunderstanding Hummel, J. (2000). Building a computerized disease reg-
between team members was less than 5%), audac- istry for chronic illness management of diabetes. Clin-
ity (the team did not hesitate to name things, to ask ical Diabetes, 18(5).
questions and to propose new solutions), and continu- ISO 13119 (2012). Health informatics – clinical knowledge
ity (despite major changes in team composition, the resources – metadata. Standard, International Organi-
projects did not have any delays in delivery). More- zation for Standardization.
over, the use of our methodology has reduced the risk ISO 13606-1 (2008). Health informatics – electronic health
of failure by 95% in the case of TFAR. record communication – part 1: Reference model.
Standard, International Organization for Standardiza-
tion.
ISO/TR 11633-1 (2009). Health informatics – information
7 CONCLUSION security management for remote maintenance of med-
ical devices and medical information systems – part
1: Requirements and risk analysis. Standard, Interna-
In this paper, we have presented a new methodol- tional Organization for Standardization.
ogy based on Scrum for disease registry development. ISO/TS 14441 (2013). Health informatics – security and
Several actions have been proposed to improve team privacy requirements of EHR systems for use in con-
performance: (a) minimize the time of different iter- formity assessment. Standard, International Organiza-
ations, (b) facilitate code retrieval in the majority of tion for Standardization.
iterations, (c) clarify the descriptions and interactions McCulloch, D., Price, M., Hindmarsh, M., and Wagner, E.
between different fields, (d) maximize collaboration (1998). A population-based approach to diabetes man-
between the different teams and specialists involved, agement in a primary care setting: early results and
lessons learned. Effect. Clin. Pract., 1(1):12–22.
namely doctors, computer scientists and statisticians.
Schwaber, K. and Sutherland, J. (2001). The Scrum guide.
Our methodology has been applied to the Tunisian
Staroselsky, M., Volk, L., Tsurikova, R., Newmark, L., Lip-
Fanconi Anemia Registry, the Tunisian Non-Hodgkin
pincott, M., Litvak, I., Kittler, A., Wang, T., Wald,
Lymphoma Registry and the Tunisian Gaucher Dis- J., and Bates, D. (2008). An effort to improve elec-
ease Registry. The developed registries are currently tronic health record medication list accuracy between
used in several hospitals in Tunisia. visits: patients’ and physicians’ response. Int. J. Med.
In the future, we plan to define an effective Inform., 77(3):153–160.
methodology for managing source code and deliver- Sverrisdottir, H., Ingason, H., and Jonasson, H. (2014). The
ables to improve team profitability. role of the product owner in Scrum - comparison be-
tween theory & practice. Procedia - Social & Behav-
ioral Sciences, 19(3):257–267.
Vickoff, J. (2000). RAD, le developpement rapide
ACKNOWLEDGEMENTS d’applications. RAD.fr.
REFERENCES
Beck, K., Beedle, M., Bennekum, A., Alistair, C., Cun-
ningham, W., Fowler, M., Grenning, J., Highsmith, J.,
Hunt, A., Jeffries, R., Kern, J., Marick, B., Martin, R.,
Mellor, S., Schwaber, K., Sutherland, J., and Thomas,
D. (2001). The agile manifesto. Agile Alliance, 2001.
491
S PECIAL S ESSION ON S MART M EDICAL
D EVICES - F ROM L AB TO C LINICAL
P RACTICE
F ULL PAPERS
A Methodology to Reduce the Complexity of Validation Model Creation
from Medical Specification Document
Keywords: Clustering, Medical Specification Document, Validation, Natural Language Processing (NLP), Schematron.
Abstract: In this paper we propose a novel approach to reduce the complexity of the definition and implementation of a
medical document validation model. Usually the conformance requirements for specifications are contained
in documents written in natural language format and it is necessary to manually translate them in a software
model for validation purposes. It should be very useful to extract and group the conformance rules that have
a similar pattern to reduce the manual effort needed to accomplish this task. We will show an innovative
cluster approach that automatically evaluates the optimal number of groups using an iterative method based on
internal cluster measures evaluation. We will show the application of this method on two case studies: i) Patient
Summary (Profilo Sanitario Sintetico) and ii) Hospital Discharge Letter (Lettera di Dimissione Ospedaliera)
for the Italian specification of the conformance rules.
497
Gargiulo, F., Silvestri, S., Fontanella, M. and Ciampi, M.
A Methodology to Reduce the Complexity of Validation Model Creation from Medical Specification Document.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 497-507
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
498
A Methodology to Reduce the Complexity of Validation Model Creation from Medical Specification Document
can be categorized into two classes: external and in- iterative cluster strategy, that aims to obtain the best
ternal. The first case can be used when a gold case is clustering solution. This is achieved through an in-
available, verifying the correctness of results through ternal measure cluster selection, described in 3.1 and
measures like F-measure, Entropy, Purity, Complete- in 3.2. Then, to assess the whole methodology, we
ness, Homogeneity, Jaccard coefficient, Fowlkes and manually built a gold case, validated using a custom
Mallows index, Minkowski Score and others (Rendón cluster external validation measure described in 3.3.
et al., 2011), (Wu et al., 2009), (Handl et al., 2005), Gold case construction and validation assessment are
(Rosenberg and Hirschberg, 2007). These papers described in Section 5
analysed and compared all the aspects of each mea-
sure to understand how well it fits specific cluster al- 3.1 Clustering Algorithm and Internal
gorithm, application or topic, revealing the goodness Measures
of the clustering. A common ground of external mea-
sures is that they can often be computed by the con- Following the literature (Alicante et al., 2016a), we
tingency matrix (Wu et al., 2009). decided to use the spherical K-means cluster algo-
When a gold case is not available, the second class rithm, a slight variation of the K-means algorithm,
of cluster validation measures, namely the internal and the cosine similarity. It has been shown that the
ones, must be used. In this case, the goodness of optimal distance for K-means based cluster applica-
clustering results is based only on spatial character- tions for Italian natural language text of medical topic
istics of cluster members, like their compactness or is the cosine distance (Alicante et al., 2016b), that is
separation. One of the first internal cluster measure equals to inverse cosine similarity (eq. 1).
proposed in literature is the silhouette (Rousseeuw,
1987). The silhouette is a numeric parameter that M
xi · yi
takes in account the tightness and separation of each 1− ∑ (1)
i=1 | x i || yi |
cluster, showing which objects lie well within their
cluster and which ones are merely somewhere in be- The cosine similarity measure allows to use the
tween clusters. Many other internal measures have spherical K-means (Zhong, 2005) algorithm, that uses
been defined in literature, like Dunns indices, SD and a slight variation of the K-means algorithm exploiting
SD bw validity indexes and others (Liu et al., 2010), the cosine similarity measure: the classical K-means
taking into account different aspects of the cluster- minimizes the mean squared error from the cluster
ing results in addition to the separation and compact- centroid (eq. 2)
ness, like monotonicity, noise, density, sub-clusters
1
N∑
and skewed distributions, that can better show differ- x − μk(x) (2)
ent aspects of the results. x
Internal cluster measures have been often used to where N is the total number of feature vectors and
set the correct cluster number, not only optimizing μk(x) is the most similar centroid; instead, in spherical
their global value (Kaufman and Rousseeuw, 2009), K-means the objective function is defined as (eq. 3)
but even obtaining some specific new measures from
the classical ones, to identify cluster characteristics of ∑ x · μk(x) (3)
a specific domain, as, for example, they did in (Pol- x
lard and Van Der Laan, 2002). In (Dhillon et al., that is strictly related to the cosine similarity. Our
2002) an iterative clustering method is proposed to experiments confirm the goodness of these choices
improve spherical K-means algorithm results, that, (see Section 5).
when applied to small cluster sizes, can tend to get The determination of optimal partition is per-
stuck at a local maximum far away from the opti- formed through an iterative loop, based on cluster in-
mal solution. They presented an iterative local search ternal measure, described in details in Section 3.2.
procedure, which refines a given clustering by incre- As assessment of clustering results we can only
mentally moving data points between clusters, thus use internal measures, having no labelled data. For
achieving a higher objective function value. validation purposes we have chosen the silhou-
ette (Rousseeuw, 1987), a classic cluster internal val-
idation measure, that takes into account two impor-
tant aspects of a clustering solution: i) the similarity
3 METHODOLOGY among elements of the same cluster and ii) the dissim-
ilarity among elements belong to different clusters.
In this Section we explain the details of the method- Let call i a generic point of the data set and a(i) the
ology applied in our experiments. We developed an average dissimilarity of the point with the elements
499
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
b(i) − a(i)
s(i) = (4)
max(a(i), b(i))
where the opposite of a(i) is considered so that
its effect is in favour of compactness. The silhouette
value is in the range [−1, 1], and a larger silhouette in-
dicates a better assignment of that point to its cluster.
The silhouette is negative whenever the other points
in the cluster are, on average, farther from the point i
than the closest point outside of the cluster. Silhouette
can then be averaged on all points of a cluster to as-
sess the compactness of that cluster with respect to the
others. In this case, a negative number of silhouette
means that the diameter of the cluster is larger than
the distance from the closest point out of the cluster.
The average silhouette over all elements i could
be used to compare clustering results and to select Figure 1: Flow chart of the methodology used to cluster the
the optimal number of clusters k by maximizing it conformance rules.
over a range of possible values for k (Kaufman and
Rousseeuw, 2009). The method of maximizing av- (PCA) methodology for feature reduction (Cao et al.,
erage silhouette can be used with any clustering al- 2003). We set the selection of information content of
gorithm and any distance metric, but it has the dis- PCA at 96%: this value has been obtained observing
advantage that measures only the global structure of the higher mean silhouette value of clustering exper-
the solution. To take in account finer behaviour we iments. The feature reduction is performed at each
have proposed an alternative parameter. Let con- step of the iterative cluster algorithm, reducing each
sider the average silhouette of the jth cluster as S j . iteration the number of extracted features.
We then call MAS the median of average silhouettes Then, an Iterative Spherical K-means algorithm,
S = {S1 , S2 , . . . , Sk }, a value equals to: depicted in Figure 2, is applied to evaluate the opti-
mal cluster solution. We perform Spherical K-means
MAS = median(S) (5) with cluster number ranging from 2 to total Confor-
The MAS can give a synthetic clue about the good- mance Rules number. The optimal cluster solution
ness of the entire cluster solution, but, differently is the one with highest MAS value in the range of
from the simple average of all silhouettes s(i), it can all solutions obtained during the iteration. From the
take into account each cluster validity. whole solution with highest MAS we select only clus-
ters whose mean silhouette is bigger than MAS (in-
3.2 Iterative Cluster Optimization ter cluster selection); then, in these selected clusters,
we filter out the elements whose silhouette is smaller
To obtain a more precise clustering we proposed an MAS (intra cluster selection). The clusters obtained
iterative clustering optimization algorithm, based on with this filtering operations are selected as part of
MAS optimization. In Figure 1 is depicted flow chart the final solution and the remaining elements are iter-
diagram, representing the proposed methodology. atively re-processed in the same way, until the num-
After constructing a Vector Space Model (VSM) ber of remaining documents is smaller than a given
of the Conformance Rules, we have defined an it- threshold #minCR or the number of iterations is big-
erative cycle. The first task is a de-noising of the ger than a threshold #maxCycle (see Figure 1).
input data, using a Principal Component Analysis When the termination condition is reached, the
500
A Methodology to Reduce the Complexity of Validation Model Creation from Medical Specification Document
1
Com(Pi ) = max(ni j ) (7)
ni· i
These two measures are both needed to character-
ize the goodness of the clustering partition, taking into
account two complementary aspects. Using them, we
defined a new measure for the whole dataset parti-
tion named as Clustering Goodness (CG) defined as
Figure 2: Flow chart of the implemented Iterative Spherical the weighted mean of the Hom and Com (see eq. 8).
K-Means. The weighting is necessary because the goodness of
cluster solution is related even to the correct choice
residual conformance rules are assigned to their own of cluster number and not only to Hom and Com.
cluster (one element cluster), considering that each In other words, if clusters number is close to docu-
rules have a low silhouette value. ments number, the mean(Hom) value tends towards
one; on the other hand, if the clustering solution is
3.3 Cluster Validation Measure made by only one cluster, the mean(Com) tends to-
wards one. This extreme cases demonstrate that an
The evaluation of the clustering goodness consider- arithmetic mean of these measures does not capture
ing an handmade gold case is obtained using external clustering goodness in every case.
measures, that are often computed by the contingency 1 K K
matrix (Wu et al., 2009). CG(C) =
K + K ∑ ∑ α ·Com(Pi ) + (1 − α) · Hom(C j ) (8)
i=1 j=1
The contingency matrix (see Tab.1) is defined as
follow: given a data set D with n objects, assume that The α value must balance the negative effects
we have a partition C = {C1 , . . . ,CK } of D, where previously described, taking into account the cluster
K number in function of the gold-case cluster number.
i=1 Ci = D and Ci C j = 0 / for 1 ≤ i = j ≤ K , and
K is the number of clusters. If we have a Gold Case, So we defined α as:
we canhave another partition on D : P = {P1 , . . . , PK },
1
, if K ≤ K
where Ki=1 Pi = D, Pi Pj = 0/ and K is the number of α = 2·K 1 (9)
classes. Each element ni j of the matrix denotes the 2·(n−K ) , otherwise
number of objects in cluster Ci from class Pj . In this way, the value of equation 8 varies in range
(0, 1] and a perfect clustering solution has a CG value
Table 1: The Contingency Matrix. equal to 1, meaning that the clustering is identical to
C1 C2 ... CK ∑ gold case partition, but the α value as defined in 9 can
P1 n11 n12 ... n1K n1· weight the importance of Hom and Com in function
P2 n21 n22 ... n2K n2· of optimal cluster number too. We used the CG in
· · · ... · · the experimental assessment in Section 5, showing the
PK nK1 nK2 ... nKK nK· effectiveness of the proposed methodology.
∑ n·1 n·2 ... n·K n
501
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
502
A Methodology to Reduce the Complexity of Validation Model Creation from Medical Specification Document
) 0<<0;0 9;0<07=0 >7 050607=8
.87=0707=0 7860 0 .827860 /05 4.2 Feature Selection
9,A407=0?0/4E$0;<8700/#;2,74AA,A4874"879>D0<<0;0>=454AA,=8457>555,?8;
( $
(
(
The input to machine learning applications is repre-
<0<<8 sented through a Vector Space Model (VSM). In VSM
(
(
a vector is associated to each sample (in this case the
/,=,/47,<.4=,
Conformance Rule) in which the elements of the vec-
(
( tor correspond to the feature values.
.30 ;498;=, 45 .8/4.0 &'' /05 5>828 /4
( Vectors of size M correspond to points in an M-
dimensional space; the main hypothesis underlying
$0; 4 /0==,254 ;05,=4?4 ,254 050607=4
0
<4;46,7/,,%41
the VSM is that similar objects are represented by
Figure 5: An example of input document used for experi- points which are closed in the M-dimensional space.
ment assessment. It is possible to observe the regular pat- Achieving optimal results with a machine learning
tern of conformance rules to be extracted. In addition, each technique based on VSM is strictly related to the cor-
rules lies on a grey background. rect choice of feature space (Amato et al., 2013).
In our case, the entity to be clustered are the con-
we replace Logical Observation Identifiers Names formance rules in natural language text, identified by
and Codes (LOINC3 ), TemplateId codes, Paragraphs their name. The rules in a VSM are mapped as n-
and Key Names with a generic identifier (i.e. LOINC grams of words. The correct selection of the n-gram
33882 − 2 is substituted with the word *LOINC*). size, namely the length of n, is both language and
We did this further normalization to reduce the noise topic dependant (Cavnar and Trenkle, 1994) and so
induced by different terminology associated to the there is not an absolute rule (Eder, 2011). In our case
same concept, obtaining a better clustering results. we selected all n-grams with n ranging from 2 to 6,
The output of this module is an xml file, whose observing the highest MAS (see equation 5) obtained
structure is depicted in Figure 6. As shown, the body in different clustering experiments, varying both n
of CONF tags contains only the normalized text of and the number of n-grams together. The high value
each conformance rule. The used tags are the follow- of n obtained (often only uni-grams, bi-grams and tri-
ing: grams are used in literature) can be explained by the
• documento: the xml root, its body contains the repetitive structure of the patterns in the description of
document title and all the paragraphs will be its a rule. We extract the features using internal KNIME
children; modules.
• paragrafo: it contains the paragraph name in its The VSM obtained can be represented by a high
body and the paragraph number as id attribute. All dimensional sparse matrix. To reduce the noise
the CONF associated to it are its own children; caused by not discriminant features and consequently
the space dimension, improving clustering perfor-
• CONF: it contains in its body the normalized text mance and providing a faster computation, we ap-
of the original conformance rule. Its attributes are: plied Principal Component Analysis (PCA) as feature
i) num in which is indicated the rule number and reduction method. The PCA has been implemented
ii) par that indicates the paragraph number. through the Cran R built in function prcomp, a really
fast and accurate PCA algorithm. We set the selec-
tion of information content of PCA at 96%: this value
has been obtained observing the higher mean silhou-
ette value within all clustering experiments. The fea-
ture reduction is performed at each step of the itera-
tive cluster module, described in the next Section 4.3,
reducing each time the number of extracted features.
The use of n-grams directly extracted from the
dataset makes the whole process totally language in-
dependent; the same methodology can be applied on
conformance rules in any language and even to mixed
languages, or medical slang documents. Changing the
input dataset affects only the scripts for the normaliza-
Figure 6: Part of the output xml file obtained from text ex-
traction and normalization module. tion and rule extraction, that must be slightly modified
as described in previous Section 4.1, but none of the
other modules, included the feature extraction one.
3 http://loinc.org/
503
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
5 EXPERIMENTAL RESULTS
To verify the effectiveness of described approach we
will show the application of the proposed method-
ology on two case studies, namely the Italian local-
ization of specification of the conformance rules of:
i) Patient Summary4 (in Italian Profilo Sanitario Sin-
tetico, PSS) and ii) Hospital Discharge Letter5 (in Ital-
ian Lettera di Dimissione Ospedaliera, LDO). The
conformance requirements and specifications are part
4 Patient
Summary: http://www.hl7italia.it/sites/default/
Figure 7: Main Schema of the Conformance Rule Imple- files/Hl7/docs/public/HL7Italia-IG CDA2 PSS-v1.2-S.pdf
5 Hospital Discharge Letter: http://www.hl7italia.it/
mentation starting from an Abstract Pattern Template and a
Clustered Conformance Rule. webfm send/1709
504
A Methodology to Reduce the Complexity of Validation Model Creation from Medical Specification Document
Table 2: Gold case cluster number of each dataset. due to the fact that the number of clusters obtained is
Specification Rules number Gold case Cluster number close to the total conformance rules number and many
LDO 104 42 clusters have only one element. So the high value of
PSS 259 129 Hom is caused simply by cluster formed by only one
PSS+LDO 363 159 element, not by a good cluster solution. On the other
side, the number of clusters with an high Com value is
of HL7-Italia (see Section 1 for more details). PSS only a little fraction of the whole partition, suggesting
and LDO are both conformance requirements and a bad clustering.
specification documents written in semi-structured Instead, IT-SKM experiments show in all cases a
natural language text. PSS contains 259 conformance very high fraction of clusters with both Hom and Com
rules, while LDO a total number of 104. To ex- equal to 100%. A perfect solution (identical to gold
tend the experimental assessment, we have applied case) has Hom and Com equal to 100% for each clus-
our methodology even to the sum of the rules from ter. The results in Figure 10 for IT-SKM show that
both documents, clustering a new data set with a total this condition is verified for an high number of clus-
of 363 rules, named PSS+LDO. It could be useful in ters, demonstrating the effectiveness of the proposed
real application group together similar conformance methodology. In addition, the figure confirms that CG
rules documents, identifying the rules with the same measure follows the correct behaviour and it is an use-
patterns from different documents. ful external measure.
The assessment is based on gold cases, formed by
the ideal grouping of the conformance rules of each
dataset belonging to the same pattern. The goodness
of the cluster results have been measured through the 6 CONCLUSION AND FUTURE
CG (equation 8) applied on those gold cases. Each WORK
gold case has been manually built by the software de-
velopers who previously implemented the whole con- In this paper we proposed a novel approach to reduce
formance rule validation schema: they well know the the complexity of the definition and implementation
rules text and their patterns and so they produced a of a medical document validation model.
reliable gold cases for each dataset used. The num- We defined an architecture to automatically pro-
ber of conformance rules grouped in each gold case is duce a software specification starting from a set of
shown in next Table 2. conformance rules in semi-structured natural lan-
We have compared the results obtained with our guage format. At this aim, we presented an innova-
approach, namely Iterative Spherical K-Means (IT- tive cluster approach that automatically evaluates the
SKM), with the ones obtained using a One Iteration optimal number of groups using an iterative method
Spherical K-Means (1-SKM) method. In this case, based on internal cluster measures evaluation.
only one step of iteration process is performed, choos- The effectiveness of the proposed approach is
ing the cluster number of the partition with the MAS evaluated on two case studies: i) Patient Summary
function (equation 5), without selecting the elements (Profilo Sanitario Sintetico) and ii) Hospital Dis-
to be clustered in the following steps. charge Letter (Lettera di Dimissione Ospedaliera) for
In Table 3 is shown the effectiveness of using IT- the Italian localization specification of the confor-
SKM for evaluating the optimal number of clusters mance rules.
through the synthetic external measure CG (eq. 8), As future works we are planning to realize the re-
previously defined in Section 3.3. We compared the maining blocks of the architecture depicted in the Fig-
IT-SKM results with the 1-SKM results through the ure 3 and, in particular, the Final Model Creation and
CG measure for PSS, LDO and PSS+LDO cases. In Model Validation (the blocks have light-blue back-
all experiments the best results have been obtained ground in the Figure). Furthermore, we are consider-
with iterative approach IT-SKM. It is even worth not- ing to automatize the creation of the abstract pattern
ing that cluster number obtained with IT-SKM is re- template starting from a cluster, with the support of
ally close to the gold case. natural language tools. At least, we are also investi-
To better understand and explain the results of our gating more deeply on other unsupervised methods to
experiments, we show in Figure 10 the Hom (in red) automatically grouping the conformance rule and in
and Com (in blue) percentage value distribution for particular on deep-learning approaches.
1-SKM and IT-SKM for all data sets. In details, the
figures depict the cluster distribution whose Hom and
Com have a certain value. All 1-SKM experiments
have an high number of clusters whose Hom is high,
505
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Figure 10: Hom and Com value distributions for all experimental assessment.
506
A Methodology to Reduce the Complexity of Validation Model Creation from Medical Specification Document
507
A Statistical Analysis for the Evaluation of the Use of Wearable and
Wireless Sensors for Fall Risk Reduction
Keywords: Falling Risk, Physical Activity, Body Mass Index, Statistical Analysis, Correlation, Wearable Sensors, Mobile
Devices.
Abstract: The aim of this study is to investigate the correlation between, on the one hand, personal and life-style indi-
cators and, on the other hand, the risk of falling. As indicators we consider here for each subject age, body
mass index, and information about physical activity habits, while a subject’s risk of falling is estimated by
the Mini-BES test score. Three different groups of subjects are taken into account, namely healthy, suffering
from metabolic diseases and suffering from cardiovascular diseases. Firstly, we aim at finding explicit linear
correlations for any pair of parameters. Secondly, we wish to pay attention to whether or not these correlations
change as the health state of the subjects does. The final goal is to move the first steps towards the design of
a system composed by wearable sensors, a mobile device, and an app that would be able to help people in
improving their life-style so as to decrease their falling risk.
508
Sannino, G., Falco, I. and Pietro, G.
A Statistical Analysis for the Evaluation of the Use of Wearable and Wireless Sensors for Fall Risk Reduction.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 508-516
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
A Statistical Analysis for the Evaluation of the Use of Wearable and Wireless Sensors for Fall Risk Reduction
risk assessment would be adviced to meet a doctor so pressure, diastolic blood pressure, mean blood pres-
as to possibly undergo a real test. This approach could sure and pulse blood pressure.
lead to easily performing a kind of a ’mass screening’ The relationship between Body Mass Index and
with reference to the risk of falling. To fulfill the two stability has been investigated in (Ku et al., 2012).
first above statistical goals, in this paper we will make Namely, the aims of that study was to examine the
use of a set of personal and life-style information con- impact of BMI and gender on static postural control.
tained in a real-world database making reference to to Their conclusion was that BMI do have an impact on
the risk of falling. Then, we will describe the body postural control during both bipedic stance and uni-
system we propose, based on some wearable senors, pedic stance.
a mobile device, and an app. The effect of the type, level and amount of phys-
This paper is organized as follows. Section 2 re- ical activity in falls and fall-related injuries was ex-
ports on the related work on finding correlations be- amined in (Pereira et al., 2014). Their conclusions
tween personal parameters and falling risk. Informa- were that being active, especially sufficiently active,
tion about the database is provided in Section 3. The reduces fall-related injuries by decreasing falls and by
statistical analysis is shown and discussed in Section safeguarding against severe injuries when falls occur.
4. In Section 5 some considerations are given on the A study was conducted in (Shahudin et al., 2016)
use of the results of the statistical analysis for the de- to investigate the effects of age on physical activ-
sign of a monitoring system based on wearable sen- ity level, strength and balance towards fall risk index
sors. Finally, our conclusions and future works follow (FRI) among women, as well as identifying the main
in Section 6. contributing factors towards FRI test performance.
That study suggested that women aged 20–73 years
were found to associate their FRIs mostly with age,
followed by strength, balance, and lastly, physical ac-
2 RELATED WORKS tivity.
One of the first papers trying to find correlations be-
tween personal parameters and falling risk was (Gard-
ner et al., 2000). In it, the objective was to assess 3 THE DATABASE
the effectiveness of exercise programs in preventing
falls (and/or lowering the risk of falls and fall related To carry out our investigation, we have taken
injuries) in older people. Their conclusion was that advantage of the Human Balance Evaluation
exercise is effective in lowering falls risk in selected database, collected at the Biomechanics and
groups and should form part of falls prevention pro- Motor Control Laboratory (BMCLab) of the
grams. Federal University of ABC, Sao Paulo, Brazil
In (Hue et al., 2007) the aim of the study was to (http://demotu.org/datasets/balance/), and freely
determine the contribution of body weight to predict available in PhysioNet (Goldberger et al., 2000).
balance stability. Their experiments suggest that body This database was collected while performing sta-
weight may be an important risk factor for falling. bilography tests over a set of subjects. Each of those
In (Faulkner et al., 2009) the authors examined subjects had to perform standing tasks under four dif-
potential independent effects of lifestyle on fall risk. ferent conditions: by keeping their eyes opened or
Not smoking and going outdoors frequently or in- closed, and while standing on a rigid surface or on an
frequently were independently associated with more unstable one. Each condition was tested three times,
falls, indicating lifestyle-related behavioral and envi- with the order of the conditions being randomized
ronmental risk factors are important causes of falls in among subjects. A total of 1930 trials performed by
older women. 164 different subjects are given in this database. Each
Although not directly tied to fall risk, the paper 1 minute recording is sampled at 100Hz and low pass
(Shekharappa et al., 2011) dealt with similar ideas, in filtered at 10Hz.
fact the aim was to find a correlation between body Moreover, and most importantly to us, the fol-
mass index and cardiovascular parameters in obese lowing qualitative tests were employed on each
and non-obese in different age groups. The results subject, and the replies/outcomes recorded in the
showed a statistically significant increase in heart rate, database: Short Falls Efficacy Scale International
systolic blood pressure and diastolic blood pressure in (FES-I) (Kempen et al., 2008) (seven questions plus
obese subjects when compared to non-obese in all age the score), the Short version of the International Phys-
group. Moreover, there was a positive correlation be- ical Activity Questionnaire (IPAQ) (Craig et al., 2003)
tween body mass index and heart rate, systolic blood (eight questions plus the score), Trail Making Test
509
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
(four pieces of information), Mini Balance Evalua- IPAQ 1 = IPAQ 1a · IPAQ 1b. The same mechanism
tion Systems (Mini-BES) Tests (Franchignoni et al., holds true for the computation of IPAQ 2 and IPAQ 3.
2010) (fourteen values plus the score). Furthermore, The value of the score for the Mini-BES test is
the subjects were also interviewed about some of their computed through the answers of the subject to 14
socio-cultural, demographic, and health information, questions, each of which can be assigned a value
including their age, medications, and illnesses. equal to 0, 1, or 2, the higher the better. Therefore,
Consequently, each database item contains 63 at- the value of the Mini-BES test score can range within
tributes. The database, apart from the raw data record- 0 and 28, where a higher value means that the subject
ings, also includes a BDSinfo file that contains meta- has a lower falling risk.
data describing the conditions of the stabilography tri- Moreover, we have divided the subjects in the
als, the information from the anamnesis, and the re- database into three groups:
sults of the qualitative evaluations. Because, as stated • healthy: they are the subjects with no disease at
above, a subject has 12 files for the force platform all. This has resulted in a number of 56 individu-
data, there are 12 rows for each subject in this file. als;
In these 12 rows, the only column that has rows with
different values is the column identifying the trial (the • metabolic diseases: this group contains all the in-
file name). The content of all the other columns are dividuals who declared problems related to hyper
simply repeated over the 12 rows. As result, the - or hypo-thyroidism, hyper- or hypo-glicemia,
BDSdata file has the header plus 1930 rows and 64 and so on. This group contains 32 subjects;
columns. The complete list of the attributes can be • cardiovascular diseases: this group is composed
found in (Santos and Duarte, 2016). by all the individuals with hyper- or hypo-tension,
Starting from this database, we have conducted an cardiovascular problems, or diabetes. There are
analysis phase by creating a new database composed 41 people in this group.
by 6 items for each of the 164 subjects. The parame- It should be pointed out that we excluded from the
ters taken into account in our study are: groups 48 subjects who were not healthy, yet they
• x1 : age group suffered from diseases other than those reported in
the above two groups. As examples, some of them
• x2 : Body Mass Index (BMI) suffered from melanoma, breast cancer, hepatitis,
• x3 : IPAQ 1: minutes per week of vigorous physi- Parkinson, arthrosis, asthma, dermatitis, rhinitis, gas-
cal activity according to the short IPAQ question- tritis, kidney stones, sickle cell anemia,tendinitis, and
naire so on. Moreover, there are 13 people in the database
who suffer from both endocrinological and cardio-
• x4 : IPAQ 2: minutes per week of moderate physi- vascular diseases. These have been assigned to both
cal activity according to the short IPAQ question- groups.
naire
• x5 : IPAQ 3: minutes per week of low physical
activity according to the short IPAQ questionnaire 4 STATISTICAL ANALYSIS
• x6 : the total score of the Mini-BES test
For each of the three groups of subjects described in
In the short IPAQ questionnaire used to create the previous section we have performed a correlation
the Human Balance Evaluation database, the vigorous analysis among the chosen database parameters. By
physical activities are defined as: heavy lifting, dig- doing so, we have been able to obtain the correlation
ging, aerobics, or fast bicycling. The moderate ones, value for each pair of parameters. Let’s recall here
instead are considered as: carrying light loads, bicy- that a correlation value between two parameters is in
cling at a regular pace, or doubles tennis. Finally, the the range [-1.0, 1.0], where positive values represent
low physical activities include: walking at work and direct correlations and negative values inverse corre-
at home, walking to travel from place to place, and lations, and the higher the absolute value the stronger
any other walking that is done solely for recreation, the correlation.
sport, exercise or leisure. Moreover, for each of these pairs we have created
As concerns the value for IPAQ 1 for a sub- a figure, in which we report the raw data, and have
ject in our database, this is computed starting from computed and drawn the best line for the linear re-
the subject’s answers to short IPAQ questions 1a gression that best fits the data, and have also reported
(days per week of high-level physical activity) and 1b the related R-squared (R2 ) value. R-squared is a sta-
(hours per day of high-level physical activity through: tistical measure of how close the data are to the fit-
510
A Statistical Analysis for the Evaluation of the Use of Wearable and Wireless Sensors for Fall Risk Reduction
)'
These regression lines and their R2 values are very
useful because from them fruitful information can be (,
"
obtained. In the next three subsections all these find- ('
#
" $
ings are shown for the three groups, respectively. ,
'
4.1 Healthy Subjects ' '' )' '' +' '' -' ''
.' '' ('' ''
Table 1 reports the correlation values for all of the Figure 1: Analysis of parameters age and Mini-BES Test
considered parameters. score for healthy subjects.
In it the generic cell (i, j) contains the correlation
!
value between the pair of parameters i and j. Very
high values (≥ 0.50) and very low ones (≤ −0.50) are *'
All the pairs in which the Mini-BES test score appears (+
"
have been considered for further analysis. For each (' #"
$
of them the corresponding figures are shown, which +
$9'-&--.5#8/0&453
vigorous activity, and it a positive correlation. Basi- /2
69-&-.5/2
/-
cally, this says that as long as healthy people get old, .2
they go on exercising vigorously. Also quite high is (
.-
)(
*
the moderate direct correlation between age and BMI, 2
-
meaning that the older a healthy subject, the more - /-- 1-- 3-- 5-- .---
obese she/he is. Moreover, a moderate direct cor- !$"
relation is shown between age and IPAQ 2, similar
Figure 3: Analysis of parameters IPAQ 1 and Mini-BES
to that between age and IPAQ 1, but with reference
Test score for healthy subjects.
to moderate physical activities. Furthermore, a mod-
erate inverse correlation exists also between age and
Mini-BES. This suggests that for healthy subjects the ±14.90. Moreover, the average value for the Mini-
higher the age the lower the value of the Mini-BES BES test score is 23.44 ± 2.54, which is quite a high
test score, hence the more probable the subject will value suggesting that healthy people have a scarce fall
be prone to falls. risk.
Fig. 1 shows that this group is mainly composed A closer examination of Figures 1, 2, 3, 4, and 5
by young adults. In fact the average age is 31.32 years provides more precise information about the relation-
511
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
/(
highlight some specific cells in the table. Similarly to
%! the previous case, here too all the pairs in which the
0- Mini-BES test score appears have been considered for
!
%7(-'---1$6/0'102
/1
/-
47-'--0.3 further analysis. For each of them the corresponding
.1
)
figures are shown, which contain information about
.-
*)
+
the linear regression too.
1
- As far as the metabolic patients are taken into
- 1-- .--- .1-- account, three parameter pairs have high correlation
!"%#
values, namely age-BMI, age-Mini-BES, and BMI-
Figure 4: Analysis of parameters IPAQ 2 and Mini-BES MiniBES. The first is a direct correlation, meaning
Test score for healthy subjects. that as the age increases so does BMI, as it is quite
frequent in humans, be they healthy or suffering from
/(
some disease. Of higher interest for our purposes
%!
are the other two correlations. Age and Mini-BES
/,
!
.0 %5,',,.-$4./'/1. test score are strongly and inversely correlated, which
., 25,',,.1/ means that as the age of these diseased subjects in-
-0
-,
)
creases the Mini-BES test score decreases, so older
0 *)
+ subjects suffering from metabolic diseases are more
, prone to falls. Moreover, also BMI and Mini-BES test
, 0, -,, -0, .,, .0, /,,
!"%# score are strongly and inversely correlated, meaning
that the more obese a metabolic subject, the higher
Figure 5: Analysis of parameters IPAQ 3 and Mini-BES probability she/he has of falling.
Test score for healthy subjects.
In this case, as Fig. 6 reveals, the age of this group
ship between the Mini-BES test score and each of the is quite higher than that for healthy subjects. In fact,
other parameters considered in this study. Namely, the average is 62.80 years ±17.91. The average value
the precise form of their relationship, under a linear for the Mini-BES test score for these subjects, instead,
hypothesis, is shown. is 19.67 ± 4.10, i.e. about four points worse that that
The slope of the line drawn in each figure provides for healthy people.
intuitive visual understanding of the relationship: a By looking at Figures 6, 7, 8, 9, and 10, it can
down-bound line means an inverse linear relationship, be visually understood that for people suffering from
an up-bound one a direct dependence, and the more metabolic diseases changes in IPAQ 2 and IPAQ 3 al-
inclined the line the higher the amount of this rela- most do not affect the Mini-BES test score, while the
tionship. Consequently, lines that are almost horizon- opposite is true for the age, BMI, and IPAQ 1. In par-
tal imply a substantial independence between the two ticular, the R2 value for the correlation between age
parameters. As an example, this is the case shown in and Mini-BES test score is equal to 0.60908, so we
Fig. 5. are confident that the regression line well fits the data.
512
A Statistical Analysis for the Evaluation of the Use of Wearable and Wireless Sensors for Fall Risk Reduction
#
/'
"
,) 0- $:'-&---/#9.6&431
6#)"*0105,)"122
+. /-
7:-&---65
36)"/)2)1
+) .- (
*. - )(*
$
*) - 2-- .--- .2-- /--- /2-- 0---
%$
&
. !$"
)
) +) -) /) 1) *)) Figure 9: Analysis of parameters IPAQ 2 and Mini-BES
Test score for metabolic subjects.
"
/2
69-&-3.0.
/-
+( .2
4"(!.((/3+,!,.- (
*- .-
*( 14(!*0,++ )(*
2
)-
#
-
)(
- 2-- .--- .2--
- $#
%
!$"
(
( - )( )- *( *- +( +-
Figure 10: Analysis of parameters IPAQ 3 and Mini-BES
Test score for metabolic subjects.
Figure 7: Analysis of parameters BMI and Mini-BES Test
score for metabolic subjects. highest one being a moderate inverse correlation be-
tween age and Mini-BES test score. This is quite sim-
.' ilar to that already seen for the metabolic subjects, al-
"
though with a lower tie between the two parameters.
0-
513
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
,%
)& 3 &(((-2)*'', -*
"5*$**++!4+1$/+0
03&'*/&+ ,*
25*$*-*.1
(&
&
+*
'& !
'&(
"!
# *
& * /** +*** +/** ,*** ,/** -***
"
& (& *& ,& .& '&&
Figure 14: Analysis of parameters IPAQ 2 and Mini-BES
Figure 11: Analysis of parameters age and Mini-BES Test Test score for cardiovascular subjects.
score for cardiovascular subjects.
-%
-* "5*$**/,!4+1$..-
,*
'* -0(' %*
'% +* &
&*
'&(
! *
&% * +** ,** -** .** /** 0**
* "!#
"
%
% &% '% (% )% Figure 15: Analysis of parameters IPAQ 3 and Mini-BES
Test score for cardiovascular subjects.
Figure 12: Analysis of parameters BMI and Mini-BES Test
score for cardiovascular subjects. ommendations about the diet and the amount and the
type of physical activity so as to improve the subject
+%
well-being with respect to the risk of falling.
Nowadays, mobile devices, such as smartphones
-* "5%*$***.!4+1$+00
25*$**//-
or tablets, wearable devices, such as smartwatches or
,* bands, and wireless healthcare devices, such as smart
+* & digital scales, are widely used and it is demonstrated
'&( that they are valid tools to monitor body and life-
*
* +*** ,*** -*** .*** /*** styles parameters. For these reasons, thanks to these
" devices, it is possible to collect in real time data about,
Figure 13: Analysis of parameters IPAQ 1 and Mini-BES
for example, the weight of a subject or the type and
Test score for cardiovascular subjects. the amount of activity performed during a day or a
week.
cal analysis is that, when a subject suffers from a This collected information could be analyzed in
metabolic disease, she/he has a probability of falling real time on a mobile device in order to give a prompt
that is higher than that of an equally aged cardiovas- feedback to the subject about her/his risk of falling
cular subject, and much higher than that of a healthy and in order to guide the subject to develop new habits
peer. to reduce the estimated risk of falling.
As an example, for the subjects with metabolic
disease the statistical analysis has shown that there is
a strong and inverse correlation between the BMI and
5 USE OF THE STATISTICAL the Mini-BES test score, so a wearable sensor-based
ANALYSIS RESULTS IN A monitoring system could give specific recommenda-
MONITORING SENSOR-BASED tions in order to not only reduce the obesity, but also
to reduce the risk of falling knowing that more obese
SYSTEM a metabolic subject, the higher probability she/he has
of falling.
The statistical analysis made in this preliminary study Within our laboratory, several mobile applica-
has shown that, even though moderate, a correlation tions have been implemented aimed to monitor dif-
exists between the risk of falling (the mini-BES test ferent kinds of healthcare parameters, as for example
score) and the personal and lifestyle indicators. (Forastiere et al., 2016; Sannino and De Pietro, 2014).
These results mean that it is imaginable to real- The correlation results found in this study for healthy
ize a monitoring system in order to give specific rec- subjects and cardiac subjects will be easily added into
514
A Statistical Analysis for the Evaluation of the Use of Wearable and Wireless Sensors for Fall Risk Reduction
them respectively. which they will provide us with some volunteers with
Unfortunately, there is no unique app with the pos- different ages in order to better balance the database.
sibility to have a specific knowledge base for each Within this cooperation we will supply the system
subject in order to suggest different recommendations to the volunteers, so as to test its effectiveness and
for the three different groups of subjects. usefulness.
For this reason, a new mobile health application
is under development in order to take into account
the different results obtained for the different classes ACKNOWLEDGEMENTS
of people examined, e.g. healthy subjects, subjects
with metabolic diseases or subjects with cardiac dis- This work has been supported by the project
eases. The app will be able to monitor body indica- “eHealthNet: Ecosistema software per la Sanità Elet-
tors, physiological data, and physical activity infor- tronica” (PON03PE 00128 1) financed within the
mation by using wearable sensors, be they or not com- P.O.N. “Research and Competitiveness” call of the
pliant to the Continua Alliance guidelines (Carroll Italian Ministry for University and Research.
et al., 2007). Of course, some of these sensors will be
used for long periods, as e.g. those for physical activ-
ity monitoring, therefore they are affected by the typ-
ical problems related to battery charge. Other types
REFERENCES
of sensors, instead, will be employed more rarely, as Carroll, R., Cnossen, R., Schnell, M., and Simons, D.
for example smart digital scales that are typically used (2007). Continua: An interoperable personal health-
just once in a day. care ecosystem. IEEE Pervasive Computing, 6(4):90–
94.
Craig, C. L., Marshall, A. L., Sjstrm, M., Bauman, A. E.,
Booth, M. L., Ainsworth, B. E., Pratt, M., Ekelund,
6 CONCLUSIONS AND FUTURE U., Yngve, A., Sallis, J. F., and Oja, P. (2003). In-
WORK ternational physical activity questionnaire: 12-country
reliability and validity. Medicine and science in sports
and exercise, 35(8):13811395.
In this paper the correlation between personal and Faulkner, K. A., Cauley, J. A., Studenski, S. A., Landsittel,
life-style indicators and the risk of falling has been D. P., Cummings, S. R., Ensrud, K. E., Donaldson, M.,
investigated. Nevitt, M., of Osteoporotic Fractures Research Group,
S., et al. (2009). Lifestyle predicts falls independent
As indicators we have considered here for each of physical risk factors. Osteoporosis international,
subject age, body mass index, and information about 20(12):2025–2034.
physical activity habits, while a subject’s risk of Forastiere, M., De Pietro, G., and Sannino, G. (2016). An
falling has been estimated by the Mini-BES test mhealth application for a personalized monitoring of
score. Three different groups of subjects have been ones own wellness: Design and development. In Inno-
taken into account, namely healthy, suffering from vation in Medicine and Healthcare 2016, pages 269–
metabolic diseases and suffering from cardiovascular 278. Springer.
diseases. Franchignoni, F., Horak, F., Godi, M., Nardone, A., and
Giordano, A. (2010). Using psychometric techniques
Firstly, explicit linear correlations have been to improve the balance evaluation systems test: the
found for any pair of parameters. Secondly, atten- mini-bestest. Journal of Rehabilitation Medicine,
tion has been paid to whether or not these correlations 42(4):323–331.
change as the health state of the subjects does. Gardner, M. M., Robertson, M. C., and Campbell, A. J.
Finally, some first steps have been moved towards (2000). Exercise in preventing falls and fall related
a system, composed by wearable sensors, a mobile injuries in older people: a review of randomised con-
trolled trials. British journal of sports medicine,
device, and an app, that would be able to help people 34(1):7–17.
in improving their life-style so as to decrease falling Goldberger, A. L., Amaral, L. A., Glass, L., Hausdorff,
risk. J. M., Ivanov, P. C., Mark, R. G., Mietus, J. E., Moody,
In the near future we aim at implementing the G. B., Peng, C.-K., and Stanley, H. E. (2000). Phys-
sensor-based system. iobank, physiotoolkit, and physionet components of
a new research resource for complex physiologic sig-
Moreover, due to the fact that the data set from nals. Circulation, 101(23):e215–e220.
Physionet used in this paper looks highly clustered
Hue, O., Simoneau, M., Marcotte, J., Berrigan, F., Doré,
with little outliers, e.g. most healthy patients are J., Marceau, P., Marceau, S., Tremblay, A., and Teas-
around 20 years old, we plan to start a cooperation dale, N. (2007). Body weight is a strong predictor of
phase with the University of Naples ”Federico II” in postural stability. Gait & posture, 26(1):32–38.
515
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
516
Modular Health Kiosk based on Web Technologies
Keywords: Health Kiosk, Personal Health Devices, Data Collection, Autonomous Measurements, Health Monitoring.
Abstract: We describe a modular and easily reconfigurable Health Kiosk based on common, off-the-shelf Personal
Health Devices and a computer with a touchscreen interface. The Kiosk is implemented in standard web tech-
nologies (JavaScript, HTML and CSS) on top of the Electron platform. It is intended to be used autonomously
by the patients. It is highly modular, can easily be adapted and reconfigured by health professionals with little
to no computer expertise, using a graphical interface, to adapt to different groups of patients and use cases.
We document our findings, identifying problems faced throughout the development and solutions to those
problems.
517
Silva, J., Brandão, P. and Prior, R.
Modular Health Kiosk based on Web Technologies.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 517-525
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
development and milestones that are to be reached in communities, public locations or medical facilities, a
order to have a fully functional system, capable of be- multi-user approach must be made instead of creat-
ing deployed in different areas. ing a simple collection tool for a single user to use at
home. This has to take into account that the system
will be used by different users, with different charac-
teristics and different health needs.
2 RELATED WORK
A specific application case of this type of system
are elderly communities, as the need for attention on
Using computers or other internet capable devices has
their vital signs is higher due to the increased fragility
always been of great help in health related develop-
of human health over time. This type of deployment
ments, not only with respect to machines used, the
has proven to be very positive with a high-level of
type of devices available in hospitals but also in the
acceptance from its users. (Demiris et al., 2013)
way the general population has access to health infor-
mation. The system is being developed making use
The evolution of technology made possible the of commercially available Personal Health Devices
adaptation of several of those developments to health (PHDs). With the increased availability of these types
areas, such as the phone, video, clarification of doubts of devices, the price is more accessible, reducing the
via e-mail, medical websites, and the creation and us- total cost of assembling a system with these require-
age of electronic health records. (Verma et al., 2008) ments. Some of the devices that are already working
with this system, and possible new devices, communi-
With the increase in the variety and offer of medi-
cate under a standardized form, which allows adding
cal devices, it rose the idea of grouping a set of these
new devices in a simpler way since the communica-
devices associated with an application in order to cre-
tion module handles all the devices.
ate a system capable of taking measurements of its
users to provide some feedback on their vital signs, The ISO/IEEE 11073 Personal Health Data (PHD)
which otherwise would not be possible if its users Standards allow for the intended interoperability be-
lacked the resources to acquire these devices or to tween some of the different devices that make up the
make visits to health centers. Currently the health system. This standard appeared as a merge of differ-
kiosk is a system capable of collecting data from a ent standards such as ISO TC215, CEN TC251, IEEE
blood pressure monitor, a weighing scale and a pulse 1073. (Nam et al., 2011) The Continua Health Al-
oximeter. Nonetheless, it is not limited solely to these liance has a major impact both in the standard as well
devices as new ones can easily be added to the system. as in the health care industry, trying to standardize
The idea of a system capable of collecting bio- health devices in an orderly process, and also to make
metric data from its users and show them the re- it easier for developers to work around with these de-
sults is not new, as it can be seen in public locations, vices.
where most of the time static, offline systems with Not having this standardization in some devices is
a small set of instructions provide the user valuable a problem since it means that an individual approach
information. In parallel some other types of kiosks must be made in order to interact with the devices. A
can be seen in some locations such as the informa- way to establish the communication has to be created,
tion kiosks that serve the purpose of disseminating in- as well as an interpretation of the messages sent by
formation throughout the population (Nicholas et al., the devices, and if needed to the devices.
2003; Leeman-Castillo et al., 2010), they can be in- The objective of reducing consultation times, and
ternet connected with the intent of remotely changing keeping a more detailed patient’s history is achieved
the available information. by having access to these records. This implies that
A more approximated system to our proposal is the health kiosk in the future must be able to add
the Multi-User Health Kiosk developed in a joint ef- data to the patient’s Electronic Health Record (EHR)
fort of the University of Pittsburgh and Carnegie Mel- this would improve the view the health professional
lon University. (Courtney et al., 2013) Their findings has on the patient’s history since the number of mea-
provided helpful information on how to tackle the de- surements taken outside a medical facility should be
velopment of a health kiosk. Creating a modular ar- higher than inside one. Despite its benefits, it is not
chitecture, to change in accordance to what is needed an easy task to converge the user’s medical data of a
or providing helpful, step by step, instructions on how user and make it available at all medical facilities that
to use the devices, is information that, despite being the user could visit. (Kalra, 2006) For now, a local
simple, has a major impact on the usability of the sys- database serves the purpose of giving the patients the
tem. possibility of saving and evaluating their history.
Since our aim with this system is to deploy it at It is now possible, when using the health kiosk to
518
Modular Health Kiosk based on Web Technologies
make use of a smart card reader, this option makes ble types of devices, Continua Alliance Certified and
it possible to extract data from the Portuguese Citi- Non Certified Devices, at the moment all the devices
zenship card. This function helps not only to avoid communicate via Bluetooth. Nonetheless, the devel-
human error when inserting personal data, but also opment of a way to communicate with the devices
as a way of reducing usage time of the application. takes one of two possible approaches, either the de-
Further testing needs to be made in order to establish vice is Continua Alliance certified and communicates
the true value of this feature. The data available for with an Antidote IEEE 11073 PHD interface, or it
collection is public data that is visible in the physi- is not certified and an individual approach must be
cal card, no private data is accessible without a Per- made in order to communicate with that specific de-
sonal Identification Number (PIN) that only the user vice. The process of creating a way of communicat-
has knowledge of, besides text data it is also possible ing with a non-certified device can be applied to other
to extract the picture of the user. devices, creating a skeleton that is the base for the
With the objective of being used in an autonomous development. Consequently, reducing the time of de-
way by the patients, the usability of the health kiosk is velopment.
a concern. The current version of this system is an im- In the future we intend to have a connection to a
provement to an existing version, which was assessed central EHR system, in order to make the patient’s
in respect of the usability of the application. The dif- data available in different health kiosks, as well as to
ferences between the two versions will be address in health professionals. By sharing data along all differ-
the next section. (Soares et al., 2016) Little changes ent locations that the users visit the impact the col-
were made relative to the execution flow of the appli- lected information has is higher.
cation in order to take advantage of the information
that was collected regarding the usability. This eval-
uation of the application was based on observer-filled
questionnaires alongside the option of keeping track
of user clicks on the screen in order to evaluate the
number and position of clicks per screen to see the
changes to be made in the presented content.
519
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
520
Modular Health Kiosk based on Web Technologies
4.1 User Interface A page is also printed containing the user personal
data, the collected data and the QR Code. It also con-
The usage of this system can be divided upon three tains a logo on the top that can be configured to fit the
different stages, collecting personal data from the needs of the situation.
user, collecting data from the devices, presenting re- The idea of using a QR Code to share data serves
sults to the user. not only the purpose of saving the data in the users
When the patient starts the process of using the smartphones, but can also be used in the future as a
health kiosk, it has the choice of either inserting a cit- way of transmitting data to a health kiosk smartphone
izenship card, and the application itself collects rele- application that if developed can act as a place where
vant data from the card, or the user can himself insert the user can evaluate at any moment their vital signs
its personal data, such as the national health identifi- registry and even add other measurements that were
cation number, gender, height and age. not made in the health kiosk.
After having all the user data collected, the next The printing of the results, as well as the genera-
step is to go through all the defined exams, after each tion of a QR Code are optional functions that can be
exam the user is presented with the results and a disabled by the person responsible for the configura-
chronological chart with all the measurements taken tion. This goes along with the idea of creating a sys-
with that device associated with the user. The col- tem that is highly configurable and capable of dealing
lected measurements are displayed in a bar, colored with the needs of its users.
green on what are considered default values for that
measurement with a gradient to red as it increases 4.2 Application Modularity
the distance to those values. The intermediary re-
sults screen are visible in Figure 5, which represents
what it looked like in the older version of the health From the beginning one of principles of the develop-
kiosk, and Figure 6 represents the newer version of ment of this health kiosk was the idea of modularity.
that screen. By creating a system that is based on this idea, adding
The proposed changes included an usage of or removing elements, changing their order or using
chronological graph, with the x axis being a time se- the system with different configurations is a goal eas-
ries, which means that the points take into considera- ier to achieve.
tion the distance between the presented dates; center- With that in mind, one of the main focus when
ing the next button and using a green color instead of developing this application is the possible configura-
blue. tions that the application should have. The use cases
can increase by creating a modular application. As
such, a configuration file was created, in which all
the possible options of the system are inserted. The
configuration file allows for the definition of which
screens to show, which exams are to be performed and
in which order to show them.
When having the possibility of choosing which
screens to be used, or which exams to perform, the
system is easily adapted to different use cases, from a
Figure 5: Blood Pressure Results on the previous version.
situation where no user data is needed such as a spe-
cific event where only a specific parameter is being
evaluated in a population to detect anomalies, to cases
where the system is deployed in a local place where
all the population can access it, and a record specific
to each user has more meaning.
A approach was made, when the system was being
developed, to try and simplify the process of adding
new exams or devices. A skeleton, based on web
Figure 6: Blood Pressure Results on the new version. components, is created for adding new exams to the
application, and if the device is certified, it can easily
In the final screen a table is presented with all col- be added to the system, needing only specific codes
lected data, as well as a QR Code that upon reading for the parameters being read from the device.
by a smartphone inserts in the default calendar app an Figure 7 represents an exam component, this com-
entry with all the collected data. ponent can be reused in different cases, the compo-
521
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
522
Modular Health Kiosk based on Web Technologies
Using a Node.js module (node-dbus), made it day in one of the university schools (46 users), during
possible to develop a new module capable of commu- a week at a local city hall (127 users) and for thir-
nicating with the existing Continua Alliance certified teen days in thirteen different villages in Brazil (465
devices, and to easily add new devices as long as in- users). This covered different age groups, and usage
formation about the devices is previously given to the information was retrieved not only from the applica-
developers in order to properly extract relevant infor- tion but also from the evaluation on how people used
mation produced by the device. the system. The evaluation used observer-filled ques-
Continua Alliance certified devices, generate data tionnaires and user click tracking. The evaluation did
in eXtensible Markup Language (XML) format, hav- not use the standard user questionnaires as we per-
ing the relevant medical data associated with a spe- ceived them as either too long or less appropriate than
cific Id for the parameter, it also provides information a researcher observing the usage. More details can be
relative to the date of the measurement. It also con- seen in (Soares et al., 2016).
tains parameters that can hold information about the At the moment the usability of the current system
physical device. has not been tested by a large population. The tools
Since the objective of the application is to adapt to for assessing time spent on each screen and where the
the users and not the other way around a decision had user has clicked throughout the usage are developed
to be made in order to support non certified devices and will soon be tested. This will allow us to evaluate
since there is a possibility of these types of devices if the interface is easily usable, if the user has the abil-
being cheaper for some possible use cases. This deci- ity to use the application from start to finish without
sion goes along with the idea of creating an adaptive any assistance, or if so which screens are taking more
system that is not closed in terms of compatible de- time from the flow of interaction.
vices. The collection of time spent on each screen can
For the case of the Nonin Oximeter 3230, as it help us determine if the instructions on the screen are
is not a Continua Alliance certified device a different easy to understand, and for instance, if having the
approach had to be made. Since this device commu- ability to use a citizenship card is quicker and more
nicates via BLE it was decided that taking advantage adopted than introducing the data manually.
of a Node.js modules (Noble) was an appropriate way By also collecting the coordinates of the clicks and
to develop the means to communicate with these types group all clicks made in a single screen presenting
of devices. For that a module was created that takes them on top of a screen representation it is possible to
the MAC Address of a device, starts scanning until determinate if the screen is usable, and if it is being
the device is found, after connecting to the device it used in the most correct way. If a large group of peo-
has to activate the characteristic of the device respon- ple click somewhere in the screen that is not intended
sible for sending data via Bluetooth, when that is done to be clicked then something is not right about that
a stream of continuous data is received by the appli- screen and must be evaluated.
cation, being decided that upon a number of repeti- More consideration has to be made in order to
tions that value was to be considered and the stream proper evaluate the usability by using these methods,
stopped. such as the elimination of outliers that could affect the
The development of these new modules will allow visualization of the problems on the screen. A small
a simpler development in the future since the base of amount of users could make excessive clicks in wrong
the communication is already implemented and what places or spent too much time in certain screens and
is required is to adapt it to the new devices is an eval- with that alert for a non existing problem.
uation of the device in order to proper assess what The usability of a previous version of the health
messages it sends, how it sends them and what is the kiosk has been tested (Soares et al., 2016) with the
best way to extract information from them. same idea of representing clicks on a screen represen-
tation, which is visible on Figure 8.
4.5 Usability
523
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
In Figure 8 it is possible to evaluate that users try ploying this system in these locations, makes it pos-
to interact with the color gradient before clicking on sible for the population to, by themselves, measure
the button to show the new screen. This type of infor- their vital signs.
mation allow us to consider what steps to take to make The current prototype makes use of a simple
the application more fluid, with quicker and better re- weighing scale, a portable blood pressure monitor and
sponses from the users. pulse oximeter, an evaluation of possible changes to
this setup is undergoing, with the idea in mind of hav-
4.6 Configuration Tool ing devices simpler to use and that possibly collect
more data. One example is going from a normal blood
Both on the previous version as well as in the new pressure monitor that the user has to set up and adjust,
version there was a unique point in the system that to one where the user simple introduces the arm in the
was responsible for the configuration of the system. fixed device and waits for the results. Also, weighing
The configuration file is currently responsible to scales capable of evaluating body fat are also an al-
allow for the definition of which screens to be shown ternative to the current existing ones. One point that
or wich personal data to collect, if features such as QR has to be considered is relative to the powering of the
Code, printing, voice instructions should be used or devices, presently all the devices are battery powered,
not in the application among other different options. which is not feasible in large scale.
For easier configuration, all possible configurable At it was already referred, the configuration of
values must be in this file. At this moment it is under the health kiosk is made by editing an existing con-
development a tool that will allow for non-technical figuration file with the desired values, but a Graphi-
users to configure the health kiosk. A preview of the cal User Interface (GUI) is being integrated into the
application interface is visible in Figure 9, this appli- health kiosk system soon that will allow for anyone
cation will be divided in several blocks of configu- responsible for the health kiosk to edit the configura-
ration grouped by what is being configured, such as tion without knowledge of the technical details.
available languages, what type of authentication is to It is also being developed under a master’s the-
be used, what exams are to be performed. The de- sis project a module that will allow the establishment
velopment of this tool is not only important to make of a video conference, using WebRTC, in which the
the health kiosk configurable without technical help patient can get help on how to use the device or ask
but also to evaluate what truly is configurable in this for a medical opinion on the collected data. Due to
system. the possibilities of WebRTC, the health professional
is not only able to establish a video conference, but it
is also able to have access to data from the applica-
tion, and to send data to the application. This creates
the possibility of having remote instructions that can
change the status of the application.
ACKNOWLEDGEMENTS
5 CONCLUSIONS
REFERENCES
A system such as the health kiosk could have a major
impact in different possible scenarios, such as rural Courtney, K. et al. (2013). Designing the community multi-
areas lacking medical resources or health centers with user health kiosk. Enabling Health and Healthcare
higher attendance than the one they can process. De- Through ICT: Available, Tailored and Closer, 183:79.
524
Modular Health Kiosk based on Web Technologies
525
Numerical and Implementation Issues in Food Quality Modeling for
Human Diseases Prevention
Keywords: Lagrangian Methods, Numerical Interpolation, Food Quality, Human Diseases, Cloud Computing, High Per-
formance Computing, Scientific Workflow, Smart Devices, Internet of Things, Marine Data Crowdsourcing.
Abstract: Monitoring nearshore sea water pollution using connected smart devices could be nowadays impracticable due
to the aggressive saline environment, the network availability and the maintain and calibration costs. Accurate
forecast of marine pollution is most needed to evaluate the adverse effects on coastal inhabitants’ health when
fishes and mussels farming economically characterizes the local social background. In an operational context,
numerical simulations are performed routinely on a dedicated computational infrastructure producing space
and temporal high-resolution predictions of weather and marine conditions of the Bay of Naples. In this paper
we present our results in developing a community open source Lagrangian pollutant transport and dispersion
model, leveraging on hierarchical parallelism implying distributed memory, shared memory and GPGPUs.
Some numerical details are also discussed. This system has been used to develop an alarm system to help local
authorities in making decisions regarding the collection of mussels. The model setup and the simulation results
will be improved using FairWind, an under development system dedicated to coastal marine crowdsourced data
gathering and sharing, based on smart devices and Internet of Things afloat.
526
Galletti, A., Montella, R., Marcellino, L., Riccio, A., Luccio, D., Brizius, A. and Foster, I.
Numerical and Implementation Issues in Food Quality Modeling for Human Diseases Prevention.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 526-534
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Numerical and Implementation Issues in Food Quality Modeling for Human Diseases Prevention
tained. Moreover, we give some insights about the each of these particles different characteristics are as-
related parallel implementation. signed, e.g. pollutant concentration and settling ve-
In order to support the numerical model solu- locity.
tion, we leverage on crowdsourced data acquired by At each time step, the particle position is calcu-
the system called "FairWind" a smart, cloud-enabled, lated on the basis of the flow velocity, computed by
multifunctional navigation system for leisure and pro- the hydrodynamic model ROMS, and a random jump
fessional vessels. This system has been developed as representing the turbulence diffusion.
an open technologies developing platform based on GVirtuS (Montella et al., 2011) is a general-
the Android operating system for smart devices. purpose virtualization service for high performance
In this context, the system is used to collect data computing applications on cloud environments, fo-
from on board marine instruments such as, but not cusing on NVidia CUDA GPGPU virtualization and
limited to, GPS, heading, pitch, roll, yaw and speed MPI based virtual clusters.
sensors, water temperature, depth and weather sen- The RAPID GVirtuS incarnation (Montella et al.,
sors. Collected data are sent on the land using grid 2016b) was used as GPGPU remoting provider for hi-
file transfer technologies, and then processed in order erarchical parallelism, sending the instruction set ker-
to improve data quality and consistency. nel to the accelerating hardware, processing data on
Data, made available to the community as open the device and then sending back results to the gen-
data, are used to improve the model setup (i.e. high eral purpose CPU.
resolution coastal digital depth model) and will be The FACE-IT (Framework to Advance Climate,
used for model evaluation and improvement (surface Economic, and Impact Investigations with IT) project
temperature, surface current). (Pham et al., 2012) has been developed, and contin-
ues to be developed, to provide a cloud-based sci-
The rest of the paper is organized as follows: sec- ence gateway for the web-based access to a range of
tion 2 is about related work; section 3 focuses on the data projects, simulation models and analysis tools
numerical issues driving the design of our Lagrangian (Montella et al., 2015). FACE-IT builds on the
model; section 4 is on details about the WaComM im- Globus Galaxies platform, which has been devel-
plementation with focus on parallel cores; section 5 is oped over the past several years at the University of
about the novel contribution of the crowdsourcing ap- Chicago, initially in support of the Globus Genomics
proach in this application research field; section 6 de- project (Madduri et al., 2015). FACE-IT is used as
scribes some preliminary computational evaluations; main computational playground for the implementa-
finally section 7 presents conclusions and future de- tion of the WaComM Lagrangian model running as an
velopments. on-demand and routinely workflow (Montella et al.,
2016a).
2 RELATED WORK
3 DESIGN
The Regional Ocean Modeling System (ROMS)
is a free-surface, terrain-following, primitive equa- WaComM is the evolution of the LAMP3D model.
tions ocean model widely used by the scientific We optimized the algorithms in order to improve
community to characterize and simulate the meso- its performance on high performance computing en-
and sub-mesoscale ocean and coastal water dynam- vironment adding features as restarting and shared
ics (Haidvogel et al., 2000; Wilkin et al., 2005; memory parallelization. The description of the un-
Shchepetkin and McWilliams, 2003; Shchepetkin and derlying mathematical model is as follows.
McWilliams, 2005). In this application ROMS is Pollutants are considered as inert Lagrangian par-
forced by a high-resolution atmospheric forecast and ticles, tracing the marine circulation without feedback
provides the flow velocity on a curvilinear boundary- interactions with sea current fields and other particles.
fitted grid. Each particle is assumed to have:
ROMS was used to deploy a real-time forecast for • position r(t) = (x(t), y(t), z(t)) at time t;
the transport and deposition of water pollutants us-
ing the particle-tracking WaComM model, which im- • initial position r0 = r(0) = (x0 , y0 , z0 ) at the initial
plements a Lagrangian technique consistent with the time t = t0 = 0;
advection-diffusion equation (Rodean, 1996). • velocity v(r(t),t) = U(r(t),t) + η(r(t),t) at time
In this kind of model, the dispersion phenomenon t, where U(r(t),t) denotes the deterministic ve-
is reproduced by imaginary numerical particles; at locity, and η(r(t),t) is the stochastic fluctuation
527
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
arising from the Langevin equation model in or- et al., 2015). In this case we choose a simple trilinear
der to describe the Brownian motion of particles interpolation approach using barycentric coordinates.
(Rodean, 1996). In particular, by referring to the notations introduced
Given U(r(t),t), or an estimate of it, for each posi- in Figure 1, we compute velocities at any spatial lo-
tion r(t) and at each time t, the final particle posi- cation, e.g. at particle position r and desired time, by
tion r(tk+1 ) = r(tk + Δt), at time tk+1 = tk + Δt, can be the linear interpolation of velocities made available
computed by means of the equation: by ROMS at the vertexes of any grid cell and regular
tk +Δt time intervals.
r(tk + Δt) = r(tk ) + v(r(t),t) dt, (k = 0, 1, . . .), In order to assign the stochastic fluctuations, Wa-
tk ComM relies on the standard ‘K-theory’, based on
(1) a diffusion coefficient which is estimated by pre-
where r(tk ) is a starting position, at the starting time processed ROMS data. An exponential decay which
tk , and Δt > 0 denotes a time interval length (in Wa- uses the T90 parameter (the time required to de-
ComM we set Δt = 1 h). grade 90% of the biodegradable matter in a given
Numerical integration of (1) could be made in sev- environment) is applied to takes into account de-
eral ways; in our approach we use the Eulero method caying processes. A sedimentation velocity, wsed =
that considers a discretization of the time interval (0, 0, −wsed ), is added to the deterministic component
[t1 ,t1 + Δt] in the grid of velocity to simulate settling particles. At the end
τ j,k = tk + j · dτ, j = 0, . . . , N of each suitably chosen time interval, a scaled con-
centration field Ci, j,k is computed by simply counting
where dτ = Δt/N denotes the discretization step. the number of particles found within each grid cell.
To do this, at each time τ j the evaluations of
U(r(τ j,k ), τ j,k ) and η(r(τ j,k ), τ j,k ) are required. How-
ever, these values are provided by ROMS only at
some discrete time instants, and on a discrete irregu- 4 IMPLEMENTATION
lar three-dimensional grid. Such a grid can be thought
of as the set of vertexes of a finite number of poly- The modeling system can be used in an ex-ante fash-
hedrons Vi (cells). These cells are all topologically ion, as a decision support tool to aid in the selection
homeomorphic to a cube and their union is the space of the best suitable areas for farming activity deploy-
domain of U. ment, or in an ex-post fashion, in order to achieve a
better management of offshore activities. We tested
the system on several case studies where pollutants
are spilled out from well known punctual sources lo-
cated along the coasts of Campania region.
As arguing from the numerical approach, the
model is computing intensive and parallelization is
needed for its usage in real-world applications. The
problem size increases with the number of emission
Figure 1: Example of cell. The cells form the irregular grid
sources and the number of emitted particles. More-
where the values of U are known. over, the computing time is influenced by the integra-
tion time step which should be short enough to cor-
An example of the form of such cells is in Fig- rectly represent the turbulent diffusion processes.
ure 1. Notice that the irregular polyhedron is defined Although consistent results can be guaranteed us-
by assigning its eight vertexes. ing the sequential implementation of the WaComM
Possible choices of interpolants, which do not model, the wall-clock performance actually makes the
need any information about the mesh (i.e. the so- production unfeasible.
called mesh-free methods) are the radial basis func- Hence, the growing need of on-demand results,
tions methods (Cuomo et al., 2013; Fasshauer, 2007). which involves a large computational effort for Wa-
However, when some structure of the grid is assigned, ComM, suggests to use general purpose GPUs in or-
i.e. when a smart subdivision of the domain in geo- der to efficiently perform computing intensive tasks.
metrical polyhedral structures is known, one can take In particular, a GPU implementation is considered
advantage of this fact and so several kinds of inter- for the WaComM main cycles involved for the inter-
polants, exploiting the geometry of the cells that form polation and evaluation steps of the 3D momentum
the mesh, can be defined (Galletti and Maratea, 2016; and dispersion parameters. This concerns with a par-
Cuomo et al., 2014a; Cuomo et al., 2014b; Cuomo allel design schema hierarchical and heterogeneous.
528
Numerical and Implementation Issues in Food Quality Modeling for Human Diseases Prevention
The implementation of the GPGPU enabled code a scientifically intriguing source of huge amounts of
is realized with the NVIDIA CUDA programming geolocated data (big-data) about marine coastal envi-
model, and using heterogeneously both the CPU and ronment (weather and sea conditions, surface sea cur-
GPU (Ortega et al., 2016) supported by an MPI based rents, water temperature, water depth, etc.), boat en-
distributed memory approach. Such an implementa- gine status, boat performances (speed, heading, pitch,
tion considers a dynamical load balancing on the par- roll), presence of board water and waste management,
ticle number. fuel consumptions and, above all, safety at sea and
More in detail, the distributed memory paralleliza- search and rescue systems (Figure 2).
tion has been introduced in the hourly inner cycle of Data is collected on board and, when possible,
WaComM in order to enhance the performance. Such sent to cloud storage and computing facilities using
a cycle computes the path of each particle and, since reliable, affordable, and safe technologies such as the
no interaction between particles is assumed, each par- Globus data transport services. Users can choose
ticle path can be virtually tracked independently of what data to share in a named or anonymous way.
the others. As explained in the design section, the Operationally, once data is collected, it will be ana-
interpolation stage is time consuming. The problem lyzed and processed in order to extract sensor calibra-
size scales with the input data (the resolution of the tion using big-data algorithms, evaluated with a qual-
momentum, the sea current 3D vector components ity model comparing it with data acquired by trustful
- U, V, W - and the vertical T-diffusion - AKT - equipment and, finally, made available as open data
grid). Then, previous discussion justifies even more for ocean model initialization and/or validation.
the shared memory parallel approach for the evalua-
tion of the interpolation model.
6 EVALUATION
5 DATA CROWDSOURCING This section describes the WaCoMM model use case
for the Campania Region (Italy), applied to prevent
In the field of ocean modeling, the need for compu- the consumption of contaminated food harvest in
tational and storage resources is currently satisfied by mussel farms. This farms have, generally, a long lines
the availability of cloud based services that reduce the organization in which the mussels are attached to sub-
total cost of ownership and accelerate the democra- merged ropes hung from a back-bone supported by
tization of science (Foster, 2011). Nevertheless, to large plastic floats.
have more robust and accurate models, there is a need In 2006, the Campania Region published the
for detailed, high resolution, spatio-temporal data for “Guidelines for mussel farms: classification and
initialization and validation. While data can be hard monitoring system of mussels production and relay-
to obtain from traditional sources, due the lack of ing areas” to delineate the guideline to mussel farms
available public data in some coastal areas, the chal- monitoring.
lenges of surveying large areas and other technical This document identified the skills to perform
constraints, this data can be easily obtained using in- the analysis provided by the Experimental Zoo-
ternet of things based crowdsourcing tools like Fair- prophylactic Institute of Southern Italy (IZSM) for
Wind mussels samples and by the Campania Regional En-
(Montella et al., 2016c). vironmental Protection Agency (ARPAC) for water
FairWind is an integrated, multifunctional, navi- samples. The in situ analysis also included the com-
gation software based on open technologies designed pulsory microbiological parameters: Escherichia Coli
and developed by a very interdisciplinary team in or- and Salmonella spp. In accordance with the current
der to maximize the benefits and the advantages. It European legislation (2073/2005EC), the concentra-
is a marine single board computer device leveraging tion of E. Coli and Salmonella spp in mussels must be
a custom-built infrastructure on top of stable and well less than 230 MPN/100g (Most Probable Number per
documented mobile and cloud technologies. 100 grams) and zero respectively.
From the marine electronics point of view, the The considered mussels rows (MFPT in Figure 3)
most remarkable innovation introduced by FairWind are located about 500 m distance to the coast in Punta
are the Boat Apps that extend the FairWind basic fea- Terone-Capo Miseno and cover an area of about 257
tures, integrating with already present onboard instru- m2 , with a depth of about 20 m. In this case, the
ments and straightforwardly interacting with indus- reared mussels are mostly Mytilus Galloprovincialis.
trial or self - made internet of things based instru- The MFPT mussels are allowed to be placed on the
ments. The board dataset, collected by FairWind, is market for human consumption directly, without fur-
529
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Figure 2: Smart devices in a context of internet of things afloat make data crowdsourcing affordable. FairWind equipped
professional and leisure boats can contribute to model setup improvement and data assimilation.
ther treatment in a purification centre or after relaying domain is 715×712×11 grid points (Latmin =40.48N,
(class type A). This makes the mussels quality very Latmax =40.95N; Lonmin =13.91E, Lonmax =14.52E).
important to human diseases prevention. The pollutant sources in the Gulf of Naples are con-
In some cases flooding events can bring too much sidered as points all along the coast, spilling out 100
pollutants to shellfish farms, banning them from har- particles for each simulation hour. Actually we used
vesting. 50 particle sources. Our system has been tested com-
In this context, a forecasting system of the meteo- paring the numerical forecast and mussel microbio-
rological and hydrodynamic circulation, coupled with logical analysis. The simulation spanned the time
the WaComM model, can be a valid support to the interval 07/12/2015 Z00 – 21/12/2015 Z23 and the
mussel farm management. output was stored at a hourly interval. On days
09/12/2015 and 21/12/2015 the local authorities car-
WaComM is included in a scientific workflow to ried out the microbiological analysis on Mytilus Gal-
ingest the forecast input data needed to initialize the loprovincialis in Punta Terone mussel farm. Results
simulation and track particles trajectories. showed a concentration of E. Coli much greater than
The Weather Research and Forecasting Model the legal limits in the first day (5400 MPN/100g) and
(WRF) (Skamarock et al., 2001) simulates the lower in the second day (45 MPN/100g); Salmonella
weather conditions for driving the ROMS model. spp was absent in both samples.
The WRF model has already been used to simulate
weather conditions on the Campania region (Barone The mean wind direction started blowing from
et al., 2000; Ascione et al., 2006). WaComM model NW from 7 to 9 December 2015; in this period parti-
530
Numerical and Implementation Issues in Food Quality Modeling for Human Diseases Prevention
Figure 3: Mussel farms locations in the Bay of Pozzuoli. The studied mussel farm is in Punta Terone (MFPT ) area.
cles spilled out by sources in the eastern part moved sel farms management, in order to prevent E. Coli
towards the center, while particles emitted by sources and Salmonella human diseases with a strong effort
in the western part remained close to the coast (see in data dissemination for local management decision
Figure 4). After, the mean wind shifted to NE and all support (Montella et al., 2007).
particles moved towards the center of the gulf with a WaComM is under continuous active develop-
progressive increase in the concentration of the tracer ment.
in the area surrounding the two mussel farms with a
From the implementation point of view a deep
maximum value on day 15/12/2015. Subsequently,
refactoring is needed in order to better exploit the hi-
the rotating ocean currents contributed to the disper-
erarchical parallelism. The current implementation
sion of the tracer away from the mussel farms. This
leverages on a naive application designed load bal-
picture is also confirmed by microbiological analy-
ancing (Laccetti et al., 2013). A Portable, Extensible
sis carried out on Mytilus Galloprovincialis mussels
Toolkit for Scientific Computation (PETSc) approach
(Figure 5). The comparison between numerical fore-
could enhance the overall perforance and, above all,
cast and microbiological analysis showed a remark-
the problem scalability (Carracciuolo et al., 2015).
able similarity in trends, although this kind of analysis
have to be performed in a more extensively fashion. A short-term goal of our project is to extend the
That confirmed the possibility to use the system as a studied area to the whole coasts of the Campania
decision maker tool for applications correlated with Region in order to promote its use as an effective
sea quality and as a support system for experimental tool dedicated to improve the management of coastal
observations and controls. farms. In order to achieve this target, we need to im-
prove the robustness of the WaComM model and the
scalability of the offline coupling system.
7 CONCLUSION From the scientific point of view, we will en-
hance the simulation quality with data collected us-
The quality of coastal marine waters depends strictly ing the FairWind technology as depicted above im-
on the impact of human activities. Urban settlements, proving the data acquisition from boat sensor as inter-
industries, agriculture, livestock farming and weather connected smart devices using the Internet of Things
conditions produce effects which, individually or to- afloat technologies. This issue is a source of novelty
gether, can heavily compromise or even disrupt the even because the whole FairWind ecosystem is based
equilibrium of aquatic ecosystems. on the SignalK marine data interchange open proto-
In this paper we presented our research efforts in col (http://signalk.org). The proposed system is ex-
designing and developing WaComM, a community tensible in order to collect data from other sensors
water quality model, with the main aim, but not lim- as, but not limited to, surface ph and salinity sen-
ited to, to develop a forecast system and perform op- sors that could improve the simulation quality and the
erational numerical predictions in the context of mus- model validation process and, finally, if supported by
531
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Figure 4: Sea surface currents (vectors) and pollutants concentration (red=high; yellow=medium; green=low; blue=very low;
white=absent) in in Gulf of Pozzuoli (Campania Region, Italy) in days 08/12/2015 Z12 (figure A), 09/12/2015 Z12 (figure
B), 15/12/2015 Z12 (figure C) and 20/12/2015 Z23 (figure D). The red dotted line is the area of Study with mussel farms in
Punta Terone (number 1 in figure A) area.
a ground true based on better microbiological analy- originated enterogastric diseases (Suffredini et al.,
sis and consistent epidemiological studies on mussels 2014), enhance the overall system trustability.
532
Numerical and Implementation Issues in Food Quality Modeling for Human Diseases Prevention
533
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
of Information and Communication Technologies in 8th International Workshop on Modeling the Ocean
Healthcare (ICTH-2016)/Affiliated Workshops. (IWMO), Bologna, Italy.
Giunta, G., Montella, R., Mariani, P., and Riccio, A. (2005). Ortega, G., Puertas, A., de Las Nieves, F. J., and Martin-
Modeling and computational issues for air/water qual- Garzón, E. (2016). Gpu computing to speed-up the
ity problems: A grid computing approach. Nuovo Ci- resolution of microrheology models. In Algorithms
mento C Geophysics Space Physics C, 28:215. and Architectures for Parallel Processing, pages 457–
Haidvogel, D. B., Arango, H. G., Hedstrom, K., Beck- 466. Springer.
mann, A., Malanotte-Rizzoli, P., and Shchepetkin, Pham, Q., Malik, T., Foster, I. T., Di Lauro, R., and Mon-
A. F. (2000). Model evaluation experiments in the tella, R. (2012). SOLE: Linking Research Papers with
north atlantic basin: simulations in nonlinear terrain- Science Objects. In IPAW, pages 203–208. Springer.
following coordinates. Dynamics of Atmospheres and Rodean, H. C. (1996). Stochastic Lagrangian models of
Oceans, 32(3):239–281. turbulent diffusion, volume 45. Springer.
Haron, N. S., Mahamad, M. K., Aziz, I. A., and Mehat, M. Shchepetkin, A. F. and McWilliams, J. C. (2003). A method
(2009). Remote water quality monitoring system us- for computing horizontal pressure-gradient force in an
ing wireless sensors. In Proceedings of the 8th WSEAS oceanic model with a nonaligned vertical coordinate.
International Conference on Electronics, Hardware, Journal of Geophysical Research: Oceans, 108(C3).
Wireless and Optical Communications (EHAC’09), Shchepetkin, A. F. and McWilliams, J. C. (2005).
Cambridge, UK, pages 148–154. "the regional oceanic modeling system (roms):
Laccetti, G., Lapegna, M., Mele, V., and Romano, D. a split-explicit, free-surface, topography-following-
(2013). A study on adaptive algorithms for numer- coordinate oceanic model". Ocean Modelling,
ical quadrature on heterogeneous gpu and multicore 9(4):347 – 404.
based systems. In International Conference on Paral- Skamarock, W. C., Klemp, J. B., and Dudhia, J. (2001).
lel Processing and Applied Mathematics, pages 704– Prototypes for the wrf (weather research and fore-
713. Springer. casting) model. In Preprints, Ninth Conf. Mesoscale
Madduri, R., Chard, K., Chard, R., Lacinski, L., Rodriguez, Processes, J11–J15, Amer. Meteorol. Soc., Fort Laud-
A., Sulakhe, D., Kelly, D., Dave, U., and Foster, erdale, FL.
I. (2015). The Globus Galaxies platform: Deliver- Suffredini, E., Lanni, L., Arcangeli, G., Pepe, T., Mazzette,
ing science gateways as a service. Concurrency and R., Ciccaglioni, G., and Croci, L. (2014). Qualitative
Computation: Practice and Experience, 27(16):4344– and quantitative assessment of viral contamination in
4360. CPE-15-0040. bivalve molluscs harvested in italy. International jour-
Montella, R., Coviello, G., Giunta, G., Laccetti, G., Isaila, nal of food microbiology, 184:21–26.
F., and Blas, J. G. (2011). A general-purpose vir- Wilkin, J. L., Arango, H. G., Haidvogel, D. B., Lichten-
tualization service for HPC on cloud computing: an walner, C., Glenn, S. M., and Hedström, K. S. (2005).
application to GPUs. In International Conference on A regional ocean modeling system for the long-term
Parallel Processing and Applied Mathematics, pages ecosystem observatory. Journal of Geophysical Re-
740–749. Springer. search: Oceans, 110(C6).
Montella, R., Di Luccio, D., Troiano, P., Brizius, A.,
and Foster, I. (2016a). WaComM: A parallel Water
quality Community Model for pollutant transport and
dispersion operational predictions. In International
Workshop on Numerical Algorithms and Methods for
Data Analysis and Classification, 2016. NAMDAC’16.
IEEE. IEEE.
Montella, R., Ferraro, C., Kosta, S., Pelliccia, V., and
Giunta, G. (2016b). Enabling android-based devices
to high-end gpgpus. In Algorithms and Architectures
for Parallel Processing, pages 118–125. Springer.
Montella, R., Giunta, G., and Riccio, A. (2007). Using grid
computing based components in on demand environ-
mental data delivery. In Proceedings of the second
workshop on Use of P2P, GRID and agents for the de-
velopment of content networks, pages 81–86. ACM.
Montella, R., Kelly, D., Xiong, W., Brizius, A., Elliott, J.,
Madduri, R., Maheshwari, K., Porter, C., Vilter, P.,
Wilde, M., et al. (2015). FACE-IT: A science gateway
for food security research. Concurrency and Compu-
tation: Practice and Experience, 27(16):4423–4436.
Montella, R., Luccio, D. D., Ferraro, C., Izzo, F., Troiano,
P., and Giunta, G. (2016c). Fairwind: a marine
data crowdsourcing platform based on internet of
things and mobile/cloud computing technologies. In
534
S HORT PAPERS
Discussions of a Preliminary Hand Hygiene Compliance Monitoring
Application-as-a-service
Peng Zhang1 , Marcelino Rodriguez-Cancio2 , Douglas Schmidt1 , Jules White1 and Tom Dennis3
1 Institute
for Software Integrated Systems, Vanderbilt University, Nashville, TN, U.S.A.
2 Research
Institute of Computer Science and Random Systems, University of Rennes 1, Rennes, France
3 ZH Solutions, Nashville, TN, U.S.A.
Keywords: Machine Learning, Deep Learning, Data Mining, Hospital and Healthcare, Hand Hygiene Compliance,
Re-admissions.
Abstract: Hospital Acquired Infections (HAIs) are a global concern as they impose significant economic consequences
on the healthcare systems. In the U.S. alone, HAIs have cost hospitals an estimated $9.8 billion a year. An
effective measure to reduce the spread of HAIs is for Health Care Workers (HCWs) to comply with recom-
mended hand hygiene (HH) guidelines. Unfortunately, HH guideline compliance is currently poor, forcing
hospitals to implement controls. The current standard for monitoring compliance is overt direct observation
of hand sanitation of HCWs by trained observers, which can be time-consuming, costly, biased, and sporadic.
Our research describes a hand hygiene compliance monitoring app, Hygiene Police (HyPo), that can be de-
ployed as a service to alleviate the manual effort, reduce errors, and improve existing compliance monitoring
practice. HyPo exploits machine learning analyses of handwashing compliance data from a 30-bed intensive
care unit to predict future compliance characteristics. Based on the results, HyPo then provides HWCs with
timely feedback and augments the current monitoring approach to improve compliance.
1 INTRODUCTION observed.
Contribution. Based on our preliminary study on
Emerging Concerns in Healthcare. Hospital Ac- HH compliance characteristics using machine learn-
quired Infections (HAIs) are occupational infections ing (Zhang et al., 2016), this work proposes a hand
acquired by Healthcare Workers (HCWs) or by pa- hygiene compliance monitoring app, Hygiene Police
tients in healthcare facilities that appear after patient (HyPo), that can be deployed as a service. The goal of
discharge (WHO, 2009). HAIs represent significant this app is to mitigate the laborious effort and reduce
health problems, with a considerable economic im- errors of direct observation.
pact on patients and hospitals worldwide. App Workflow. HyPo is implemented as a Java-
Persistent exposures to diseases and lack of appro- based desktop app that communicates to and from
priate hand hygiene (HH) practice can cause HCWs’ Bluetooth Low-Energy (BLE) devices equipped at the
hands to become carriers of infections transmitted to facility from our previous study (Zhang et al., 2016).
patients or other staff through physical contact. To The schematic in Figure 1 depicts the overall app
reduce re-admission rates, therefore, HCWs are ex- workflow, which is divided into the following three
pected to comply with HH guidelines to prevent the stages (the last two are the core components of HyPo):
spread of HAIs in healthcare facilities. The cur-
1. Data Acquisition, where raw data is acquired
rent standard practice of compliance monitoring is for
from the BLE devices.
covert human auditors to unobtrusively observe and
record HH compliance of medical workers. Unfor- 2. Data Mining, where the raw data undergoes a
tunately, this approach is costly and subject to bias data mining process provisioned by HyPo to pro-
(Boyce et al., 2009) due to the Hawthorne effect (Eck- duce a set of features that is fed to Feature Selec-
manns et al., 2006), which occurs when subjects of a tion algorithms to obtain a Sanitized Dataset. The
study change their behavior due to awareness of being Feature Selection is done to improve the execu-
537
Zhang, P., Rodriguez-Cancio, M., Schmidt, D., White, J. and Dennis, T.
Discussions of a Preliminary Hand Hygiene Compliance Monitoring Application-as-a-service.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 537-544
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Figure 1: The Overall System Flow: from Data Collection to Post-prediction Analysis and Feedback Service.
tion performance of the Machine Learning (ML) 3. Entry compliance: hand hygiene compliance ob-
methods that will follow by determining the most served at staff’s entry to a patient room, deter-
relevant features and removing the others from the mined by wash on entry.
Sanitized Dataset.
4. Exit compliance: hand hygiene compliance ob-
3. Feedback Service, where the ML models are run served at staff’s exit from a patient room, deter-
over the Sanitized Dataset to produce feature set mined by wash on exit.
that can be used to provide timely feedback to
5. Wash on entry: hand hygiene action at patient
healthcare providers.
room entry that determines entry compliance, true
Paper Organization. The remainder of this paper if performed and false otherwise.
is organized as follows: Section 2 defines key terms 6. Wash on exit: hand hygiene action at patient
frequently referenced throughout the paper; Section 3 room exit that determines exit compliance, true if
describes the data collection setup; Section 4 details performed and false otherwise.
the data preparation and mining process; Section 5
describes Hypo’s feedback service and how it com- Our previous study collected 60 days of care
plements the direct observation approach; Section 6 providers’ real-time location and handwashing data,
surveys and compares existing research in the area of from an intensive care unit (ICU) equipped with 30
hand hygiene compliance improvement and monitor- beds, and observed two major correlating factors to
ing applications; and Section 7 presents concluding compliance: (1) entry compliance has an 89% accu-
remarks and outlines future extensions of this work. racy on predicting exit compliance and (2) exit com-
pliance can predict entry compliance at the next visit
(for the same staff) at an accuracy as high as 77%.
Likewise, location data was observed to have a minor
2 HAND HYGIENE impact on predicting exit compliance (Zhang et al.,
COMPLIANCE OVERVIEW 2016).
Based on this previous study, in the HyPo app we
This section defines the following terms that are used compiled the following rules of hand hygiene compli-
frequently in the paper: ance that ICU staff should abide by:
1. All on-duty staff at the ICU were required to wear
1. Hand hygiene opportunity: an opportunity for
a BLE badge.
hand cleaning is presented before each care
provider’s entry/exit of a patient room. 2. All staff were required to sanitize their hands
within a short interval of 2 minutes upon entering
2. Hand hygiene/handwashing compliance: each
a patient room and before exiting the same room.
hand hygiene opportunity requires one hand hy-
giene action, which should be a correspond- 3. Each compliant action should be associated with
ing positive (compliance) or negative (non- an activation of a specific soap dispenser with
compliance) action (EFORE, 2009). disinfectant solution against Clostridium difficile,
538
Discussions of a Preliminary Hand Hygiene Compliance Monitoring Application-as-a-service
a common HAI spread through physical con- truth of hand hygiene compliance. The dataset col-
tact (Shrestha et al., 2016). These dispensers are lected has a number of key threats to validity, includ-
located both inside and outside each patient room. ing: (1) not all staff wore their BLE badges at all
These rules only apply to this ICU but can be con- times, (2) the system could not differentiate activa-
figured to work with other caregiving settings. The tions from badged vs. non-badged visitors/staff, and
rest of this paper describes the application of HyPo (3) subsets of the monitoring equipment went offline
using the same device-equipped 30-bed ICU from our at some intervals and prevented data capture in certain
previous study (Zhang et al., 2016) as an example. rooms.
However, we did not consider these limitations
as fatal to our study results because we could either
easily eliminate the data entries associated with these
3 DATA ACQUISITION threats or discard the marginal impact that the threats
had on our findings.
This section describes the data acquisition process,
where real-time location data and handwashing sta-
tion activation data is recorded, and then provides an
3.3 Dataset Schema
overview of the essential data fields extracted from
the collection. The process described in this section From the SQL database we obtained an initial dataset
is one approach of obtaining the hand hygiene com- by omitting certain data fields with extraneous infor-
pliance data to provide input for our app, but it is by mation, such as device IDs of the wearable badges,
no means the only option to acquire this type of data. internally-used identifiers of the patient rooms, etc.
The data fields associated to each patient room visit
3.1 Instrumentation Configurations event that we deemed essential thus extracted from
the database include:
The ICU with HyPo deployment was equipped with a 1. Staff ID - ID of badge worn by the staff who has
Bluetooth Low-Energy (BLE) indoor positioning sys- been associated with a patient room visit
tem that provides room-level accuracy for reporting 2. Location - patient room number visited by the
staff locations in real-time. The system produced the badged staff
location data for all staff with BLE badges.
The ICU also deployed Gojo Active Monitoring 3. Entry time - timestamp (in CDT) at which the
handwashing stations, which record each dispenser badged nurse entered the patient room
activation. These activation events were then com- 4. Exit time - timestamp (in CDT) at which the
bined with real-time location data to track individual badged nurse exited the patient room
staff handwashing compliance. The system expected
to receive at least one handwashing event from ei- 5. Wash on entry - a boolean value indicating
ther a sanitation station inside of the room or a sta- whether the staff properly performed hand hy-
tion immediately outside the room within two min- giene on patient room entry
utes prior to entry, abiding the facility rules described 6. Wash on exit - a boolean value indicating if the
in Section 2. Similarly, two minutes before or af- staff properly performed handwashing on patient
ter room exit, the system expected one handwashing room exit
event from either sanitation stations.
7. Duration - for how long (in milliseconds) the staff
Overall, the dataset collected at the studied ICU
was in the patient room
contains 8 weeks of events recording activities from
180+ soap dispensers activated by 60 badged nurses
24 hours a day. All raw event data was streamed to a
data storage on Amazon Web Services (AWS), which 4 DATA PREPARATION
was post processed and output to a SQL database. We
then extrapolated the data fields of interest for com- This section discusses how we prepared the collected
pliance predictions and analyses. data to maximize the utilization of our machine learn-
ing classifiers, which is an important capability of-
3.2 Dataset Limitations fered by HyPo. This process is the same as that em-
ployed in (Zhang et al., 2016) to assist the analy-
Although real-time location data was acquired and ses and characterization of hand hygiene compliance.
handwashing station activations recorded at the ICU, Other influencing factors of hand hygiene compliance
the dataset was still an estimate rather than a ground may be discovered as more relevant data becomes
539
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
available, such as patient admittance details, medi- that our application expects to receive for best accu-
cal records of admitted patients, facility regulations racy:
of compliance, etc. 1. staff ID - integer
Despite the specificity of the dataset used through-
out this paper, the data mining process provided by 2. location (room number) - integer
HyPo as described below can be generalized to sup- 3. washed on entry - TRUE/FALSE
port transformations of different forms of data col-
4. washed on exit - TRUE/FALSE
lected in other facilities.
5. duration (s) - length of patient room visit in sec-
4.1 Data Transformation onds, integer
6. entry hour - hour of day on room entry, 0-23
Most machine learning (ML) classifiers yield better 7. exit hour - hour of day on room exit, 0-23
results when the input dataset is structured in certain
8. entry time - time of day on recorded room entry
ways. For example, suppose we want to know if the
in Morning (1), Afternoon (2), Evening (3), and
day of week (Monday to Sunday) influences compli-
Bedtime (4)
ance, some ML classifiers will yield better results if
we express date as a set of integers ranging from 1 9. exit time - time of day on recorded patient room
to 7, as opposed to a real continuous stream of times- exit, 1-4
tamps expressed in milliseconds. 10. entry day of week - day of week on recorded pa-
As another example, our location data consists of tient room entry, 1-7
room numbers, which provides little information re-
garding spatial distribution of the rooms. If we want 11. exit day of week - day of week on room exit, 1-7
to know whether compliance decreases in nearby lo- 12. location X coordinate - x coordinate of patient
cations, we must first transform the room numbers room on the ICU floor plan
into coordinates on the facility’s floor plan, for in- 13. location Y coordinate - y coordinate of patient
stance. room on the ICU floor plan
To obtain a transformed schema that can be bet-
ter handled by our classifiers, we took the collected 14. previous duration (s) - duration of the same staff’s
dataset and performed the following transformations previous patient room visit in seconds
over it: 15. previous washed on entry - dispenser activation on
previous room entry TRUE/FALSE
1. We converted all event data from the original
timestamp format into an integer field with range 16. previous washed on exit - dispenser activation on
1 to 7 to represent day of week, an integer field previous room exit TRUE/FALSE
with range 1 to 4 to represent time of day in morn- 17. previous location - previously visited patient room
ing, afternoon, evening, bedtime, and another in- number
teger data field of 0-23 to represent hour of day.
The numeric representations of the original nom- 4.2 Feature Selection
inal time stamp data will allow our classifiers to
achieve higher classification accuracy.
After we transformed the dataset into a features set,
2. We mapped each patient room on the ICU floor we executed a feature selection process to automat-
plan to a set of x and y coordinates to identify the ically select feature subsets in our transformed data
spacial location. We then extended each entry in that best (1) reduced overfitting of data, (2) improved
the dataset to include these corresponding coordi- classification accuracy, and (3) decreased model train-
nates of the patient room. ing time (Guyon and Elisseeff, 2003). Although we
3. For each data point we added new fields to include do not have a significantly large feature list produced
the previous record of the corresponding badged for this ICU, it is still useful to apply this technique
staff’s handwashing data, i.e., duration, location, to select the most relevant subsets of features to help
washed on entry, and washed on exit. To ensure produce the most accurate feedback in the next step.
data integrity, we removed all entries that did not To automatically select features from the trans-
have previous handwashing records. formed dataset, HyPo applies a supervised attribute
selection filter from the open source Weka Java li-
As a result of these transformations, we obtained brary (Hall et al., 2009). The filter is composed of
a new schema consisting of a minimal set of features two pieces: (1) a feature Evaluator to determine how
540
Discussions of a Preliminary Hand Hygiene Compliance Monitoring Application-as-a-service
features are evaluated and (2) a Search Method to nav- 5.1 Machine Learning Models
igate the feature’s search space. Our app runs feature
selection using the following pairs of Evaluators and After preparing the dataset, we split the data to 65%
Search Methods, as shown in Table 1: for training, 10% for cross validation, and the re-
1. Evaluator: CfsSubsetEval that evaluates a subset maining 25% for testing the ML models. Based
of features by considering each feature’s predic- on the compliance prediction observations from the
tive ability and the degree of redundancy between previous study in (Zhang et al., 2016), we em-
them. ployed the top three classifiers, one from Weka (Hall
et al., 2009) and two deep nets from DeepLearning4J
Search Method: GreedyStepwise with a backward
(DL4J) (Team, 2016) to serve as our models for clas-
search through the space of attribute subsets.
sifying washed on entry and washed on exit. HyPo
2. Evaluator: InfoGainAttributeEval that evaluates then uses the results with highest accuracy.
an attribute’s worth by measuring the information
gain with respect to the class variable to classify. • The Sequential Minimal Optimization (SMO)
implementation of the Support Vector Machine
Search Method: Ranker that ranks features by
(SVM), which uses heuristics to partition the
their individual evaluations with an optional pa-
training problem into smaller sub-problems and
rameter of 6 features in the output subset
uses pairwise linear regression to classify. This
3. Evaluator: WrapperSubsetEval (Kohavi and method is usually resilient to data overfitting and
John, 1997) with NaiveBayes (John and Langley, by default normalizes the input data (Platt et al.,
1995) as the basic learning scheme and a 10-fold 1998).
cross validation to use for estimating accuracy.
• The Feed-Forward Neural Network (FFNN),
Search Method: GeneticSearch that performs a which is a one direction (from input to output)
search using the simple genetic algorithm (Gold- artificial neural network that performs classifica-
berg, 1989) tions based on weight calculations of the network
Table 1: Evaluator and Search Method Pairs Used in Fea- nodes (Glorot and Bengio, 2010). Using the DL4J
ture Selection Java library, we developed a 3-layer FFNN with a
random seed of 6, 1000 iterations, a learning rate
Evaluator Search Method
CfsSubsetEval GreedyStepwise of 0.1, and the Stochastic gradient descent opti-
InfoGainAttributeEval Ranker mization algorithm (Gardner, 1984).
WrapperSubsetEval GeneticSearch • The Recurrent Neural Network (RNN), which
has a feedback loop whereby the immediately pre-
Our previous study (Zhang et al., 2016) observed vious step’s output is fed back to the net to affect
two highly correlating factors of compliance using the the outcome of the current step. We used a 3-layer
data collected in the same 30-bed ICU. We could con- RNN with two Graves’ Long Short-Term Memory
figure HyPo to select only these two features from (LSTM) layers (Graves, 2012) (input and hidden)
the dataset to use for determining feedback provi- and an output layer along with the same parame-
sion. However, automatic feature selection is an in- ters as the FFNN.
tegral piece because as the dataset increases in size
and dimension, our enhanced app can continuously
combine features or intelligently adjust the correlat- 5.2 Just-in-Time Alerting
ing features to maximize classification accuracy.
With our previously characterized predictability of
compliance (Zhang et al., 2016), as described in Sec-
tion 2, and necessary pre-configurations to the data
5 FEEDBACK SERVICE collection instruments, HyPo can provide just-in-time
alerting to remind HCWs to perform hand hygiene
This section first describes the machine learning mod- when they are predicted not to comply, using either a
els employed by HyPo and then presents the feedback singular prediction or a chain-prediction scheme, de-
service that uses these models to provide timely feed- pending on if there is adequate time to provide such
back and to complement the direct observation ap- notifications between each hand hygiene opportunity.
proach to hand hygiene compliance monitoring. Suppose that HyPo has just observed a staff
nurse’s compliance on a patient room entry, then the
ML classifiers will predict the same staff’s exit com-
pliance. For instance, if the staff is predicted to be
541
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
non-compliant, an alert of red flashing light can be Technology-assisted Human Observation. Direct
sent to either the wearable badge or the device at the observation is the most precise way of controlling
appropriate dispenser activation station as a reminder compliance. Several studies use technologies such as
to the staff; otherwise, no alert is necessary. handheld devices and cameras to aid human observa-
If duration of the visit is too short of an interval tion, aiming at reducing input errors, costs, and time
to send the notification signal to the devices, then we consumption. Handheld devices are used for data en-
can use the probability chain rule (Schum, 1994) to try, and video cameras provide opportunities to reduce
provide a backup alert to the same staff if necessary. the Hawthorne effect and observe locations that are
In this case, the ML models will use the predicted en- remote or hard to access.
try compliance for the current visit (from the staff’s Chen et al (Chen et al., 2013), used wireless data
exit compliance of the previous visit) to determine entry devices and a website to allow human observers
exit compliance of the current visit at a probability to audit compliance. University of North Carolina
of 89% * 77% = 69%. It is less ideal, but the likeli- Hospitals implemented a “clean-in, clean-out” system
hood of the visit interval being too short is minimal that allowed covert observers and designated nurses to
because the grace period for compliance is set at two track compliance using a mobile app and a web portal
minutes, and if a room visit is within two minutes, (Sickbert-Bennett et al., 2016).
hand hygiene compliance is not required. Cameras have been used by Armellino (Armellino
et al., 2013) to increase compliance in an ICU. The
5.3 Recommend Training Material study connected motion sensors near the sinks that
would activate cameras being monitored by remote
If a staff member is frequently predicted as non- auditors. The study by Davis (Davis, 2010) placed
compliant over a long observation period, HyPo (with a discreet camera at the entrance of a ward and as-
integrated email capabilities) can recommend hand sessed compliance before and after a sink was placed
hygiene guidelines or appropriate training materials pointing to the dispenser.
to the staff via email. The goal is to improve compli- Unfortunately, these methods still require human
ance on an individual basis. interaction and can bias the results, as the medi-
cal workers know they are being directly observed.
5.4 Assist Direct Observation Moreover, audits require trained personnel who are
regularly monitored to ensure quality control.
The compliance prediction results can also be used to
assist the current standard practice of direct observa-
tion. With predicted non-compliance reoccurring at a Counting Systems. Installing counting devices to
certain location (i.e., a patient room), HyPo can de- measure the remaining sanitation product volume or
ploy a human auditor (e.g., by sending a notification) the number of dispenser activation times is a quiet
to observe compliance at the location that should be method that is not subject to the Hawthorne effect.
given most attention. A counter may detect usage patterns and frequency
changes.
Marras (Marra et al., 2010) used dispenser coun-
ters along with direct observation to assess whether
6 RELATED WORK positive deviance in hand hygiene behaviors could
have an impact on reducing HAIs. A downside to
Due to worldwide high demands of HAI prevention, a this approach, however, is that counter systems can-
number of other researchers have studied approaches not tell who used the dispensers and therefore are un-
to improve hand hygiene compliance. Although the able to evaluate compliance by itself. Morgan et al
gold standard monitoring method is human-centric (Morgan et al., 2012) provided evidence to support
(WHO, 2009), (Gould et al., 2011), a wide rage of the claim that dispenser usage data could be more re-
studies propose electronic or electronically assisted liable than direct human observation to estimate hand
hand hygiene compliance monitoring and interven- hygiene compliance.
tion systems (Ellingson et al., 2014), (Ward et al.,
2014). This section compares our work on the HyPo
app with common electronic intervention systems in- Automated Monitoring Systems using Wearables.
cluding (1) technology-assisted direct human obser- Many automated monitoring systems are capable of
vation, (2) counting systems, and (3) automated mon- producing feedback or reminders in real or near real
itoring systems. time without human intervention, similar to our ap-
proach.
542
Discussions of a Preliminary Hand Hygiene Compliance Monitoring Application-as-a-service
Fakhry used a motion-triggered system with au- non-compliant staff to perform hand hygiene, (2)
dible hand washing reminders at each medical de- recommending training materials to habitually non-
partment entrance (Fakhry et al., 2012). Sahud and compliant staff via email, and (3) assisting the direct
Bhanot developed an electronic hand hygiene feed- observation approach by deploying human auditors at
back device that reports real-time compliance rate on the opportune time and place when and where non-
a liquid-crystal display visible to all staff in the in- compliance is frequently predicted to occur. We also
tervention unit (Sahud and Bhanot, 2009). Edmond compared our app to related research work and found
et al installed a sensor network using a credit-card that our approach predicted future compliance behav-
sized sensor badge on each alcohol dispenser, which ior instead of reacted to non-compliance as in other
when not activated on room entry or exit beeped with approaches. Our methodology using ML algorithms
a red indicating light (Edmond et al., 2010). Simi- is unique and is the only work that evaluates ML pre-
larly, Marra et al employed a wireless network with diction capabilities in this domain.
sensors on the alcohol dispensers that provide real- In future work, we plan on collecting more com-
time flashing light feedback to HCWs for hygiene ac- pliance data, ideally using the same process as dis-
tivity detection (Marra et al., 2014). Most recently, cussed in the paper. We will use this data to fine tune
Ellison et al proposed a prospective electronic hand the parameters in our ML classifiers to increase the
hygiene room entry/exit audible reminder system (El- prediction accuracy. We will also run simulations that
lison et al., 2015) that provides a combination of 24- test whether our HyPo app can improve compliance in
hour-a-day recording of hand hygiene activities and general and if the improvement can be sustained over
real-time computer monitor performance feedback. time in a range of caregiving settings.
543
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Ellingson, K., Haas, J. P., Aiello, A. E., Kusek, L., Mara- Morgan, D. J., Pineles, L., Shardell, M., Young, A., Elling-
gakis, L. L., Olmsted, R. N., Perencevich, E., Pol- son, K., Jernigan, J. A., Day, H. R., Thom, K. A., Har-
green, P. M., Schweizer, M. L., Trexler, P., VanAm- ris, A. D., and Perencevich, E. N. (2012). Automated
ringe, M., and Yokoe, D. S. (2014). Strategies to Pre- hand hygiene count devices may better measure com-
vent Healthcare-Associated Infections through Hand pliance than human observation. American Journal of
Hygiene. Infection Control and Hospital Epidemiol- Infection Control, 40(10):955–959.
ogy, 35(8):937–960. Platt, J. et al. (1998). Sequential minimal optimization: A
Ellison, R. T., Barysauskas, C. M., Rundensteiner, E. A., fast algorithm for training support vector machines.
Wang, D., and Barton, B. (2015). A Prospective Sahud, A. G. and Bhanot, N. (2009). Measuring hand hy-
Controlled Trial of an Electronic Hand Hygiene Re- giene compliance: a new frontier for improving hand
minder System. Open Forum Infectious Diseases, hygiene. Infection Control and Hospital Epidemiol-
page ofv121. ogy, 30(11):1132.
Fakhry, M., Hanna, G. B., Anderson, O., Holmes, A., and Schum, D. A. (1994). The evidential foundations of proba-
Nathwani, D. (2012). Effectiveness of an audible re- bilistic reasoning. Northwestern University Press.
minder on hand hygiene adherence. American Journal Shrestha, S. K., Sunkesula, V. C., Kundrapu, S., Tomas,
of Infection Control, 40(4):320–323. M. E., Nerandzic, M. M., and Donskey, C. J. (2016).
Gardner, W. A. (1984). Learning characteristics of Acquisition of clostridium difficile on hands of health-
stochastic-gradient-descent algorithms: A general care personnel caring for patients with resolved c. dif-
study, analysis, and critique. Signal Processing, ficile infection. Infection Control & Hospital Epi-
6(2):113–133. demiology, 37(04):475–477.
Glorot, X. and Bengio, Y. (2010). Understanding the dif- Sickbert-Bennett, E. E., DiBiase, L. M., Schade Willis,
ficulty of training deep feedforward neural networks. T. M., Wolak, E. S., Weber, D. J., and Rutala, W. A.
In Aistats, volume 9, pages 249–256. (2016). Reducing health careassociated infections by
Goldberg, D. E. (1989). Genetic algorithms in search, opti- implementing a novel all hands on deck approach for
mization and machine learning. Addison-Wesley. hand hygiene compliance. American Journal of Infec-
Gould, D. J., Drey, N. S., and Creedon, S. (2011). Rou- tion Control, 44(5, Supplement):e13–e16.
tine hand hygiene audit by direct observation: has Team, D. D. (2016). Deeplearning4j: Open-source dis-
nemesis arrived? The Journal of Hospital Infection, tributed deep learning for the jvm. Apache Software
77(4):290–293. Foundation License, 2.
Graves, A. (2012). Supervised sequence labelling. In Super- Ward, M. A., Schweizer, M. L., Polgreen, P. M., Gupta,
vised Sequence Labelling with Recurrent Neural Net- K., Reisinger, H. S., and Perencevich, E. N. (2014).
works, pages 5–13. Springer. Automated and electronically assisted hand hygiene
monitoring systems: A systematic review. American
Guyon, I. and Elisseeff, A. (2003). An introduction to vari-
Journal of Infection Control, 42(5):472–478.
able and feature selection. Journal of machine learn-
ing research, 3(Mar):1157–1182. WHO (2009). A guide to the implementation of the WHO
multimodal hand hygiene improvement strategy.
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann,
P., and Witten, I. H. (2009). The weka data min- Zhang, P., White, J., Schmidt, D., and Dennis, T. (2016). A
ing software: an update. ACM SIGKDD explorations preliminary study of hand hygiene compliance char-
newsletter, 11(1):10–18. acteristics with machine learning methods. (ISIS-16-
101).
John, G. H. and Langley, P. (1995). Estimating continuous
distributions in bayesian classifiers. In Eleventh Con-
ference on Uncertainty in Artificial Intelligence, pages
338–345, San Mateo. Morgan Kaufmann.
Kohavi, R. and John, G. H. (1997). Wrappers for feature
subset selection. Artificial Intelligence, 97(1-2):273–
324. Special issue on relevance.
Marra, A. R., Guastelli, L. R., Arajo, C. M. P. d., Santos,
J. L. S. d., Lamblet, L. C. R., Silva, M., Lima, G. d.,
Cal, R. G. R., Paes, n. T., Neto, M. C., Barbosa, L.,
Edmond, M. B., and Santos, O. F. P. d. (2010). Pos-
itive Deviance A New Strategy for Improving Hand
Hygiene Compliance. Infection Control & Hos-
pital Epidemiology, 31(1):12–20.
Marra, A. R., Sampaio Camargo, T. Z., Magnus, T. P.,
Blaya, R. P., Dos Santos, G. B., Guastelli, L. R.,
Rodrigues, R. D., Prado, M., Victor, E. d. S., Bo-
gossian, H., Monte, J. C. M., dos Santos, O. F. P.,
Oyama, C. K., and Edmond, M. B. (2014). The use
of real-time feedback via wireless technology to im-
prove hand hygiene compliance. American Journal of
Infection Control, 42(6):608–611.
544
A Real-time m-Health Monitoring System: An Integrated Solution
Combining the Use of Several Wearable Sensors and Mobile Devices
Salvatore Naddeo1 , Laura Verde2 , Manolo Forastiere3 , Giuseppe De Pietro1 and Giovanna Sannino1
1 Instituteof High Performance Computing and Networking (ICAR), National Research Council of Italy (CNR),
via Pietro Castellino 111, 80131 Naples, Italy
2 Department of Technology, University of Naples Parthenope, 80143 Naples, Italy
3 Neatec S.p.a. R&D Support, Via Campi Flegrei 34, 80078 Pozzuoli, Italy
Keywords: Physiological Monitoring, Wearable Device, m-Health System, Continua Alliance Guidelines, Chronic
Diseases.
Abstract: Nowadays the upsurge in the prevalence of chronic diseases represents an increasing burden on individuals
and society. Chronic diseases can require repeated and frequent hospital treatment to control vital parameters
of interest. The use of automatic instruments for a real-time monitoring of biological parameters constitutes
a valid instrument to improve the patient’s quality of life. The integration of mobile communications with
wearable devices has facilitated the shift of healthcare assistance from clinic-centric to patient-centric mon-
itoring. In this paper, a real-time monitoring system is proposed. The system is conceptualized to provide
an instrument for patients, by means of which they can easily monitor, analyse and save their own vital signs
using wearable sensors and an Android device such as a smartphone or tablet, offering an efficient solution in
terms of a decrease in time, human error and cost.
545
Naddeo, S., Verde, L., Forastiere, M., Pietro, G. and Sannino, G.
A Real-time m-Health Monitoring System: An Integrated Solution Combining the Use of Several Wearable Sensors and Mobile Devices.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 545-552
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
reduces the risk of errors in manual harvesting. This is regulated by the guidelines of the Continua Health
lower risk of error results in increased efficiency, re- Alliance.is necessary which describe a set of interna-
duced costs and improved vital qualities in an area tionally established standards and frameworks to en-
such as healthcare one where human error can really sure interoperability of devices (Carroll et al., 2007).
make the difference between life and death. The most Several examples of monitoring systems are de-
innovative aspect of the adoption of a tele-monitoring scribed in literature useful for the monitoring of phys-
system is represented by the means by which patients iological data taken from wearable devices. Unfor-
and healthcare professionals communicate and inter- tunately, not all the presented systems use devices
act. Patients are directly involved in managing their that follow the Continua Health Alliance guidelines.
health and wellness. Kakria et al. (Kakria et al., 2015), for example, pro-
Mobile devices, such as smartphones or tablets, pose a real-time monitoring system to collect data
constitute the perfect instrument to monitor the vital about heart rate, blood pressure and body tempera-
parameters of a patient. Thanks to the use of appro- ture using wearable devices non-compliant with the
priate wearable sensors, it is possible to collect and Continua Health Alliance guidelines. The same lim-
analyse the data coming from these devices to moni- itation applies to the device used by PhysioDroid
tor the patient’s state of health. (Banos et al., 2014), a mobile system to monitor
In this work we present a real-time m-health mon- heart rate, body temperature and respiration rate, and
itoring system for people suffering from chronic dis- to the system realized by Forastiere et al.(Forastiere
eases that enables the collection, sharing and ex- et al., 2016) for a monitoring of a patient’s own well-
change of physiological data, such as blood pressure, ness. The proposed system, instead, supports devices
heart and respiration rate and ECG signals. The sys- compatible with the Continua Health Alliance design
tem is not limited only to the acquisition of such data Guidelines. In addition, the open architecture of our
but also enables the analysis of vital signs. The phys- framework allows an integration with wearable de-
iological data are captured using wearable systems vices that use other communication and data access
compliant and not to Continua Health Alliance guide- protocols to provide a system that can monitor pa-
lines (Carroll et al., 2007), one of the most respected tients integrating data coming from several medical
communication standardization protocol. devices, unlike the system proposed by (Park et al.,
2016). They develop an m-health application limit-
ing the integration to only certified devices. While,
2 RELATED WORK Szydlo et al (Szydło and Konieczny, 2016) present a
data acquisition module, implemented as a mobile ap-
plication to integrate several medical devices, whether
Mobile healthcare applications constitute an instru-
or not compliant or not with the Continua Health Al-
ment for individuals to keep track of their health con-
liance guidelines, but without analysing the acquired
dition, to take more responsibility for their lifestyle
data.
and to improve the efficiency of care by providing
high quality data to health professionals. Such med- Many mobile healthcare systems are aimed at
ical data are often acquired by means of the use of patients with cardiac diseases, diabetes, hyperten-
wearable devices. Interest in the research and devel- sion, or hyperthermia, limiting the acquisition and
opment of smart wearable systems is increasing in monitoring to only one set of physiological data, and
both the academic world and industry, to promote the sometimes providing an analysis such as (Gay and
realization of devices that comply with the required Leijdekkers, 2007; Lv et al., 2010; Rodrigues et al.,
standards of effectiveness, interoperability, cost, pri- 2014; Guo et al., 2013; Lee et al., 2016), Sense-
vacy and ethics (Lmberis and Dittmar, 2007; Konstan- View (http://www.senseview.mobi/), and SimpleEye
tas, 2007; Chan et al., 2012). These systems are able (https://simpleeye.com/platforms/android/bluetooth-
to measure vital signs, such as body and skin temper- pulse-oximeter/). Our proposed system, however,
ature, heart rate, blood pressure, blood oxygen sat- is not limited to capturing and monitoring in real
uration (SpO2), electrocardiograms (ECG), electron- time vital signs but also to allows data processing
cephalograms (EEG) and respiration rate. and analysis locally, to better evaluate whether health
To implement an m-health solution a level of stan- activities have been performed planned and to assess
dardization is necessary to ensure an easy and quick whether the desired results are being achieved.
integration between the wearable device (e.g. a blood Moreover, in literature there are platforms that
pressure monitor or pulse-oximeter) and the gateway collect the physiological data and send it to a care
device (e.g. a smartphone). The interoperability center for processing and analysis. These solutions
among all devices that compose a telehealth system do not process the medical data locally on mobile de-
546
A Real-time m-Health Monitoring System: An Integrated Solution Combining the Use of Several Wearable Sensors and Mobile Devices
vice, but the signal needs to be continuously trans- wearable sensors. Once the acquisition has been com-
ferred to a health center. For example, the Euro- pleted, the Android device sends the data to a remote
pean Union-funded research project AMON (Anliker Personal Health Record (PHR) server, which the doc-
et al., 2004) has an objective realizing a wrist-worn tor can access to monitor the patient’s health state. In
medical monitoring and alert system. The data are the following section the system architecture is ex-
transmitted via GSM to a medical center. Unfortu- plained in detail.
nately, for heart monitoring the system is technically
limited by the noisy ECG signal that is acquired on 3.1 System Architecture
the wrist through the realized device and is not ap-
propriate for the diagnosis of cardiac abnormalities.
The Epi-medics project (Rubel et al., 2005) is another The system has a modular structure, in which ev-
project for ECG monitoring that records and analyses ery module performs a specific set of operations, as
ECG signals and generates alarms. In this case, also, shown in the figure 2.
the monitoring system uses its own sensor device, not The Health Device Profile (HDP) module is re-
interfaced with other sensor devices. Bisio et al. (Bi- sponsible for the transmission of data from the wear-
sio et al., 2015), instead, proposed a platform for pa- able devices to the mobile devices using the Blue-
tients suffering from a heart failure, able to monitor tooth protocol. Moreover, it is possible to connect
data coming from the pulse oximeter to measure the the proposed system with an external PHR, as shown
saturation of peripheral oxygen and a weighting scale in the figure 1, and/or Decision Support Systems. In
to measure the body weight, using devices compliant the interaction with these systems, the adoption of
with the Continua Health Alliance standards. More- the Continua Alliance standard, using an appropri-
over, Al-Taee et al.(Al-Taee et al., 2015) present a ate wrapper, allows a fast and accurate data trans-
platform to support the self-management of diabetes lation in accordance with the two Health Level 7
using several medical sensors which are not compli- standards (http://www.hl7.org/implement/standards):
ant the guidelines. Fast Healthcare Interoperability Resources (FHIR)
and Personal Healthcare Monitoring Report (PHMR).
The FHIR Standard (Bender and Sartipi, 2013) is use-
ful to represent and exchange information between
3 MONITORING SYSTEM several types of monitoring devices, for a correct syn-
tactic and semantic interoperability and appropriate
The proposed system is able to monitor several health efficiency between information systems and biomed-
parameters using multiple sensors. The acquired ical devices. Moreover, in order to improve the
physiological data are processed and analysed locally data dissertation in a tele-monitoring application, the
on a mobile device. A report of the analysis and the PHMR (Wolf et al., 2009) was introduced, which is
original files are saved, can be visualized whenever able to translate personal healthcare monitoring infor-
the user wants and are sent to the medical specialist. mation into electronic medical record systems includ-
The scheme in the figure 1 shows the structure of ing a representation of the measurements captured.
the system, a set of interconnected blocks in which The data, that are received by the HDP module,
the data flows start from the patient and arrive at the will be forwarded to the other modules connected
medical specialist. A patient can monitor his/her own with it, the Storage module and the Signal Analysis
vital signs using an Android device, which is easy to module. The first one is used to save physiological
use and able to capture and store the data from the data and a patient’s analysis report in the device in-
547
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
ternal memory. SQLite database is used to store mea- ule constitutes the Decision Support System, apable
surement data acquired from the mobile health device of supporting and improving the real-time monitoring
and/or data from manual measurement that the patient and analysis using ”the medical specialist’s knowl-
performs with devices not equipped with a Bluetooth edge”. The data are, in fact, compared with selected
connection. In the first case, the Storage Module re- threshold values to check the patient’s state of health.
ceives data from the HDP Module, while in the sec- If the module discovers a warning situation, it asks
ond the data are directly inserted by the user. Col- the Report Module to generate a message to be sent
lected and analysed data, during the monitoring, con- to the doctor via the Notification Module.
stitute the Personal Health Record (PHR) of the pa- All acquired data and analyses are saved in the ap-
tient (Tang et al., 2006). To access the data contained propriate reports, realized by the Report Module. The
in the PHR the doctor, through appropriate devices, system saves a report with all measurement data once
must interact with a remote server to visualize any de- a day, which is then sent to the medical specialist at
sired data. This operation is fundamental when there the time scheduled by the user. Moreover, the sys-
are anomalies that generate an alert. In this situa- tem can create a warning report message, attaching
tion the specialist visualizes all the patient’s measure- the report files, if an analysis of the data using the
ments and can decide to change the therapy, perform DSS Module reveals an abnormal situation in the pa-
in depth examinations or modify the monitoring plan. tient’s state of health.
The monitored data, besides being saved, can be The Notification Module is the part of the software
analyzed, using the Signal Analysis Module. In de- that is responsible for notifying messages generated
tail,such analysis can include: by the system to the doctor and the patient. The mes-
• Filtering data to remove the additive noise that sages can be of two types:
can distort the signal and the resulting interpre- • Alerts, that instructs the user to perform the de-
tation. It is possible to choose between four types sired measurements at scheduled time;
of filter: high-pass and low-pass (Chen and Chen,
• E-mail messages, sent to the medical specialist in-
2003), recursive (Cuomo et al., 2016) and Han-
dicated by the user. Such messages include any
ning filters (Verde et al., 2015). The implemented
report of the patient’s measurements.
filters are characterized by appropriate parameters
such as the cut-off frequency that the user can set Finally, the Visualization Module is the interface
indicating the desirable value; between the system and the users. It shows the real
time measurements acquired from the wearable de-
• Data processing, whereby the signals can be anal-
vices, the analysis data and the report files, whenever
ysed to extract characteristic parameters, useful to
the user chooses.
evaluate the patient’s health state.
Data obtained from the HDP and Signal Analy-
sis modules are sent to the DSS Module. This mod-
548
A Real-time m-Health Monitoring System: An Integrated Solution Combining the Use of Several Wearable Sensors and Mobile Devices
4 USE-CASE
The realized monitoring system can be used with pa-
tients suffering from cardiovascular diseases. These
patients have to constantly monitor characteristic phi-
siological data, such as blood pressure and heart rate.
Therefore, they must report these data, very often col-
lected manually over several days, to their medical
specialists during rountine follow-up visits.
The manual collection of physiological data can
increase the risk of errors, and the recording of erro-
neous values can change the evaluation of patient’s
state of health. To avoid this problem it is possible Figure 3: Zephyr Bioharness BH3.
to automate the process for capturing and monitor-
ing vital signs, as performed by the proposed system. pushing against the walls of the arteries as the heart
Moreover, this system allows the patients to monitor pumps blood. It is measured as both the pressure
their own physiological data at home using appropri- when the heart beats pump blood (the systolic pres-
ate wearable devices without the necessity of going to sure) and the pressure when the heart is at rest be-
a hospital center, providing a complete clinical picture tween beats (the diastolic pressure). To monitor the
to the medical specialist. patient’s blood pressure the realized system uses the
The fundamental vital signs, in order to perform A&D Medical UA-767PBT-C blood pressure monitor.
a monitoring of a patient suffering from cardiovascu- An acute rate of these parameters is considered as
lar disease, are the heart rate, respiration rate, ECG an early indicator which supports medical specialists
signal, blood pressure and oxygen saturation. There- in the diagnosis of serious diseases. Additionally, the
fore, the patient, using an appropriate wereable de- blood oxygen saturation and pulse rate can be indices
vice, such as Zephyr Bioharness BH3, A&D Medical of possible alterations, monitored in our system by us-
UA-767PBT-C and Nonin 9560 Onyx 2 (described ing the Nonin 9560 Onyx 2. The blood pressure mon-
in the following subsection), can capture and mon- itor and the pulse oximeter are illustred in the figure
itor the relevant parameters, by means of a mobile 4.
device, such as a smartphone or tablet, on which the
tele-monitoring application has been installed.
549
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Eclipse IDE and the Android Software Developer Kit resulting diagnosis. To avoid this problem the user
(SDK). The mobile system offers several functionali- can filter the captured signal choosing a filter of-
ties. At the first access the user must complete a Reg- fered by our system, described in section 3.1. In
istration form, in which he/she inserts personal infor- addition, it is possible to extract the characteristic
mation such as name, surname, date of birth, gender, parameters of the Heart Variability Index (HRV).
email address. In detail, the e-mail address is both The HRV describes the variations of both the in-
that of the user and that of the medical specialist who stantaneous heart rate and RR intervals, useful to
will receive the user’s report containing the measure- evaluate the heart state and any possible anoma-
ment of the physiological data and the analysis of the lies due to the presence of arrhythmias (Townsend
estimated values. Such an e-mail will be sent at the et al., 2016);
time indicated in the registration phase. • Specifications: information about cardiac dis-
After the registration, the user can choose any of eases and healthy lifestyles is provided, useful for
the operations in the main menu shown in the screen- the prevention of these disorders;
shot in the figure 5.
• Manual Data Entry: the user can directly insert
measurement data such as blood pressure, blood
oxygen saturation, pulse rate and weight, indicat-
ing the date and time when he/she made this mea-
surement;
• Loading Report and EDF file: any report with
the recorded measurements can be saved and ex-
ported in pdf and European Data Format (EDF)
format. EDF is the most used standard to ex-
change and store biological and physical signals
(Kemp and Olivan, 2003). The user can choose
this functionality to upload these reports and files,
thanks to which the specialist can monitor the
user’s progress;
Figure 5: Screenshots of the Homepage and History of • History of Measurements: a calendar with a his-
Measurement. tory of all the measurements performed is dis-
played.
In detail, the user can perform the following func-
tionalities: 4.3 Evaluation of Performance
• Search Bluethooth Devices: the system searches
for Bluethooth devices and shows them to the The performance of the proposed system has been
user. The user can choose to collect his/her pre- evaluated in terms of the allocation of memory and
ferred wearable devices able to execute different CPU used by the mobile application during the real-
the measurements and analyses. If the user con- time monitoring. The first test consisted of tracking
nects to the Zephyr Bioharness BH3, for example, memory and CPU usage during a monitoring period
he/she can monitor in real-time physiological data of 15 minutes so as to assess over time the trend of
such as the heart and breath rate or the ECG sig- these quantities. The real-time monitoring feature
nal, as shown in the figure 6. was tested on two different devices with two differ-
ent Android versions: a Samsung GT-i9505 (S4) with
the Android 5.0.1 version and a HUAWEI GRA-L09
(P8) with the Android 6.1 version. The performance
of these analyses showed good results, as reported in
the figures 7 and 8.
The obtained results indicate that the application
is efficient in the use of system resources, which is
very important considering that it is designed to run
Figure 6: Screenshot of the ECG monitoring. on a mobile device. The memory used by the applica-
tion in the real-time monitoring feature is constantly
During the signal capture, noise can add to the less than 32 MB, increasing slightly applying when
useful signal distorting its interpretation and the the filters are applied, and the use of the CPU is low.
550
A Real-time m-Health Monitoring System: An Integrated Solution Combining the Use of Several Wearable Sensors and Mobile Devices
551
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
care ecosystem. IEEE Pervasive Computing, 6(4):90– protocols for chronic disease self-management. Jour-
94. nal of medical systems, 40(1):1–14.
Centro nazionale di epidemiologia, sorveg- Rodrigues, D. F., Horta, E. T., Silva, B. M., Guedes,
lianza e promozione della salute dell’Istituto F. D., and Rodrigues, J. J. (2014). A mobile health-
superiore di sanità (2016). Il portale care solution for ambient assisted living environments.
dell’epidemiologia per la sanità pubblica. In e-Health Networking, Applications and Services
http://www.epicentro.iss.it/focus/cardiovascolare/ (Healthcom), 2014 IEEE 16th International Confer-
cardiovascolari.asp/. ence on, pages 170–175. IEEE.
Chan, M., Estève, D., Fourniols, J.-Y., Escriba, C., and Rubel, P., Fayn, J., Nollo, G., Assanelli, D., Li, B., Restier,
Campo, E. (2012). Smart wearable systems: Current L., Adami, S., Arod, S., Atoui, H., Ohlsson, M., et al.
status and future challenges. Artificial intelligence in (2005). Toward personal ehealth in cardiology. results
medicine, 56(3):137–156. from the epi-medics telemedicine project. Journal of
electrocardiology, 38(4):100–106.
Chen, H. and Chen, S. (2003). A moving average based
filtering system with its application to real-time qrs Sanchis-Gomar, F., Perez-Quilis, C., Leischik, R., and Lu-
detection. In Computers in Cardiology, 2003, pages cia, A. (2016). Epidemiology of coronary heart dis-
585–588. IEEE. ease and acute coronary syndrome. Annals of Trans-
lational Medicine, 4(13).
Cuomo, S., De Pietro, G., Farina, R., Galletti, A., and San-
nino, G. (2016). A revised scheme for real time ecg Szydło, T. and Konieczny, M. (2016). Mobile and wearable
signal denoising based on recursive filtering. Biomed- devices in an open and universal system for remote pa-
ical Signal Processing and Control, 27:134–144. tient monitoring. Microprocessors and Microsystems,
46:44–54.
Forastiere, M., De Pietro, G., and Sannino, G. (2016). An
Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M., and
mhealth application for a personalized monitoring of
Sands, D. Z. (2006). Personal health records: defini-
ones own wellness: Design and development. In Inno-
tions, benefits, and strategies for overcoming barriers
vation in Medicine and Healthcare 2016, pages 269–
to adoption. Journal of the American Medical Infor-
278. Springer.
matics Association, 13(2):121–126.
Gay, V. and Leijdekkers, P. (2007). A health monitoring Townsend, N., Wilson, L., Bhatnagar, P., Wickramasinghe,
system using smart phones and wearable sensors. In- K., Rayner, M., and Nichols, M. (2016). Cardiovas-
ternational journal of ARM, 8(2):29–35. cular disease in europe: epidemiological update 2016.
Guo, X., Duan, X., Gao, H., Huang, A., and Jiao, B. (2013). European heart journal, page ehw334.
An ecg monitoring and alarming system based on an- Verde, L., De Pietro, G., Veltri, P., and Sannino, G.
droid smart phone. Communications and Network, (2015). A noise-aware methodology for a mobile
5(03):584. voice screening application. In Advances in Sensors
Kakria, P., Tripathi, N., and Kitipawang, P. (2015). A real- and Interfaces (IWASI), 2015 6th IEEE International
time health monitoring system for remote cardiac pa- Workshop on, pages 193–198. IEEE.
tients using smartphone and wearable sensors. In- Wolf, K.-H., Schirmer, S., Marschollek, M., and Haux, R.
ternational journal of telemedicine and applications, (2009). Representing sensor data using the hl7 cda
2015. personal healthcare monitoring report draft. In MIE,
Kemp, B. and Olivan, J. (2003). European data format pages 480–484. Citeseer.
plus(edf+), an edf alike standard format for the ex- World Health Organization (2016). Chronic diseases and
change of physiological data. Clinical Neurophysiol- health promotion. http://www.who.int/chp/en/.
ogy, 114(9):1755–1761.
Konstantas, D. (2007). An overview of wearable and im-
plantable medical sensors. Yearbook of medical infor-
matics, 7(1):66–69.
Lee, J. M., Hirschfeld, E., and Wedding, J. (2016).
A patient-designed do-it-yourself mobile technology
system for diabetes: Promise and challenges for a new
era in medicine. JAMA, 315(14):1447–1448.
Lmberis, A. and Dittmar, A. (2007). Advanced wearable
health systems and applications-research and develop-
ment efforts in the european union. IEEE Engineering
in Medicine and Biology Magazine, 26(3):29–33.
Lv, Z., Xia, F., Wu, G., Yao, L., and Chen, Z. (2010). icare:
a mobile health monitoring system for the elderly. In
Proceedings of the 2010 IEEE/ACM Int’l Conference
on Green Computing and Communications & Int’l
Conference on Cyber, Physical and Social Computing,
pages 699–705. IEEE Computer Society.
Park, H. S., Cho, H., and Kim, H. S. (2016). Development
of a multi-agent m-health application based on various
552
PerDMCS: Weighted Fusion of PPG Signal Features for Robust and
Efficient Diabetes Mellitus Classification
V. Ramu Reddy1, Anirban Dutta Choudhury2, Srinivasan Jayaraman1, Naveen Kumar Thokala1,
Parijat Deshpande3 and Venkatesh Kaliaperumal4
1 TCS
Research & Innovation Lab, Bangalore, India
2 TCS
Research & Innovation Lab, Kolkata, India
3 TRDDC, Pune, India
4 Institute of Ayurveda and Integrative Medicine, School of Health Sciences, Transdisciplinary University, Bangalore, India
Keywords: Pervasive Healthcare, Type 2, Diabetes Mellitus, Classification, Heart Rate Variability, Fusion, Photoplethys-
mogram, Pulse Oximeter, Morphological.
Abstract: Non-invasive detection of Diabetes Mellitus (DM) has attracted a lot of interest in the recent years in pervasive
health care. In this paper, we explore features related to heart rate variability (HRV) and signal pattern of the
waveform from photoplethysmogram (PPG) signal for classifying DM (Type 2). HRV features includes time-
domain (F1 ), frequency domain (F2 ), non-linear features (F3 ) where as waveform features (F4 ) are one set of
features such as height, width, slope and durations of pulse. The study was carried out on 50 healthy subjects
and 50 DM patients. Support Vector Machines (SVM) are used to capture the discriminative information
between the above mentioned healthy and DM categories, from the proposed features. The SVM models
are developed separately using different sets of features F1 , F2 , F3 ,and F4 , respectively. The classification
performance of the developed SVM models using time-domain, frequency domain, non-linear and waveform
features is observed to be 73%, 78%, 80% and 77%. The performance of the system using combination of
all features is 82%. In this work, the performance of the DM classification system by combining the above
mentioned feature sets with different percentage of discriminate features from each set is also examined.
Furthermore weight based fusion is performed using confidence values obtained from each model to find the
optimal set of features from each set with optimal weights for each set. The best performance accuracy of
89% is obtained by scores fusion where combinations of mixture of 90% features from the feature sets F1 and
F2 and mixture of 100% features from the feature sets F3 and F4 , with fusion optimal weights of 0.3 and 0.7,
respectively.
1 INTRODUCTION are not aware that they are suffering from high blood
sugar and it is expected to cross 100 million mark
Diabetes is a malfunction of glucose-insulin regula- by 20301. Risk of cardiovascular disease (CVD) is
tory system that leads to onset of various complica- two or four times greater for diabetic individuals than
tions. It has been recognized as fourth leading cause normal ones and there is a trend in increased risk of
of death in developed countries (Tabish, 2007). From cardiac mortality2 However, till date there is limited
the recorded data in health centres worldwide it is medical equipment and awareness of the severity of
predicted that it is reaching epidemic proportions in this disease largely aggravated due to prevalence of
many developing and newly industrialized nations. In bad diet, no physical exercise, abnormal body weight,
terms of diabetic population, the top three countries and use of tobacco. Furthermore, the symptoms of
in the world are China, India and USA (Collabora- cardiac patients and diabetes patients are similar due
tion et al., 2016). In India it has shot up from 11.9
million in 1980 to 64.5 million in 2014. Interna- 1 http://ccebdm.org/news.php
tional Diabetes Federation (IDF), has raised a serious 2 www.world-heart-feaderation.org/cardiovascular-disease-
alarm for India by saying that nearly 52% of Indians risk-factors/diabetes/
553
Reddy, V., Choudhury, A., Jayaraman, S., Thokala, N., Deshpande, P. and Kaliaperumal, V.
PerDMCS: Weighted Fusion of PPG Signal Features for Robust and Efficient Diabetes Mellitus Classification.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 553-560
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
to change in the arterial stiffness and hence likely and captures specific features such as heart rate vari-
to be mis-classified. The symptoms of this disease ability (HRV) and features related to shape of the
are high blood sugar include frequent urination, in- pulse from PPG signal related to change in blood flow
creased thirst, and increased hunger. If left untreated which in turn caused due to change arterial stiffness
it results in long-term complications include heart dis- due to diabetes. We have developed pervasive dia-
ease, stroke, chronic kidney failure, foot ulcers, and betes mellitus classification system (PerDMCS) and
damage to the eyes. has achieved an accuracy of 82%, sesitivity 84% and
These problems are addressed by few existing so- specificity 90% using above mentioned features. Fur-
lutions; such as C-peptide test, fasting plasma glucose ther weight based fusion technique is proposed for
test, GAD antibodies test, Hba1c test, oral glucose more robust detection of diabetes. Field data shows
tolerance test, type-2 diabetes indication test (Asso- this method works properly and achieved an improved
ciation et al., 2015). It should be noted that most of accuracy of 89% with sensitivity and specificity of
the above-mentioned technique are either invasive or 90% and 88%, respectively.
minimal invasive (finger prick) in nature. This study
aims to identify the individual’s diabetic status by as-
sessing the vascular pulse function and other vital fea- 2 DIABETES MELLITUS
tures by using the non-invasive PPG signal. In ad- DATASET
dendum, continuous monitoring of diabetes patients
can aid in assisting the short and long-term compli- In this study, we have collected data from 50 con-
cation risks as well. Hence, there is an inherent de- firmed diabetic patients and 50 healthy subjects. Di-
mand to explore the feasibility for the continuous, abetic subjects were aged between 34 ± 10 years
non-invasive monitoring and estimation of the type where as healthy subjects were aged between 41 ±
2 diabetes. In (Schroeder et al., 2005), (Seyd et al., 13. The subjects are selected from IAIMS Research
2012) researchers had explored diabetes detection us- Center located in Bangalore, India. Experimental pro-
ing HRV features from the time domain, in (Elgendi, tocol has been approved by the hospital ethical com-
2012) Mohamed has explored PPG features and its mittee. PPG data were collected from right hand
applications where as Rohan et al has identified HRV index finger of each subject for 5 minutes using a
and pulse waveform features for identifying coronary USB based commercial pulse oximeter (Contec CMS
artery disease (Banerjee et al., 2016). 50D+ 3 ) at 60 Hz.
Non-invasive, quick, easy, low cost and on time
recognizing diabetes with simple method and portable
technology for the primary care and community- 3 PRE-PROCESSING
based clinical settings is the main goal of researchers
in this area. The pulse plethysmogram technology The collected PPG data is fed as an input to the pre-
has been used in a wide range of commercially avail- processing block to obtain accurate RR intervals as
able medical devices for measuring oxygen satura- an output. This is achieved by following the sequence
tion, blood pressure and cardiac output (Allen, 2007). of steps like baseline removal, peak detection and re-
Due to change in glucose level, the amount of blood moval of outliers obtained due to motion artifacts.
volume in the finger changes, this variation can be The signals obtained across each stage are also de-
measured by PPG. When a fixed source of infrared picted in Fig. 1, where Fig. 1(a) represents raw PPG
radiation is used, the variation of blood volume act signal obtained during data collection and Fig. 1(b) is
as a phototransistor and the receive signal is changed. the corresponding PPG signal obtained after baseline
This is why we use the PPG signal for identifying the drift removal followed by peak detection. The region
diabetic subjects. In this work a low-cost FDA ap- where erroneous peak is obtained due to motion arti-
proved pulse oximeter is used to collect vital physio- fact is marked with an elliptical region in Fig. 1(b).
logical signal such as PPG signal from finger. Heart Subsequently, peaks are calculated to obtain the RR
rate variability (HRV) features from the time domain intervals and the outliers of RR intervals are then re-
along with some useful features related to shape of the moved. The steps involved in pre-processing stage are
pulse (morphological information) are extracted from briefly discussed as follows:
PPG to discriminate healthy and diabetic subjects. In
• Baseline Removal: The baseline removal on the
addition to the above features we have also explored
PPG signal is carried out using beads technique
other HRV features extracted from the frequency do-
(Ning et al., 2014).
main, non-linear and poincare features. Our data-
driven approach enables visualization of PPG signals 3 http://www.contecmed.com/
554
PerDMCS: Weighted Fusion of PPG Signal Features for Robust and Efficient Diabetes Mellitus Classification
• Peak Detection: The peak detection is carried out the case where the relationship between the class la-
on the baseline removal of PPG signal using peak bels and attributes is non-linear. Another advantage
detection algorithm. of RBF kernel is its universal approximation prop-
• Outlier Removal: After peak detection, RR in- erties. Also, it offers good generalization as well
tervals are computed from peak to peak intervals. as good performance in solving practical problems
The outlier RR intervals resulted due to motion ar- (Reddy et al., 2014). The basic architecture of dia-
tifacts are removed using the percentage filter. As betes mellitus classification system using SVMs with
mentioned in 4 if the percentage change of suc- above mentioned features is shown in Fig. 2.
ceeding RR interval from the preceding RR inter-
val is greater than 20% can be treated as an outlier.
80 Drift removal PPG
raw PPG
Peaks
80 60
Amp. (mV)
Amp. (mV)
60 40
40 20
20 0
(c) (d)
2 RR 2 RR after Outlier removal
1.8 1.8
1.6 1.6
RR (s)
RR (s)
1.4 1.4
1.2 1.2
1 1
0.8 0.8
0.6 0.6
00:00:00 00:00:20 00:00:00 00:00:20
Time (hh:mm:ss) Time (hh:mm:ss)
Figure 1: (a) Raw PPG signal, (b) Baseline drift PPG signal
(c) RR intervals and (d) RR intervals after Outlier removal.
555
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
556
PerDMCS: Weighted Fusion of PPG Signal Features for Robust and Efficient Diabetes Mellitus Classification
misclassification. Columns 3-4 indicate the perfor- Table 2: Performance of pervasive diabetes mellitus classi-
mance of the PerDMCS systems. Other performance fication systems developed using different features. The en-
measurements like true positive, false positive, true tries in the table indicate the subjects of classification. Act:
Actual, Pred: Predicted.
negative, false negative, precision, recall, sensitivity ,
PP
specificity and overall model accuracy are presented P Act. Diabetic
Pred. PPP
PerDMCS Healthy
in Table 3.
PerDMCS Diabetic 34 11
Analysis: From Tables 2 and 3, it is observed
that feature sets F1 , F2 , F3 , and F4 have discrimina- 1 Healthy 16 39
tory information related to diabetes. It is also ob- PerDMCS Diabetic 37 9
served that the diabetes is well discriminated com-
2 Healthy 13 41
pared to healthier subjects using shape related fea-
tures i.e., F4 , whereas using non-linear information PerDMCS Diabetic 38 8
i.e. F3 , classification of healthier shows better per- 3 Healthy 12 42
formance compared to diabetes. From this we can
hypothesize that both F3 and F4 are complementary PerDMCS Diabetic 40 13
in nature, and if integrated can lead into better clas- 4 Healthy 10 37
sification. Though combination of all features (i.e. PerDMCS Diabetic 42 10
PerDMCS-5) yields the best model accuracy, one can
5 Healthy 8 40
observe that PerDMCS-3 outperforms PerDMCS-5 in
some of the performance measurements (True Posi-
tive, True Negative, Precision and Specificity). This sets and different percentages from each of the rest
is due to the inclusion of unimportant features from (Two vs One vs One) etc. The comparisons of differ-
F1 and F2 . Results indicate that there is a scope of ent feature level fusions are presented in 3.
minute features selection from individual feature sets. As shown in 3(a), 24 (out of 1296) feature com-
Hence for improving performance of the entire sys- binations result in accuracy of 83%. In Fig. 3(b), it
tem, different fusion technologies are explored. can be observed that the model accuracy is improved
slightly i.e., 2% for some different feature combina-
tions compared to combination of all individual fea-
5 WEIGHTED FUSION: tures as shown in Table 3. Here, 8 feature combina-
tions results in high accuracy of 84% and which is
PROPOSED METHOD 1% improvement compared to the earlier combina-
tion. The best model accuracy remains similar 84%
5.1 Features Fusion (for the combination of 50% features from F3 and
90% features from (F2 + F4 ) as shown in Fig. 3(c)).
In this study, the fusion at feature level is performed In Fig. 3(d), the best model accuracy is 83% for the
by concatenation of the different percentage of dis- combination of 50% features from (F1 + F4 ) and 80%
criminative features from each set i.e., F1 to F4 . The features from (F2 + F3 ). However, the average accu-
concatenation process of features is carried out as fol- racy is slightly less than the best combinations of Two
lows. vs One vs One and Two vs One fusions. Fig. 3(e)
1. The features are ranked using correlation of fea- shows that the maximum accuracy achieved in this
tures and labels (Hall, 2000). fusion approach is 81% and it marks a clear degra-
dation in performance compared to the combinations
2. Different percentage of features are selected from mentioned above. Here, among all 144 combinations,
ranked features. In this work, we have explored 8 feature combinations results in 81% accuracy.
top 50% features to 100% with increments of 10%
i.e., 6 variations such as 50%, 60% 70%, 80%,
5.2 Scores Fusion
90% and 100% most discriminative features.
3. Finally we have concatenated different percentage Score level fusion is performed by summing the
of features from each set to build the PerDMCS weighted confidence scores (evidences) derived from
model. the different PerDMCSs. The weighing rule for com-
Different technologies of features level fusion are bining the confidence scores of individual modalities
employed e.g. different percentages from each do- is as follows:
main separately (One vs One vs One vs One), differ- 1 m
C = ∑ wi ci (1)
ent percentage from the combinations of two feature m i=1
557
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
where C is the weighted confidence score, wi and ci the models obtained by simple feature level combi-
are weight and confidence score of the ith modality, nations.
and m indicates number of modalities used for com-
bining the scores. In this work, we have combined dif- 5.2.3 Two vs One
ferent modalities as described in section VI-A, such as
two modalities (Two vs One, Two vs Two and Three It is observed that out of 4752 fusion of score com-
vs One), three modalities (Two vs One vs One) and binations only 20 instances found to produce highest
four modalities (One vs One vs One vs One). accuracy of 84%. The accuracy of fusion based mod-
In our study, for two modality systems one of the els at score level is not improved compared to the ac-
weights (wi ) is varied in steps of 0.1 from 0 to 1, and curacy obtained by simple feature level combinations.
the other weight is determined using the formula: w j
= 1- wi such that total weight wi + w j = 1. Hence, we 5.2.4 Two vs Two
get 11 combinations of weighing factors. Similarly,
for three modality systems two of the weights (wi and It is observed that out of 1188 fusion of score com-
w j ) are varied in steps of 0.1 from 0 to 1 and the other binations only 2 instances found to produce highest
weight is determined using the formula: wk = 1- wi - accuracy of 89%. The accuracy of fusion based mod-
w j such that total weight wi + w j + wk = 1 and wk ≥ 0. els at score level is performed better than the models
Hence, we get 60 combinations of weighting factors. obtained by simple feature level combinations.
For four modality systems three of the weights (wi , w j
and wk ) are varied in steps of 0.1 from 0 to 1 and the 5.2.5 Three vs One
other weight is determined using the formula: wl =
1- wi -w j -wk such that total weight wi + w j + wk + wl It is observed that out of 1584 fusion of score com-
= 1 and wl ≥ 0. The classification performance of binations only 14 instances found to produce highest
the combined system for various combinations of the accuracy of 82%. The accuracy of fusion based mod-
weighting factors are as follows. els at score level is performed slightly better i.e.1%
than the models obtained by simple feature level com-
5.2.1 One vs One vs One vs One binations. However, still the accuracy is very low
compared to other feature level and score level fusion
It is observed that out of 313632 fusion of score com- models.
binations only 12 instances found to produce high- From the results it is found that the fusion of
est accuracy of 85%. The accuracy of fusion based scores performed better than the models simple fea-
models at score level is performed slightly better than ture level fusion. Among all the models the highest
the models obtained by simple feature level combina- accuracy is obtained for score level fusion of Two vs
tions. Two combinations. The best accuracy is observed
to be 89% for the feature combinations of mixture
5.2.2 Two vs One vs One of 90% features from the feature sets F1 and F2 and
mixture of 100% features from the feature sets F3 and
It is observed that out of 77760 fusion of score com- F4 , with optimal weights of 0.3 and 0.7, respectively.
binations only 3 instances found to produce highest Similarly, another best combination is observed to be
accuracy of 85%. The accuracy of fusion based mod- for the feature combinations of mixture of 100% fea-
els at score level is performed slightly better than tures from the feature sets F1 and F2 and mixture of
558
PerDMCS: Weighted Fusion of PPG Signal Features for Robust and Efficient Diabetes Mellitus Classification
83
Maximum
82 Accuracy= 85%
85
Accuracy (%)
Accuracy (%)
81 80
80
75
79
70
15
78 10 250
200 400 600 800 1000 1200 200
150
Feature Combinations One Vs One Vs One Vs One 5 100
# of instances with High Accuracy 50
0 0 # of weight combinations
(a) One vs One vs One vs One
84 (a) One vs One vs One vs One
83
Maximum
82 Accuracy= 85%
85
81
Accuracy (%)
80 80
Accuracy (%)
79 75
78
70
77
65
76 3
60
75 50
200 400 600 800 1000 1200 2 40
30
Feature Combinations Two vs One vs One 20
# of instances with high accuracy 10
1 0 # of weight combinations
(b) Two vs One vs One
84 (b) Two vs One vs One
82 Maximum
Accuracy= 85%
85
Accuracy (%)
80
Accuracy (%)
80
78
75
76
70
20
15 12
74 10
50 100 150 200 250 300 350 400 10 8
6
Feature combinations Two vs One 5 4
2
# of instances with High Accuracy 0 0
# of weight combinations
(c) Two vs One
83 (c) Two vs One
82
90 Maximum
81 Accuracy= 89%
Accuracy (%)
Accuracy (%)
80 85
79 80
78 75
2
12
77 10
10 20 30 40 50 60 70 80 90 100 8
6
Feature combinations Two vs Two # of instances with High Accuracy 4
2
1 0
# of weight combinations
(d) Two vs Two
81 (d) Two vs Two
80
Maximum
79 82 Accuracy =82%
Accuracy (%)
81
78
Accuracy (%)
80
77 79
78
76
77
75 76
15
10 12
74 10
8
20 40 60 80 100 120 140 5 6
Feature combinations Three vs One 4
2
# of instances with High Accuracy 0 0 # of weight combinations
559
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
560
Patient-centric Handling of Diverse Signals in the mHealth Environment
Jan Sliwa
Bern University of Applied Sciences, Quellgasse 21, CH-2501 Biel, Switzerland
sliwa@swissonline.ch
Abstract: In the context of the Mobile Health (or Telemedicine) many signals (data items) are exchanged between the
medical devices, data storage units and involved persons. They are often treated as a uniform mass of “medical
data”, especially in the Big Data community. At a closer look, they unveil various characteristics, like type
(single / continuous), required quality and tolerance for missing values. As in medical care time is crucial, real-
time characteristics are important, like the sampling rate and the overall reaction time of the emergency system.
The handling of data depends also on the severity of the medical case. Data are transferred and processed by
external systems, therefore the overall function depends on the environment and the persons involved: from
the user/patient to a dedicated medical emergency team. The collected data can be anonymously reused to
gain or verify knowledge, what calls for a fair trade-off between the interests of the individual patient and
the community. This paper discusses the semantics of mHealth data, like medical requirements, physical
constraints and human aspects. This analysis leads to a more precise mathematical definition of the required
data handling that helps to construct mHealth systems that better fulfill the health support function.
561
Sliwa, J.
Patient-centric Handling of Diverse Signals in the mHealth Environment.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 561-568
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
telemedicine in prehospital stroke evaluation. (Ag- a myocardial infarction, i.e. heart attack. Similarly,
boola et al., 2016) presents a bitter reality check for irregularities of the cycle frequency can be identified
smartphone apps. A top-selling app for managing and as arrhythmia, in several variants, like tachycardia or
diagnosing skin cancer was only able to accurately bradycardia (heartbeat too fast or too slow). For ar-
classify 10 of 93 biopsy-proven melanomas. As for rhythmia to be detected, the basic signal has to be an-
insulin dose calculation, 67% of the apps gave inap- alyzed over many cycles. The severity of the case de-
propriate output dose recommendations that put users pends on the intensity and duration of the abnormal
at risk (Huckvale et al., 2015). condition.
If we analyze the function of the systems not in As mentioned above, a point event can be detected
the lab, but in real life, practical experience is of by sensors. For example, tumbling of the patient
use. (Espinoza et al., 2016) present the design of a can be detected by accelerometers, e.g. in a smart-
telemedicine management system in Ecuador where phone. In this case, an algorithm extracts a character-
specific local challenges of a rural environment in a istic waveform from a continuous signal.
less developed country had to be addressed. When we monitor vital signals, we have to treat
adequately missing values. The fact that the measure-
ment is missing may be an information itself. For ex-
3 SIGNAL TYPES ample, missing a required value for a prolonged time
may indicate that the device is not working (e.g. bat-
tery empty), that something has happened to the pa-
3.1 Basic Signals tient or that the patient is not using the device because
it is obtrusive, he/she went on travel and: has forgot-
We can divide the basic signals in following cate- ten it at home / has left it because of its weight / has
gories: no plug adapter for the charger. In a similar way, sys-
• Single measurements: (t, value) tematic outlier values may mean a health problem or a
wrong placement or poor body contact of the device.
• Point events: (t, type) We list those cases in order to stress that the same
• Continuous waveforms: (y = f(t)) observed situation may have very different causes.
Some of them may require intervention of the system
If we take a closer look, the divisions between
operator (hospital).
them are blurred. In the case of a chronic dis-
ease, single measurements form a sequence of values.
Point events may be entered as such, like an epileptic 3.3 Complex Signals
seizure or tumbling. If they are detected by sensors,
they are derived from other measurements, as shown Until now we have discussed signals coming from
below. Continuous signals are created by sampling single sources. From the medical point of view, it
a property, so formally they are sequences of values, is often useful to combine information from many
at a high sampling rate. When we speak of such sig- sources. One of the main reasons is making sharper
nals like ECG (electrocardiogram) or EEG (electroen- distinctions between the cases and eliminating false
cephalogram), they may come from a single sensor (in alarms. There are many papers presenting methods to
a very basic version) or from a set of sensors placed on detect patients’ falls with the use of the accelerome-
the chest or on the head in well defined locations. In ters. Typically the accelerometers built in the smart-
the latter case we obtain a set of synchronized wave- phones are considered as described in (Sannino et al.,
forms. 2015). They are reasonably ubiquitous, however the
assumption that they are worn all the time seems not
3.2 Derived Signals to hold. In any case, if such a device detects the pa-
tient tumbling on the floor, it is useful to verify it with
From the basic signals we can derive more condensed more data. Especially if the detected condition is se-
information. It is especially useful in the case of con- vere, requires an action and this action is costly - like
tinuous signals the volume of which is too large to sending an ambulance - it is crucial to detect only real
store or transfer. Equally, in the raw form it is not cases. False alarms, even not frequent, will erode the
yet very useful. For the electrocardiogram, a well confidence in the service.
known condition is the ST Segment Elevation My- If we want to design a novel architecture that con-
ocardial Infarction (STEMI). The cardiac cycle has nects various devices from unrelated producers, we
characteristic points P-Q-R-S-T, and the elevation of face the problem of the interoperability. Such devices
the S-T segment is a signal warning about the risk of - microphone, ECG sensor, EEG headset - typically
562
Patient-centric Handling of Diverse Signals in the mHealth Environment
are delivered with a connection to the smartphone or optimum and not always more is better. On the other
the cloud and visualization and/or analysis applica- hand, the device typically just counts steps, so climb-
tion. If we want to connect them into a combined ing a mountain is like walking, or even of smaller
device, we have to go on the level of the internal inter- value, as the covered distance is smaller. Equally
faces (rarely disclosed) and to write our own applica- swimming, when the device is left in a locker, does
tion. The system described in (Sannino and De Pietro, not count at all. Therefore the user has to be aware
2014) detects fainting and falling of patients by con- that his/her virtual health is only an imperfect model
necting the heart rate variability in the ECG with the of the real one.
information from accelerometers and other body and This becomes a problem, if the user has an agree-
environmental sensors. In this way the decisions gen- ment with an insurance company to have a healthy
erated by the system take the context into account lifestyle in exchange for lower primes. A simple de-
what increases their reliability. vice, like an accelerometer in a smartphone, registers
Not only data formats may pose a problem, also only certain types of activities. On the other hand, the
communication protocols may be different (periodic user may be tempted to cheat the device, by simulat-
sending / on demand), time and data granularity or ing realistic oscillations.
measurement precision. When detecting complex In a case of a chronic disease, the device is typ-
events, we need synchronized data. If they come ically used to monitor the state of the patient, detect
marked by internal timestamps, we have to compen- the abnormalities and inform the doctor or hospital
sate possible differences or to force the synchroniza- that handles his/her case. For a mild condition, the
tion of the clocks. measurement can be done occasionally, more or less
periodically or if the patient does not feel well. There-
fore missing values are not problematic, possibly the
4 CASE SEVERITY patient feels no necessity to act. He/she should not
be burdened too much by reminders. He/she can be
The treatment of the signal depends on the severity of called for a periodic check, as it is for apnea patients
the medical case. We can list here following classes: using a ventilator. The measurement should have a
• fitness, general health, behavior modification reasonable precision, determined on the basis of the
medical science. It is necessary to eliminate the vari-
• chronic disease ability caused by imprecise placement of the sensor,
– mild too high (or too low) humidity of skin, wrong oper-
– severe ating mode of the device, or similar. If - as we as-
sume - the measurement is performed by the patient
• life saving
at home, the handling should be entirely simple and
The influenced factors are: clear. The device has to be approved by the doctor
• required quality what eliminates most cheap sensors and easily down-
loadable smartphone applications.
• necessity, sampling rate
For a severe chronic disease, the requirements for
• reaction time quality and regularity of the measurements are more
If the devices are used for fitness improvement, stringent. Regular measurements may show the in-
the measurements are performed or checked accord- creased risk before the actual event occurs and the pa-
ing to the interest of the user. The value is rather tient may come for an extensive check or a preven-
used for general information, and there are no tim- tive hospital stay. As the deterioration of the health
ing requirements. The user often loses interest for state may be rapid and serious, time plays an impor-
the measurements after a certain time. If in mean- tant role. Ergonomics has to be carefully designed,
time he/she changed to a healthier lifestyle, the basic as in an emergency the patient’s capabilities are im-
goal has been achieved. paired. For example, during an insulin shock the pa-
There is however a risk that the user gets obsessed tient is dizzy and nervous and his/her vision is blurred.
with the fitness goals. Some people measure their If the patient is not able to act on his/her own and has
weight on bathroom scales many times per day, not no assistance, an automatic communication with the
taking account of normal daily variation and measure- hospital is necessary.
ment errors. In the same way, trying to constantly in- For a life saving condition, the precision and re-
crease the daily step count, especially when compar- action times are even more important. Let us fix our
ing to the group and obtaining (verbal) rewards from attention on a patient with a cardiac disease, having
the device, may pose a health risk. There is a certain one or more wearable / implantable devices connected
563
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
564
Patient-centric Handling of Diverse Signals in the mHealth Environment
7 VERIFICATION OF
6 CYBER-PHYSICAL-SOCIAL
HYPOTHESES
SYSTEMS
Data generated in an mHealth supported therapy can
It is important to see that mHealth systems consist of be reused to verify our assumptions and obtain new
more than the purely technical elements. They inter- knowledge. Let us consider a heart monitoring sys-
act intensely with the physical world. The sensors tem issuing alarms and warnings in emergency cases.
themselves are material - they need electrical power, If the system is working continuously, it can detect
their probes can break, sensing surfaces can have poor significant events also if the patient is not aware of
contact to the skin, output nozzles can be clogged. If anything. They may consist of changed ECG wave-
we speak of Body Area Network, we have to remem- forms, slower / faster / less periodic frequency or else.
ber that tissue and clothing damp the wireless signal. The intensity and duration of such events may play a
If the patient moves in the environment, the wire- role, as well as their sequence. Combining them with
less signal connecting him/her with the server may be other vital signals will make the detection more spe-
blocked by obstacles (e.g. when visiting the restroom cific.
in a restaurant’s basement). He/she can also move into
the area where his provider has a poor signal or data
roaming is impossible.
The emergency systems (Figure 3) are operated
565
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
566
Patient-centric Handling of Diverse Signals in the mHealth Environment
567
SmartMedDev 2017 - Special Session on Smart Medical Devices - From Lab to Clinical Practice
Eapen, Z. J., Turakhia, M. P., McConnell, M. V., Graham, Sannino, G. and De Pietro, G. (2014). A mobile system for
G., Dunn, P., Tiner, C., Rich, C., Harrington, R. A., real-time context-aware monitoring of patients health
Peterson, E. D., and Wayte, P. (2016). Defining a and fainting. International journal of data mining and
mobile health roadmap for cardiovascular health and bioinformatics, 10(4):407–423.
disease. Journal of the American Heart Association, Silva, B. M., Rodrigues, J. J., de la Torre Dı́ez, I., López-
5(7). Coronado, M., and Saleem, K. (2015). Mobile-health:
Espinoza, J., Chandy, D., Ochoa, S., Jiménez, J., Huerta, a review of current state in 2015. Journal of biomedi-
M., Soto, A., Sagbay, G., and Avila, R. (2016). Design cal informatics, 56:265–272.
of telemedicine management system in ecuador. In Sliwa, J. (2016a). A generalized framework for multi-party
Ecuador Technical Chapters Meeting (ETCM), IEEE, data exchange for iot systems. In 2016 30th Interna-
volume 1, pages 1–6. IEEE. tional Conference on Advanced Information Network-
Gejibo, S., Mancini, F., and Mughal, K. A. (2015). Mo- ing and Applications Workshops (WAINA), pages 193–
bile data collection: A security perspective. In Mobile 198. IEEE.
Health, pages 1015–1042. Springer. Sliwa, J. (2016b). Reuse of data from smart medical devices
Gia, T. N., Jiang, M., Rahmani, A.-M., Westerlund, T., for quality control and evidence based medicine. In
Liljeberg, P., and Tenhunen, H. (2015). Fog com- Dobre, C. and Xhafa, F., editors, Pervasive Comput-
puting in healthcare internet of things: A case study ing: Next Generation Platforms for Intelligent Data
on ecg feature extraction. In Computer and In- Collection, chapter 9, pages 255–297. Morgan Kauf-
formation Technology; Ubiquitous Computing and mann.
Communications; Dependable, Autonomic and Se- Soh, P. J., Vandenbosch, G. A., Mercuri, M., and Schreurs,
cure Computing; Pervasive Intelligence and Comput- D. M.-P. (2015). Wearable wireless health monitoring:
ing (CIT/IUCC/DASC/PICOM), 2015 IEEE Interna- Current developments, challenges, and future trends.
tional Conference on, pages 356–363. IEEE. IEEE Microwave Magazine, 16(4):55–70.
Hossain, M. S. and Muhammad, G. (2016). Cloud-assisted Suciu, G., Suciu, V., Martian, A., Craciunescu, R., Vulpe,
industrial internet of things (iiot)–enabled framework A., Marcu, I., Halunga, S., and Fratu, O. (2015). Big
for health monitoring. Computer Networks, 101:192– data, internet of things and cloud convergence–an ar-
202. chitecture for secure e-health applications. Journal of
Huckvale, K., Adomaviciute, S., Prieto, J. T., Leow, M. K.- medical systems, 39(11):1–8.
S., and Car, J. (2015). Smartphone apps for calcu- Sukor, J. A., Mohktar, M. S., Redmond, S. J., and Lovell,
lating insulin dose: a systematic assessment. BMC N. H. (2015). Signal quality measures on pulse oxime-
Medicine, 13:106. try and blood pressure signals acquired from self-
Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., and measurement in a home environment. IEEE journal
Kwak, K.-S. (2015). The internet of things for health of biomedical and health informatics, 19(1):102–108.
care: a comprehensive survey. IEEE Access, 3:678–
Thelen, S., Czaplik, M., Meisen, P., Schilberg, D.,
708.
and Jeschke, S. (2015). Using off-the-shelf med-
Itrat, A., Taqui, A., Cerejo, R., Briggs, F., Cho, S.-M., Or- ical devices for biomedical signal monitoring in a
ganek, N., Reimer, A. P., Winners, S., Rasmussen, P., telemedicine system for emergency medical services.
Hussain, M. S., et al. (2016). Telemedicine in pre- IEEE journal of biomedical and health informatics,
hospital stroke evaluation and thrombolysis: taking 19(1):117–123.
stroke treatment to the doorstep. JAMA neurology,
Wegwarth, O. and Gigerenzer, G. (2013). Overdiagnosis
73(2):162–168.
and overtreatment: evaluation of what physicians tell
Kang, K., Wang, Q., Hur, J., Park, K.-J., and Sha, L. (2015). their patients about screening harms. JAMA internal
Medical-grade quality of service for real-time mobile medicine, 173(22):2086–2087.
healthcare. IEEE Computer, 48(2):41–49.
Xue, S., Chen, X., Fang, Z., and Xia, S. (2015). An
Lanzola, G., Losiouk, E., Del Favero, S., Facchinetti, A., ecg arrhythmia classification and heart rate variabil-
Galderisi, A., Quaglini, S., Magni, L., and Cobelli, C. ity analysis system based on android platform. In
(2016). Remote blood glucose monitoring in mhealth Future Information and Communication Technologies
scenarios: A review. Sensors, 16(12):1983. for Ubiquitous HealthCare (Ubi-HealthTech), 2015
Larburu, N., Bults, R., van Sinderen, M., Widya, I., 2nd International Symposium on, pages 1–5. IEEE.
and Hermens, H. (2016). Quality-of-data broker for
quality-of-data-aware telemedicine systems. IRBM,
37(4):210–218.
Samie, F., Bauer, L., and Henkel, J. (2016). Iot tech-
nologies for embedded computing: A survey. In
Hardware/Software Codesign and System Synthesis
(CODES+ ISSS), 2016 International Conference on,
pages 1–10. IEEE.
Sannino, G., De Falco, I., and De Pietro, G. (2015). A
supervised approach to automatically extract a set of
rules to support fall detection in an mhealth system.
Applied Soft Computing, 34:205–216.
568
S PECIAL S ESSION ON A NALYSIS OF
C LINICAL P ROCESSES
F ULL PAPERS
Enabling Interactive Process Analysis
with Process Mining and Visual Analytics
Keywords: Process Mining, Visual Analytics, Compliance Analysis, Performance Analysis, Classification.
Abstract: In a typical healthcare setting, specific clinical care pathways can be defined by the hospitals. Process mining
provides a way of analyzing the care pathways by analyzing the event data extracted from the hospital infor-
mation systems. Process mining can be used to optimize the overall care pathway, and gain interesting insights
into the actual execution of the process, as well as to compare the expectations versus the reality. In this paper,
a generic novel tool called InterPretA, is introduced which builds upon pre-existing process mining and visual
analytics techniques to enable the user to perform such process oriented analysis. InterPretA contains a set of
options to provide high level conformance analysis of a process from different perspectives. Furthermore, In-
terPretA enables detailed investigative analysis by letting the user interactively analyze, visualize and explore
the execution of the processes from the data perspective.
573
Dixit, P., Caballero, H., Corvò, A., Hompes, B., Buijs, J. and Aalst, W.
Enabling Interactive Process Analysis with Process Mining and Visual Analytics.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 573-584
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
ACP 2017 - Special Session on Analysis of Clinical Processes
Figure 1: Conformance analysis view of a real world process model (used in the case study). The sheer size of the process
model makes it difficult to draw inferences by merely looking at the whole process in a holistic manner, generating the need
for smart interactive analysis. Figure used for illustrative purposes only, to represent the scale and nature of a large healthcare
process.
then the analysis performed by the conformance tech- framework - ProM2 (Dongen et al., 2005). As op-
niques can provide valuable insights about what went posed to traditional approaches, which usually pro-
right and what went wrong in the process. Confor- vide metrics represented by some numbers which may
mance analysis can be used to gain insights about the be difficult for the user to comprehend, in our ap-
compliance aspect of the process, such as understand- proach the user can interactively explore the perfor-
ing where the deviations occur in a process (Adri- mance and compliance specific issues guided by vi-
ansyah et al., 2011; Munoz-Gama et al., 2014). As sual analytic techniques. Firstly, InterPretA enables
there is a time notion associated with every step in a the user to get different helicopter views on the pro-
process, the conformance analysis could also be used cess. That is, the results from conformance analysis
in order to investigate the performance aspect of the could be visualized from different perspectives on the
process, for example, understanding where the bottle- complete process. Next, InterPretA lets the user inter-
necks occur in a process. Root cause analysis could be actively explore the results from conformance analy-
performed using traditional classification techniques sis for certain fragments/paths in the process. This
to understand the reasons behind the deviations and is especially useful for large process models, wherein
bottlenecks in a process. the user may want to focus on analyzing only a part
Although conformance results enable compliance of the process. Finally, InterPretA also supports per-
and performance analysis, there are still some open forming the root cause analysis, explaining why the
challenges which could make the analysis difficult. deviations or bottlenecks occur in the process. At all
This is specifically true for healthcare processes, times, the user can also visualize and quantify the in-
which are extremely flexible and dependent on mul- formation with the help of some graphs, which could
tiple factors thereby making them very complex. A be used for exploratory purposes or to answer some
process discovery on an event log from HIS usually questions or for making reports.
results in complicated and/or huge process model as
shown in Figure 1. Most of the current visualiza-
tions display the conformance results in their entirety. 2 BACKGROUND
From a user perspective, displaying the conformance
results on a big and complicated process model with
The applicability of visual analytics in process min-
many nodes, may turn out be too daunting. More-
ing has been explored in (Kriglstein et al., 2016; Aalst
over, most of the current techniques are standalone
et al., 2011; Mannhardt et al., 2015). However, it is
techniques and do not support effective combinations
still in its nascent stages and most of the techniques
of intra-disciplinary analysis. Furthermore, investi-
focus on a broad perspective. The process model
gation of the satisfaction of specific protocols and/or
(along with the results from conformance analysis) is
KPIs in the process is usually only possible through
central to the analysis in InterPretA. In this section,
data specific analysis. That is, it is not possible to
we introduce the background of the elements which
interactively perform various compliance and perfor-
constitute to the backbone of InterPretA.
mance analysis directly on a process model.
In order to address the issues discussed above, we
2.1 Event Log
propose a tool - InterPretA (Interactive Process An-
alytics) which serves as a one stop solution for per-
forming process-centric analytics using pre-existing The HIS, such as electronic health records systems,
conformance analysis techniques. InterPretA has could be used in order to extract the event logs. Events
been implemented using Process Analytics1 plug-in form the basic building blocks of an event log. Ev-
available in the nightly builds of the Process Mining ery event is associated with a particular case, which
is identified by a case ID. An event represents occur-
rence of an activity in a particular case. Events have a
1 http://svn.win.tue.nl/repos/prom/Packages/
ProcessAnalytics 2 http://www.promtools.org
574
Enabling Interactive Process Analysis with Process Mining and Visual Analytics
575
ACP 2017 - Special Session on Analysis of Clinical Processes
Figure 3: A snapshot of our interface. Section (A) is dedicated to the process views. The user can directly interact with the
process model. The visualizations, in Section (B), are triggered by this user interaction and by the configuration settings in
Section (C).
abstracting event logs, identifying bottlenecks, under- structural properties of the model can be used to clas-
standing and modeling guards in data-aware process sify activities and cases. Additionally, this technique
models, annotating and clustering cohorts by split- can help rank attributes and attribute values by means
ting event logs into sub logs etc. However, many of of statistical analysis, as described in sub-section 2.5.
the applications of classification techniques in process For example, cases that lead to statistically signifi-
mining focus entirely on the data perspective. As dis- cantly different conformance results can be classified
cussed above, in InterPretA, a process model is cen- together, and features that lead to those classifications
tral to everything. Hence, the classification task is can be ranked.
also driven from a process perspective, enabled by the In our approach, the user interactively selects the
results of the conformance analysis, visualized on the interesting fragments in the process model and con-
process model. figures the classification parameters. Based on user
We use the traditional classification techniques in selection, the alignments are either recomputed, or
order to perform root cause analysis, for example, to pre-existing alignments are used, for the classifica-
find which resource caused a delay in the process or tion task. For performing the traditional classification
what caused a deviation in a process. More particu- tasks we use Weka, which inherently supports an ar-
larly, we support the use of pre-existing feature selec- ray of classification algorithms (Hall et al., 2009).
tion techniques, which use data attribute values (either
case level attributes or event level attributes) in order 2.5 Statistical Performance Analysis
to classify based on the desired output, for example,
values above or below a certain threshold for perfor- Statistical analysis can be performed after classifica-
mance. Furthermore, well-known ranking techniques tion in order to discover whether observed differences
are used to determine the rank of each attribute based between different classes are statistically significant.
on the ability of an attribute to classify based on the For example, different resources that execute an ac-
desired output. tivity might lead to significantly different execution
Besides using traditional classification and rank- times, cases for patients of a specific age group might
ing techniques, we use the context-aware process per- take significantly longer than those for other patients,
formance analysis framework recently proposed in waiting times might be shorter when an activity is pre-
(Hompes et al., 2016) to classify the event data using ceded by a certain other activity, etc. When different
functions that take the process context into account. classes do not lead to statistically significant differ-
For example, prefixes of activities in their trace and ent values for the chosen performance metric, classes
576
Enabling Interactive Process Analysis with Process Mining and Visual Analytics
can be grouped in order to reduce the selection di- lowed by the interactive analysis component of the
mensionality for the user. Well-known statistical tests tool.
such as analysis of variance are used here.
3.1 Graph Views
577
ACP 2017 - Special Session on Analysis of Clinical Processes
Figure 4: Graph view to show the disribution of selected activities from the process model (not shown here), since the start
of the case. Both the synchrnous and log moves are considered here, as evident from the configuration settings. The color of
each bar in histogram corresponds to every selected activity from the process.
578
Enabling Interactive Process Analysis with Process Mining and Visual Analytics
Figure 5: Graph view to compare the distribution of activities with respect to a selected activity. A single activity from the
process view is chosen by the user as the base activity, followed by a number of activities which should be compared with the
base activity. The histogram shows the time distribution and the number of times the selected activities to be compared occur,
before or after the base activity. The color of each bar in histogram corresponds to each selected activity from the process. It
should be noted that the base activity always occurs at time 0 and is not shown in the histogram view.
Figure 6: An example of frequency view of the process model. The more frequent activities/paths could be easily visualized
in the model. The user can use this information to interactively explore the specific details pertaining to the frequent tasks.
previous synchronous activities. As with the fitness of analytic setting, the user is also interested in perform-
model and log, the user can configure different views ing a detailed root cause analysis. In this section,
(absolute, average occurrence per case or number of we describe how InterPretA supports the user in
cases) on the performance dimension. performing such detailed analysis starting from the
It should be noted that the transactional informa- high-level views. Five high-level tasks (Schulz et al.,
tion of an activity (e.g. events representing lifecycle 2013) have been identified to perform the interactive
an activity) can also be used for performance anal- analysis.
ysis. That is, the lifecycle information of an activ-
ity is useful in detecting the actual performance time Task 1: Deviation Analysis. The fitness of model and
of an activity. However, we do not show this infor- log view provides a good overview of how well the
mation on the helicopter performance view as often data and model fit, and where the possible deviations
event logs only contain complete events, i.e. only one are located in the process. The next step would be to
event per activity instance. When lifecycle informa- investigate what causes the deviations in the process.
tion is present, additional performance statistics are For example, suppose that the conformance analysis
calculated and can be shown. indicates that a particular task is sometimes skipped
(move on model) in the process. This could be ex-
3.3 Interactive Analysis plained by the attributes associated with the case, for
example the resources performing the task.
The graph views and process views enable analysis In order to investigate what or who causes
of the process from a high level. In a typical process deviations in the process, classification analysis
579
ACP 2017 - Special Session on Analysis of Clinical Processes
Figure 7: Compliance analysis for resources involved in ac- Figure 8: Bottleneck analysis for activities preceding a bot-
tivities. When resource ‘Bob’ is involved in activity ‘A’, the tleneck activity ‘D’. When activity ‘C’ is not performed be-
case fitness to the model is significantly lower. fore activity ‘D’, the duration is significantly longer.
is used. The user can select the desired activity model which correspond to the path with delays.
from the activity drop down list, and configure the Next, the user can perform classification analysis,
desired classification settings, to classify what or with the output of classification set to be fitting ver-
who causes the synchronous, log and model moves sus non-fitting cases. The fitting cases in the output
for the particular activity. Here, we make use of would be the ones which have the synchronous moves
the context-aware performance analysis framework for all the selected activities. Alternatively, the user
proposed in (Hompes et al., 2016) to provide and might be interested in finding out all the cases in the
rank the statistically significant attributes (i.e. the process (or a path in the process) which are executed
process context). Many combinations of classifi- within a certain time frame. For such analysis, the
cation and performance/conformance functions are output for classification could be a threshold for time
automatically generated from a collection of contexts. taken, such that the attributes which better define
Then, statistical testing is automatically performed the performance (e.g. above or below the threshold
to verify whether different classes (contexts) lead for time taken) would be identified by the classifi-
to statistically significantly different results, e.g. in cation techniques. Alternatively, we automatically
Figure 7, we see that Bob has a high variability in verify whether different contexts lead to significant
activity A. For those combinations where this is differences in performance. For example, Figure 8
the case, the specific classification is returned to shows an example where the duration of an activity
the user as it might lead to interesting insights. For is significantly different for different prefixes in the
example, Figure 7 shows an example plot of the trace. From this example, we might conclude that
fitness of a model, split by the different resources activity ‘C’ should be made mandatory.
that can perform activity ‘A’ in the process. From
this example, we might deduce that the fitness of a Task 3: Frequency-oriented Compliance Analysis.
case to the model depends highly on which resource The frequency view on process model gives a good
executes activity ‘A’. The statistical analysis tells overview of the frequency distribution of activities in
us which resource(s) lead to significantly different the overall process. This view is already useful for an-
results. swering some compliance questions such as whether
or not an activity occurs at least once for every
Task 2: Bottleneck Analysis. The performance view case. However, the user might also be interested in
provides an overview of the time spent between the interactively investigating some non-trivial KPIs such
activities. For example, it may be the case that a as the occurrence of a particular activity triggering
particular path in a process is much slower than the the occurrence of another activity. In order to enable
other paths. The user might be interested in finding such analysis, the user can select a set of activities,
out, how a particular path with delays is different and select the appropriate configuration settings,
from other paths in the process. In order to find this to check the co-occurrences and the frequencies of
out, the user can select the activities from the process co-occurrence for selected activities. Additionally,
580
Enabling Interactive Process Analysis with Process Mining and Visual Analytics
Figure 9: Graph showing the concept drift and changes among different modules in the LUMC dataset. The colors in the
graph correspond to an activity belonging to a particular module. For first 7 months, all the activities belonged to one module
type. There is a steep fall in the module usage towards year end and a peak in the module usage in year 2.
581
ACP 2017 - Special Session on Analysis of Clinical Processes
Figure 10: The top three ranked attribute classifiers for the classification analysis based on the answers to the question Were
the personal goals met?. The top ranked attribute classifier based on the ranking algorithm was zorgpad (i.e. module type).
module existed, as all the activities within this time ment in the module to better manage the patient ex-
span belong to the same module type. From Figure 9 pectation.
it can also be seen that this module still persisted over
time, but was gradually replaced by the other mod- 4.3 Compliance Analysis - Time
ules. One more interesting pattern that could be ob-
served from Figure 9, is the decrease in the number
Perspective
of events towards the end of the timeline. A logical
explanation for this pattern is that since the appoint- Next, we focus on one individual module, to perform
ments (events) for modules are usually scheduled in some preliminary compliance analysis. The expecta-
the future, a more distant future has fewer number of tion is to have every appointment completed within a
appointments. certain time-frame. We select a particular appoint-
ment type from the chosen module and plot a his-
togram with domain axis showing the time in weeks,
4.2 Classification Analysis since the beginning of the case. Ideally, the chosen
activity should be completed within 9-10 weeks since
At the end of each module, the patients are asked to the start of the case. However, as becomes clear from
fill in a questionnaire, evaluating the patients treat- Figure 12, in reality this activity is mostly completed
ment plan, understanding and satisfaction of the mod- before the expected time duration, thereby meeting
ule. It is interesting to analyze the outcome of the the desired KPI for majority of the patients.
treatment, based on the answers in the survey. For one
of such questions, Were the personal goals met?, we
perform classification analysis with the Information
gain classifier, and answers to question (Yes, No or
5 CONCLUSION AND FUTURE
NA) as output. The top three ranked attributes which WORK
best classify the output are shown in Figure 10. It
is however important to note that module overname In this paper, we introduced a novel tool for enabling
is a basic module (to meet diabetic team members) interactive process-oriented data analysis. The tool
and hence majority of the patients from such modules builds upon and brings together existing techniques
have not reached their goals yet, thereby having the from process mining, data mining and visual analyt-
corresponding value of NA, as shown in Figure 10. ics field, to enable interactive process analysis. It
We select the top ranked attribute classifier, found to supports exploratory analysis through different heli-
be the module type. For the majority of patients, no copter views on the process. In contrast to existing
value was recorded for this question (value of NA). approaches, it is highly interactive, which could be
However, for the patients who did fill in the survey, used to perform root cause analysis for any problems
one prominent outcome, as evident from Figure 11 in the process. The application areas of the tool are
is that for the module Optimalisatie glucoseregulatie, broadly categorized, and the tool was utilized to an-
almost twice the amount of patients did not meet their alyze a real-life dataset. The tool relies on the tradi-
expectations fully. This suggests that another module tional ways of representing the data (e.g. histograms)
might have been more suitable or calls for improve- for process analytics.
582
Enabling Interactive Process Analysis with Process Mining and Visual Analytics
ACKNOWLEDGEMENTS
The authors would like to thank LUMC for provid-
ing the problems and the access to the data. The au-
thors especially thank Drs. Marielle Schroijen and
A.J. (Thomas) Schneider, both from LUMC, for their
efforts, thorough help and timely feedback throughout
the analysis. Furthermore, the authors would like to
thank Philips research and Technical University Eind-
hoven for funding this research.
REFERENCES
Aalst, W. M. P. v. d. (2016). Process Mining - Data Science
in Action, Second Edition. Springer.
Aalst, W. M. P. v. d., Leoni, d. M., and ter Hofstede, A. H.
(2011). Process mining and visual analytics: Breath-
Figure 11: Zoomed in version showing responses for Yes ing life into business process models.
and No, for the top ranked classifier zorgpad (module type) Adriansyah, A., Dongen, B. F. v., and Aalst, W. M. P. v. d.
based on the answer to the question Were the personal goals (2011). Towards robust conformance checking. In
met?. Business Process Management Workshops, volume 66
of Lecture Notes in Business Information Processing,
pages 122–133. Springer Berlin Heidelberg.
Buffett, S. and Geng, L. (2010). Using classification meth-
ods to label tasks in process mining. Journal of
Software Maintenance and Evolution: Research and
Practice, 22(6-7):497–517.
Dongen, B. F. v., de Medeiros, A. K. A., Verbeek, H. M. W.,
Weijters, A. J. M. M., and Aalst, W. M. P. v. d. (2005).
Figure 12: Compliance analysis for completetion of the ac- The prom framework: A new era in process min-
tivity. ing tool support. In International Conference on Ap-
plication and Theory of Petri Nets, pages 444–454.
Springer.
In the future, we aim to support more interac- Dwivedi, A., Bali, R., James, A., and Naguib, R. (2001).
tive data exploration, for example from the plotted Workflow management systems: the healthcare tech-
graphs views. Currently the tool is limited to read- nology of the future? In Engineering in Medicine and
only data plots in terms of histograms/stacked charts. Biology Society, 2001. Proceedings of the 23rd An-
nual International Conference of the IEEE, volume 4,
Drill down and roll up analysis could be introduced, pages 3887–3890. IEEE.
to support more data-oriented task analysis. Further- Fernandez-Llatas, C., Martinez-Millana, A., Martinez-
more, the impact on the current process could be vi- Romero, A., Bened, J. M., and Traver, V. (2015). Di-
sualized based on the interaction of the user with the abetes care related process modelling using process
data from the graph view. This could also lead to un- mining techniques. lessons learned in the application
derstanding the configurability of the process based of interactive pattern recognition: coping with the
spaghetti effect. In 2015 37th Annual International
on certain cohorts. Another research direction would Conference of the IEEE Engineering in Medicine and
be to introduce more classification and/or correlation Biology Society (EMBC), pages 2127–2130.
strategies. Currently, we consider only one classifier Goedertier, S., Martens, D., Baesens, B., Haesen, R., and
attribute at a time. One obvious next step would be Vanthienen, J. (2007). Process mining as first-order
to also consider the combined impact of multiple at- classification learning on logs with negative events. In
tributes on the output variable for classification. Here, International Conference on Business Process Man-
agement, pages 42–53. Springer.
statistical analysis would also be a beneficial addition.
Graeber, S. (1997). The impact of workflow management
systems on the design of hospital information systems.
In Proceedings of the AMIA Annual Fall Symposium,
page 856. American Medical Informatics Association.
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann,
P., and Witten, I. H. (2009). The weka data min-
ing software: An update. SIGKDD Explor. Newsl.,
11(1):10–18.
583
ACP 2017 - Special Session on Analysis of Clinical Processes
584
Towards Process Mining of EMR Data
Case Study for Sepsis Management
Gert-Jan de Vries1 , Ricardo Alfredo Quintano Neira2,1 , Gijs Geleijnse1 , Prabhakar Dixit1,3
and Bruno Franco Mazza4
1 Philips
Research - Healthcare, High Tech Campus 34, Eindhoven, The Netherlands
2 Industrial
Engineering Department, Pontifı́cia Universidade Católica do Rio de Janeiro, Rio de Janeiro, Brazil
3 Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands
4 Intensive Care Unit, Hospital Samaritano, São Paulo, Brazil
gj.de.vries@philips.com
Abstract: Imagine you have cold shivers and a racing heartbeat and high fever. Clear thinking is impossible! Ceiling
lights flash by as you are rushed to the emergency department (ED). You feel your body is getting even sicker.
Doctors are doing their utmost to treat this acute and threatening condition, while they work piece together
all small parts of evidence to set the diagnosis and start targeted treatment. In this situation, the clinical staff
depends on a clinical pathway protocol to streamline communication and deliver care according to the latest
medical evidence. Today, such clinical pathways are mainly executed and tracked using paper. Hence, there
is ample opportunity for technology in a supportive role. Automated process analysis can help improve these
processes of delivering standardized care beyond their current level. In this paper, we provide insight into
the steps required to perform process mining to EMR data in the challenging domain of sepsis treatment and
provide learnings from our preliminary analysis of these data using process mining techniques.
585
Vries, G-J., Neira, R., Geleijnse, G., Dixit, P. and Mazza, B.
Towards Process Mining of EMR Data - Case Study for Sepsis Management.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 585-593
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
ACP 2017 - Special Session on Analysis of Clinical Processes
geography, but are known to increase with the three managed using a paper sheet. However, this leads to
levels of sepsis: up to 30% for sepsis, 50% for severe double data entry as the status needs to be recorded
sepsis and 80% for septic shock over the timespan of in the Health IT system as well as on paper. More-
1 year (Jawad et al., 2012). A multi-center study in over, the current phase on the pathway, when repre-
Brazilian Intensive Care Units (ICUs) showed rates sented on paper, is only available to those accessing
of 34.7%, 47.3% and 52.2% at 28 days, respectively the sheet, typically at the bed side.
(Silva et al., 2004). In this research, we are interested in solutions to
In 2002 the Surviving Sepsis Campaign (SSC) monitor the status of the patient in a clinical pathway
was launched as a global campaign to reduce mortal- by analyzing data from the Electronic Medical Record
ity due to sepsis. The guidelines they published, along (EMR). To this end, we model the clinical pathway in
with the updates made over the last years, are now a computer interpretable format. The events in this
widely adopted in clinical practice (Dellinger et al., model are associated with data from the EMR. How-
2004; Dellinger et al., 2008; Dellinger et al., 2013). ever, there might not always be in one-to-one corre-
The SSC provided a care bundle that comprises the spondence. For example, events such as patient trans-
following steps: ferred to ICU or Vital Signs measured may be associ-
To be completed within 3 hours of presentation: ated with only single time-stamped entries in the pa-
• Measure lactate level tient record, but as we will see in the following, events
such as Blood Volume Expansion performed might be
• Obtain blood cultures prior to administration
more complicated to retrieve.
of antibiotics
Process mining is the technique to extract infor-
• Administer broad spectrum antibiotics
mation from event logs (van der Aalst, 2011). In gen-
• Administer 30mL/kg crystalloid for hypoten- eral, the scientific field is concerned with two research
sion or lactate ≥ 4 mmol/L areas: process discovery and conformance checking.
Process discovery deals with identifying a model that
To be completed within 6 hours of presentation: describes the behavior as observed in a set of event
• Apply vasopressors (for hypotension that does logs. In process discovery, the challenge is to identify
not respond to initial fluid resuscitation) to main- a model that is not too general but is also not over-
tain a mean arterial pressure (MAP) ≥ 65 mmHg fitting the behavior as encountered in the set of event
logs. In conformance checking, on the other hand, a
• In the event of persistent hypotension after ini-
collection of event logs is compared with a reference
tial fluid administration (MAP < 65 mmHg) or if
model with the aim to research whether the observed
initial lactate was ≥ 4 mmol/L, reassess volume
behavior is matching the expected behavior. In par-
status and tissue perfusion and document findings
ticular, common deviations or delays in processes can
• Remeasure lactate if initial lactate elevated. be analyzed. As many KPIs are based on times-to-
As these guidelines provide a recommendation, event or performing actions in a certain order, results
hospitals implement these guidelines adapted to their from conformance checking can be used as input to
standards of care. These guidelines are translated KPI analysis.
into clinical pathways (CPs), which are “complex in- Applying process mining to event logs obtained
tervention[s] for the mutual decision making and or- from EMRs is known to be a challenging topic,
ganisation of care processes for a well-defined group as was concluded in several studies in the appli-
of patients during a well-defined period” (European cation of process mining techniques domains such
Pathway Association, 2016). In this field, Key Perfor- as oncology, surgery, cardiology, diabetes and clin-
mance Indicators (KPIs) are often described in terms ical images (Rojas et al., 2016). Already in 2008,
of adherence to such guidelines. Mans et al. describe explorations to discover pro-
During the interpretation and translation process, cess models from hospital data on stroke care (Mans
the guidelines are made actionable for the clinical et al., 2008). Nonetheless, these past attempts were
staff: tasks and responsibilities are defined and a performed on relatively straightforward clinical pro-
communication structure around the pathway is put cesses with homogenous patient populations, or in-
in place. CPs are implemented in different areas of corporated prospective data collection. To the best
health care, such as acute care (e.g., for chest pain of our knowledge, two other studies looked into ap-
in the emergency room (ER), stroke diagnosis), in- plying process mining for sepsis, however results are
tegrated oncology care and chronic disease manage- limitedly published (Mannhardt et al., 2016; Mcgre-
ment (e.g., coordination of care for heart failure pa- gor et al., 2011).
tients). Often, the clinical pathway of a patient is In general, process mining techniques can only be
586
Towards Process Mining of EMR Data - Case Study for Sepsis Management
Volume Volume
expansion expansion
prescr admin
Blood Blood
culture Antibiotics
culture
prescr admin
collect
Antibiotics
prescr
Figure 1: Petri net of the simplified model representing the clinical pathway for sepsis management, used for conformance
checking.
applied if the event log describes a recognizable pro- caregivers, we pseudonymized the patient data. Im-
cess. The event log for a patient from an EMR will portant aspect with respect to the process analysis is
contain events related to various processes and ac- that dates were shifted with a fixed amount of days
tions. The vast majority of these raw events will not per patient-encounter. Hence, the relative times be-
be directly related to the care according to the refer- tween events per hospital admission were not altered.
ence pathway, but rather reflect routine sub-processes The data analysis was conducted with approval of the
that the staff follows in usual care. Hence when ana- institution’s ethics committee.
lyzing the event log, a projection needs to be created As indicated in the introduction, the raw data
of events that describe actions and data related to the from the EMR requires interpretation or abstraction to
pathway. In this paper, we are interested in exploring bring it to the level of event analysis suitable to derive
the potential of applying process mining techniques meaningful insights. The ultimate aim would be the
on a complete patient record from an EMR. We draw analysis in terms of KPIs, however that would require
learnings from the modeling, data extraction and pro- more validation and comparison to the formal quality
cess mining steps. assessment procedure, which is beyond the scope of
this paper. To this end, we focussed on the important
elements in the first three hours of care as described in
the SSC care bundle: Lactate measurement, obtaining
2 METHODS blood cultures, antibiotics administration and volume
expansion. The first two are relatively easily obtained
The data used in our study have been obtained from from the data as they refer to procedures that are di-
Hospital Samaritano, a private, Brazilian hospital rectly ordered as such and registered in the EMR. The
having over 300 beds. For extracting the data from antibiotics are retrieved in a similar method, using a
the Health IT system we identified the database tables long list of antibiotics names and active components.
and attributes that could represent the sepsis treat- Volume expansion is, however, not directly registered
ment activities from the ICU and emergency depart- as such in the EMR, but required interpretation of se-
ment (ED) processes. For the selection of sepsis hos- quences of low-level events of administrating fluid.
pitalizations, we considered hospitalization registries To this end, we collected all administrations of vol-
that had at least one diagnosis or death related to ume expanders and implemented a windowed thresh-
sepsis using an ICD, 10th edition (ICD-10) code list olding that searches for sufficient fluid administration
for sepsis (Canadian Institute for Health Information, (≥ 90% ∗ 30mL/kg in 4 hours) such that it can be con-
2009). Also, we included patients that were assigned sidered fluid administration with the purpose of vol-
a prescription template related to sepsis. The ICD- ume expansion. For each of these four elements of
10 codings we selected, were validated by 3 Brazilian care we collect the times of request and times of ad-
specialists and the sepsis selection method was val- ministration or collection, which gives 8 event types.
idated by the physician responsible for the deploy- To mark the start and end of event traces, we also in-
ment of the sepsis protocol in the hospital. We ex- clude the moment of admission and discharge, yield-
tracted 4516 sepsis hospital encounters for a period ing a total of 10 different event types.
of two years. To protect the identity of patients and In order to avoid that incomplete timestamps,
587
ACP 2017 - Special Session on Analysis of Clinical Processes
that only contain the date of the event, would nega- 3.1 Events
tively influence the results, we corrected timestamps
of ’00:00:00’ in appropriate cases as we found that In total there were 37635 events extracted for the
these timestamps referred to the midnight before the 4442 patient admissions. 4204 events had a time-
actual event must have happened. To allow for a more stamp of 00:00:00. The vast majority (4162) of these
complete conformance checking, we chose to correct events were the collection of lactate. For 3700 events
these timestamps as follows: if the event related to we could correct the timestamps using the aforemen-
collection or administration and if the corresponding tioned procedure, another 504 could not be corrected
prescription event was present, we corrected the time- (no corresponding request event could be found) and
stamp to one second after the corresponding prescrip- were removed. Note that for the time-to-event anal-
tion event. By doing so, we corrected the order of ysis, we excluded all the 4204 events with imprecise
events, however it should be noted that these times- timestamps.
tamps should still be considered imprecise and were Table 2 shows the number of events retrieved from
thus excluded from any time-to-event analysis. the EMR. We observe that all event types are highly
Our explorative analysis started with retrieving the represented in the database, with at least 85% (lactate
times to event for each of the care elements as a step collection) and more than 95% of cases for the other
towards measuring KPIs. Note that we used the time obligatory event types. Volume expansion is less of-
of presentation (admission) as time zero to be able ten represented, however this is also considered an
to measure all other timestamps relative to this time optional (conditional) event, as specified in the model
of admission. After that, we used the ProM soft- (Figure 1).
ware (van der Aalst et al., 2007) to perform confor- Figure 2 shows the histograms of time-to-event
mance analysis of the model outlined by the SSC care (from the moment of presentation) for each of the pre-
bundle. To this end, we constructed the model as a scription and administration/collection events. Note
Petri net, displayed in Figure 1, that represents the that that the rightmost bars in the histograms (at 3
different steps that can happen concurrently, and the hours from presentation) contain all samples with
(time-wise) dependency between obtaining the blood times ≥ 3 hours. We observe that the vast major-
cultures and administration of antibiotics. While this ity of events happen within the first hour after pre-
model might seem an oversimplification of clinical re- sentation, with modes being 16 minutes for prescrip-
ality, it does contain all the critical steps outlined in tion of antibiotics and volume expansion, and 17 min-
the SSC care bundle (see Introduction) and provides a utes for lactate and blood cultures. For administra-
first step towards more elaborate pathway models. In tion/collection, the mode are 15 minutes for lactate,
the process of conformance checking, the event traces 19 for volume expansion, 21 minutes for antibiotics
in the event log are aligned with the model and a dis- and 38 for blood cultures. The following fractions of
tance is calculated for the alignment. We used the prescription events happen outside of the window of 3
’standard distance function’ that assigns a cost of 0 in hours: Lactate (5.4%), Antibiotics (5.2%), Blood cul-
case log and model agree and 1 in case of disagree- tures (4.9%), Volume expansion (14.7%). Note that
ment (move on log or move on model) (van der Aalst for lactate collection, the number of events found is
et al., 2012). much smaller than for the others due to the inaccurate
timestamping mentioned earlier.
Conformance analysis using ProM yielded the re-
3 RESULTS sults presented in Figure 3. The number of prescrip-
The cohort extracted for the present analysis, using Table 1: Descriptive statistics of the patient population.
the inclusion criteria outlined in the previous section, Name Valid N N (%)
consisted of 4516 patients. 4442 patients entered the Median [25th-75th]
hospital via the ED and were selected for the subse- Age (year) 4442 37.5 [26.0-56.3]
quent analysis. These patients have a median age of Male 4442 2295 (51.7%)
LOS (hour) 4439 5.0 [3.4-75.2]
37.7 years, 51.5% were male, median length of stay Died in hospital 4442 113 (2.5%)
(LOS) was 5 hours, and 2.5% died in hospital. Further Initial diagnosis 4442
descriptive statistics can be found in Table 1. Missing 77 (1.7%)
Infections / Parasites 1041 (23.4%)
Respiratory 1631 (36.7%)
Abnormalities 953 (21.5%)
Other 740 (16.7%)
588
Towards Process Mining of EMR Data - Case Study for Sepsis Management
300
150
400 400 400
100
0 0 0 0
0:00 1:00 2:00 3:00 0:00 1:00 2:00 3:00 0:00 1:00 2:00 3:00 0:00 1:00 2:00 3:00
Figure 2: Distributions of time-to-event (from the moment of presentation) for the four care elements. The blue histograms
represent the time to prescription, the red histograms represent the time to administration or collection. The horizontal axes
represent time (hh:mm), the vertical axes represent counts.
tion events conforming to the model are the same for volume expansion there are 1465 − 1461 = 4 pre-
as the number of (valid) events found in the time- scriptions that are logged, however not in the way an-
to-event analysis. For the administration/collection ticipated by the model. For antibiotics administration
events, we see different numbers of conforming we observe many (4309 − 252 = 4057) not conform-
events as compared to the numbers of events found ing events, which turned out to be caused by an order
in the time-to-event analysis. This is because the con- mismatch with the blood culture collection (i.e., an-
formance checking does not only take into account tibiotics administered before blood cultures were col-
presence of the events in the log, but also whether the lected). Potential reasons for these mismatches will
order is according to the model. Here we see, for ex- be discussed in the next section.
ample, that there are 4352 blood culture prescriptions
found in correspondence to the model versus 90 not;
similarly, 1229 volume expansions that are in corre- 4 DISCUSSION
spondence with the model. Note that volume expan-
sion is, following the guidelines, an optional step if In our analysis, we have first looked into time-to-
certain conditions are not met. event analysis, which looks at the number of events
logged and can derive various statistics from the
Table 2: Numbers of events found.
timestamps of these events. Although this can give
Event name N (%) a good insight into how processes are executed on
Admission 4442 (100.0%) average, and identify outliers with respect to time-
Discharge 4431 (99.8%) to-event, it does not take into account correct order
Blood culture prescr 4355 (98.0%)
Blood culture collect 4339 (97.7%) of events. Using process mining, and conformance
Antibiotics prescr 4324 (97.3%) checking in particular, we can also study the order
Antibiotics admin 4309 (97.0%) in which events occur and study deviations in more
Lactate prescr 4231 (95.2%) detail. One particular challenge that we tried to ad-
Lactate collect 3772 (84.9%) dress here, is that EMRs are general tools to support
Volume expansion prescr 1465 (33.0%) overall clinical processes and that fields in the EMR
Volume expansion admin 1463 (32.9%)
can be used for multiple conditions and are pathway
Volume expansion is only managed when clinically indicated (see also aspecific by design. Often patients are concurrently
Figure 1).
evaluated and treated for a variety of conditions, and
there is often little or no evidence of which data en-
If we now connect these numbers to the earlier tries relate to which diagnosis; this relation has to be
found number of events logged (Table 2), we can de- inferred. Also, it is important to stress that not all pa-
rive, e.g., that for 3772 − 3751 = 21 lactate collec- tient care activities are documented in the EMR.
tions there was a log-entry, however not in the order Before reflecting on the results obtained, we
prescribed by the model. Similarly, we can see that would like to emphasize that this experiment of gath-
589
ACP 2017 - Special Session on Analysis of Clinical Processes
Volume Volume
expansion expansion
prescr admin
1461/0 1461/0
Blood Blood
Antibiotics
culture culture
admin
prescr collect 252/4190
4355/87 4333/109
Antibiotics
prescr
4323/119
Figure 3: Output of conformance analysis in ProM, showing per event type the number cases that conform to that step in the
model versus that do not.
ering KPI information directly from EMR data with- timestamp all events. Imprecise timestamping can be
out a thorough, manual, quality analysis is likely to observed in the lactate collections where often only
provide an underestimation of guideline adherence date information was information. Incorrect times-
compared to reality. This is due to the following list tamping might be observed in, e.g., many antibiotics
of potential causes for our analysis not picking up ad- administration events that are found not conforming
herent behavior: to the model (4195 out of 4304). This is further sub-
• Not logged: Action has been performed but not stantiated by the notion that the clinical staff at the
logged hospital, at which the study was performed, is all well
aware of the fact that antibiotics influence the results
• Incorrect timestamping: Action has been per- of the laboratory measurements from the blood sam-
formed but with incorrect or imprecise timestamp ples. It might well be that there are differences in the
• Incomplete querying: The query used for inter- actual time of performing the event versus the mo-
preting the EMR data can miss certain cases ment of logging in the EMR, or alternatively that we
Hence, we should not interpret the outcomes of our made incorrect assumptions in the interpretation of
current analysis as quality measure for the care per- raw data. Further verification with the hospital’s qual-
formed before carrying out a more thorough quality ity assurance process is required to find the reason of
analysis. We are also reporting intermediate results, this mismatch.
and therefore cannot draw conclusions on the KPIs The treatment of sepsis in the ED is a particu-
themselves, but our focus is to share the challenges larly challenging environment as the condition is life
relating to process mining on ”real-life” EMR data. threatening and quick responses are required, which
Although the blood volume expansion does only we anticipated to potentially lead to problems in pro-
happen when clinically indicated, the relatively low cess mining with respect to the aforementioned qual-
number of blood volume expansion events, might ity issues. Despite that, we observed high levels of
suggest that our interpretation of the EMR data is not presence of events in the eventlog: at least 85% for
completely covering the different ways these events all obligatory events. The inherently diverse group of
are reflected in the EMR, rather than they are often not patients with sepsis poses a challenge to process anal-
prescribed, or that they are prescribed, but not logged. ysis techniques. We have shown that for a relatively
Further analysis is required to analyze the volume ex- simple model, we can successfully apply process min-
pansion management of these sepsis patients. In any ing techniques, with the ultimate aim of measuring
case, the quality of the logging influences the results. KPIs. This provides a good outlook in the possibili-
Bose et al. distinguish 27 classes of quality issues ties to also analyze the sepsis pathway at a finer grain.
with event logs (Bose et al., 2013). In our data, we It remains, however, topic of research what the opti-
observe presence of the following classes of issues: mal level of detail in the process modelling is for a
missing events, missing timestamps, incorrect times- given purpose. The heterogeneity of sepsis patients
tamps and imprecise timestamps. The first category might become more prominent in more detailed anal-
has been reflected upon already, the missing, incorrect ysis and require some form of clustering before per-
and imprecise timestamps typically reflect clinical re- forming process analyses on the subgroups. Patients
ality as it is simply not possible to 100% accurately can be clustered on patient or on process characteris-
590
Towards Process Mining of EMR Data - Case Study for Sepsis Management
tics (see, e.g., (de Medeiros et al., 2007)). that is in place in the hospital at hand. This actually
One particular issue that we faced when interpret- highlights a big limitation of the data driven analysis
ing the EMR data was that we observed the need to of processes in general: it is impossible from event
interpret the purpose of actions performed from the data alone to distinguish whether event logs are miss-
event logs rather than purely the actions themselves. ing due to actions not being performed, performed
As an example, the administration of fluid in itself actions not being logged or logged actions not being
can happen for a multitude of reasons, however in or- picked up by the data extraction and interpretation.
der to interpret whether volume expansion was per- For that reason, results should always be interpreted
formed, we had to monitor whether a certain amount with care and at least a randomized sample should be
of fluid was prescribed in a certain amount of time. analyzed through a formal quality assessment process
Similarly, for antibiotics we would like to know that in order to quantify the accuracy of the overall data-
they were prescribed and administered for the purpose driven analysis results.
of managing sepsis, however this intended purpose is Although our analysis shows high levels of avail-
not stored with the medication prescriptions. One way ability of time stamps (at least 85% per obligatory
of obtaining more information on the purpose of cer- event type), there is room for improvement. The qual-
tain actions performed is through careful analysis of ity of the event log generated from the EMR data
clinical notes, where typically the intend of the med- could be further improved by better support from the
ical staff is reflected. This will, however require the data entry module to allow for more accurate and
use of natural language processing (NLP) techniques timely data entry and the use of structured reporting
to be able to extract structured information from these over free-text notes. It should be noted, though, that
unstructured text data. Important to note in this re- this will remain difficult in busy environments such
spect is the lack of ground truth in such analysis of as the ER, where top priority is to provide acute care
EMR data; the only evidence of what happened with to the patient. It might require a change in the work-
the patient is the data in the EMR. Hence, the inter- flow to improve the precision of timestamps of time
pretation of raw EMR data should be given sufficient critical events such as lactate collection.
attention. Our present analysis is limited to a relatively small
and simple model to reflect sepsis care. Nevertheless,
this model allows already for analysis in terms of vari-
5 CONCLUSION AND FUTURE ous clinical KPIs. Future work includes the extension
of the model used for conformance analysis in order
WORK to assess the clinical pathway in further detail. In our
future aim of extending the model to cover more de-
We have shown that we can successfully use pro- tailed steps in the sepsis care pathway, we expect that
cess mining to follow selected events derived from the more elaborate data interpretation might be required.
main KPIs for the sepsis pathway purely from EMR While many steps have already been taken to digi-
data. However, no conclusion should be drawn about tize hospital data in structured fields, rich information
the actual quality of care or adherence to these guide- can also be found in non-structured text fields such as
lines before verification with the clinical quality as- clinical notes. The analysis of such data will require
surance process. It should be noted that it required a NLP approaches to reliably retrieve structured infor-
great effort in data preparation to create the event log mation from text. Being able to analyze adherence
and time-consuming manual quality checks to inter- to such a more detailed model would open up further
pret the EMR data in terms of the concepts required analysis of conformance to and deviations from the
for the pathway analysis. Using process mining tech- best practice. The application of process discovery
niques, we can analyze beyond the pure presence or techniques can also provide a bottom-up view of the
absence of events and also address correct versus in- process as it is performed by the clinical practition-
correct order with respect to a model that represents ers. A root cause analysis into the reasons for devia-
best practice. Applying these techniques on a dataset tion could help to further improve the guidelines and
gathered at a large Brazilian hospital, we could an- standard of care for sepsis.
alyze the data in terms adherence to the guidelines
provided by the SSC. The reason for deviation in or-
der of administering antibiotics and collecting blood
cultures, however requires further research. In gen- ACKNOWLEDGEMENTS
eral, further follow up with the quality department
would be required to quantify the accuracy of our as- We would like to thank the clinical and technical staff
sessment in comparison to the formal quality process at Hospital Samaritano for their help in collecting the
591
ACP 2017 - Special Session on Analysis of Clinical Processes
event data, as well as our colleagues from Philips Re- Kempker, J. A. and Martin, G. S. (2016). The Changing
search for making this work possible. Epidemiology and Definitions of Sepsis. Clinics in
Chest Medicine, 37(2):165–179.
Lord, J. M., Midwinter, M. J., Chen, Y.-F., Belli, A., Brohi,
K., Kovacs, E. J., Koenderman, L., Kubes, P., and Lil-
REFERENCES ford, R. J. (2014). The systemic immune response
to trauma: an overview of pathophysiology and treat-
ment. Lancet (London, England), 384(9952):1455–
Bone, R. C., Balk, R. A., Cerra, F. B., Dellinger, R. P., Fein, 1465.
A. M., Knaus, W. A., Schein, R. M. H., and Sibbald,
W. J. (1992). Definitions for Sepsis and Organ Failure Mannhardt, F., de Leoni, M., Reijers, H. A., and van der
and Guidelines for the Use of Innovative Therapies in Aalst, W. M. P. (2016). Decision mining revisited -
Sepsis. Chest, 101(6):1644–1655. discovering overlapping rules. In Nurcan, S., Soffer,
P., Bajec, M., and Eder, J., editors, Advanced Informa-
Bose, R. P. J. C., Mans, R. S., and van der Aalst, W. M. P. tion Systems Engineering: 28th International Confer-
(2013). Wanna improve process mining results? In ence, CAiSE 2016, Ljubljana, Slovenia, June 13-17,
2013 IEEE Symposium on Computational Intelligence 2016. Proceedings, pages 377–392. Springer Interna-
and Data Mining (CIDM), pages 127–134. tional Publishing, Cham.
Canadian Institute for Health Information (2009). In Focus. Mans, R., Schonenberg, H., Leonardi, G., Panzarasa, S.,
A National Look at Sepsis. Ottawa, Ont: CIHI. Cavallini, A., Quaglini, S., and van der Aalst, W.
de Medeiros, A. K. A., Guzzo, A., Greco, G., van der (2008). Process mining techniques: an application to
Aalst, W. M. P., Weijters, A. J. M. M., van Dongen, stroke care. Studies in health technology and infor-
B. F., and Saccà, D. (2007). Process Mining Based matics, 136:573.
on Clustering: A Quest for Precision. In Hofstede, Mcgregor, C., Catley, C., and James, A. (2011). A pro-
A. t., Benatallah, B., and Paik, H.-Y., editors, Busi- cess mining driven framework for clinical guideline
ness Process Management Workshops, number 4928 improvement in critical care. In In LEMEDS Work-
in Lecture Notes in Computer Science, pages 17–29. shop.
Springer Berlin Heidelberg. Rojas, E., Munoz-Gama, J., Sepúlveda, M., and Capurro,
Dellinger, R. P., Carlet, J. M., Masur, H., Gerlach, H., Ca- D. (2016). Process mining in healthcare: A literature
landra, T., Cohen, J., Gea-Banacloche, J., Keh, D., review. Journal of biomedical informatics, 61:224–
Marshall, J. C., Parker, M. M., Ramsay, G., Zimmer- 236.
man, J. L., Vincent, J.-L., and Levy, M. M. (2004). Silva, E., Pedro, M. d. A., Sogayar, A. C. B., Mohovic,
Surviving Sepsis Campaign guidelines for manage- T., Silva, C. L. d. O., Janiszewski, M., Cal, R. G. R.,
ment of severe sepsis and septic shock. Intensive Care de Sousa, E. F., Abe, T. P., de Andrade, J., de Matos,
Medicine, 30(4):536–555. J. D., Rezende, E., Assuno, M., Avezum, A., Rocha,
Dellinger, R. P., Levy, M. M., Carlet, J. M., Bion, J., Parker, P. C. S., de Matos, G. F. J., Bento, A. M., Corrła,
M. M., Jaeschke, R., Reinhart, K., Angus, D. C., A. D., Vieira, P. C. B., Knobel, E., and Brazilian Sep-
Brun-Buisson, C., Beale, R., Calandra, T., Dhainaut, sis Epidemiological Study (2004). Brazilian Sepsis
J.-F., Gerlach, H., Harvey, M., Marini, J. J., Marshall, Epidemiological Study (BASES study). Critical Care
J., Ranieri, M., Ramsay, G., Sevransky, J., Thompson, (London, England), 8(4):R251–260.
B. T., Townsend, S., Vender, J. S., Zimmerman, J. L., Singer, M., Deutschman, C. S., Seymour, C. W., Shankar-
and Vincent, J.-L. (2008). Surviving Sepsis Cam- Hari, M., Annane, D., Bauer, M., Bellomo, R.,
paign: International guidelines for management of se- Bernard, G. R., Chiche, J.-D., Coopersmith, C. M.,
vere sepsis and septic shock: 2008. Intensive Care Hotchkiss, R. S., Levy, M. M., Marshall, J. C., Martin,
Medicine, 34(1):17–60. G. S., Opal, S. M., Rubenfeld, G. D., van der Poll, T.,
Dellinger, R. P., Levy, M. M., Rhodes, A., Annane, D., Ger- Vincent, J.-L., and Angus, D. C. (2016). The Third In-
lach, H., Opal, S. M., Sevransky, J. E., Sprung, C. L., ternational Consensus Definitions for Sepsis and Sep-
Douglas, I. S., Jaeschke, R., Osborn, T. M., Nun- tic Shock (Sepsis-3). JAMA, 315(8):801–810.
nally, M. E., Townsend, S. R., Reinhart, K., Kleinpell, Torio, C. M. and Andrews, R. M. (2013). National Inpa-
R. M., Angus, D. C., Deutschman, C. S., Machado, tient Hospital Costs: The Most Expensive Conditions
F. R., Rubenfeld, G. D., Webb, S. A., Beale, R. J., Vin- by Payer, 2011: Statistical Brief #160. In Health-
cent, J.-L., Moreno, R., and Surviving Sepsis Cam- care Cost and Utilization Project (HCUP) Statistical
paign Guidelines Committee including the Pediatric Briefs. Agency for Healthcare Research and Quality
Subgroup (2013). Surviving sepsis campaign: in- (US), Rockville (MD).
ternational guidelines for management of severe sep- van der Aalst, W., Adriansyah, A., and van Dongen, B.
sis and septic shock: 2012. Critical Care Medicine, (2012). Replaying History on Process Models for
41(2):580–637. Conformance Checking and Performance Analysis.
European Pathway Association (2016). E-p-a definition of Wiley Int. Rev. Data Min. and Knowl. Disc., 2(2):182–
care pathway. http://http://e-p-a.org/. 192.
Jawad, I., Lukšić, I., and Rafnsson, S. B. (2012). As- van der Aalst, W. M. P. (2011). Process Mining: Discov-
sessing available information on the burden of sepsis: ery, Conformance and Enhancement of Business Pro-
global estimates of incidence, prevalence and mortal- cesses. Springer, Place of publication not identified,
ity. Journal of Global Health, 2(1):010404. 2011 edition edition.
592
Towards Process Mining of EMR Data - Case Study for Sepsis Management
593
Translating a Clinical Workflow into a Computer-executable Model
User Needs Discovery, Challenges and Lessons Learned
Abstract: Getting to technical requirements from user input is already a hard task in an environment where the workflow
processes are very well defined. When trying to extract a unique process from the users of such a variable
work environment such as a healthcare institution can be very challenging. In this paper, we share our
experience with extracting user requirements from clinical users by presenting the specific example of
transforming workflows into models that can then be used as part of an IT solution to support workflow
guidance. Here we present not only some of our main challenges when approaching different institutions and
professionals with different roles, but also some of the methods we find most useful to establish
communication and extract as much relevant information possible. In the end we explain some of the
differences between a workflow as explained by the users and a computer–executable model and how to make
the connection between the two.
594
Leitão, A., Caffarel, J. and Stretton, E.
Translating a Clinical Workflow into a Computer-executable Model - User Needs Discovery, Challenges and Lessons Learned.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 594-600
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Translating a Clinical Workflow into a Computer-executable Model - User Needs Discovery, Challenges and Lessons Learned
595
ACP 2017 - Special Session on Analysis of Clinical Processes
Forms into the local language and allowing - Interactive activity enabling participants to
time for reading and signing by the institution prioritise importance of pre-assumed
could take several weeks. We strive to send the needs, as well as creation of unthought-of
Participation Information Letter and the needs
Informed Consent in advance of the visit, to Questionnaires to derive quantitative results
ensure the participants have had time to read it related to the concepts explored with the users.
and consider their involvement. Whenever possible, we asked the users to walk us
(iii) Preparing the agenda: When planning the through their way of working, showing us how they
activities it is important to keep in mind time. interact with the clinical systems and indicating when
Healthcare professionals will typically have they would do this at various points of the care.
30-45 minutes to spend in the activities. Lastly, We had a variety of one to one and group settings.
the agenda request must be made to the Considerations when setting up group confrontations
hospital. In this request, there should be an are the following:
overview of the project, goals of the interviews, Size of group: 4-6 participants for 2 facilitators
and request for specific users for specific is an appropriate size, larger groups may have
amounts of time (for individual interviews and to be separated in sub-groups
group exercises). Roles within group: hierarchy and personality
may influence the interaction dynamics within
2.2 Exercises Used by the Team a group, for overall opinion on a concept, we
prefer to separate the groups according to role;
In this paper, we focus on the exercises carried out in mixing of roles can work well when
the first round of confrontation sessions with the complimentary perspectives about different
users. For this round, our main aim was to derive the aspects of a topic are sought
users’ main needs and challenges when it comes to Facilitation skills: the facilitator of the activity
supporting the implementation of Clinical Pathways should direct the involvement of participants
in practice. As we were still in our project definition when necessary, to ensure a fair representation
phase, our scope was large: we wanted to learn more of all participants in the discussions
about the topic from the users (general information on Discussion material: having material to discuss
how this is done in practice), from a variety of users (such as a concept video, screen designs, a
(from administrative to clinical and managerial staff) conceptual poster) can help the conversation
and from all phases of Clinical Pathways (from the along, as a starting point or as a way to focus
creation of pathways, the use at the point of care to the participants on the topic matter.
the evaluation reporting). With this in mind, we Overall, we derived a lot of useful information
devised a number of activities: from the users, which ranged from scoping a
landscape of realities and challenges from various
Interviews to understand the users’ and
hospitals with varying levels of maturity when it
institutions’ realities and scope the landscape
comes to implementing Clinical Pathways; all the
of Clinical Pathways as it stands today in
way to having a much clearer picture of the roadmap
clinical practice
we needed to create in order to meet the most pressing
A model building exercise, where we asked
needs of the users.
the participants to build a pathway of their
Some pitfalls we encountered were:
choice and take us through their routine to help
Broad scope and limited time meant that some
us identify elements common to various topics could not be deeply explored
pathways as well as routine bottlenecks and Tight planning meant that not all exercises
deviations from the set pathway could be conducted with all users
Confrontations of our work and assumptions: Questionnaire not specific enough to provide
- Review of a generic model we created, to significant added value on top of qualitative
get some validation on the modelling of the results
pathways Unexpected changes in times and personnel
- Feedback on user interface designs for use available for participation in the activities.
in supporting clinical and administrative
workflow to verify some assumptions we Our recommendations include:
made on information needs for clinical Be clear within the team on the objectives of
users when it comes to needing to track each exercise
and care for a patient on a pathway
596
Translating a Clinical Workflow into a Computer-executable Model - User Needs Discovery, Challenges and Lessons Learned
Dry-run the activities with colleagues or proxy People. Not only is there variation in the
users not involved in your project to ensure availability of staff, but also in the interaction
instructions and questionnaires make sense between different types of professionals among
before finalisation the different institutions. As an example, in
Double check translations (back translation if some hospitals strict hierarchy may be the norm
possible) to ensure that the meaning is retained. (e.g. in one institution nurses may be
This might seem quite obvious but it is often empowered to put a patient in a clinical
dismissed specially when using official pathway whereas in another this may only be
translators. It is important to make sure the done by a clinician). This has a big impact not
interpretation is the same for all readers no only on the identification of who should be
matter the language. involved in a task but also on the attribution of
Perform debriefing within the team as authority and permission for decision making.
frequently as possible, at least at start and end This is so far the hardest factor that can affect
of each day, and if possible, in between not only the way the exercises are done during
activities especially in the first days to ensure the user interactions but also can have a big
that the activities can be refined as the impact on how an IT solution will be used in
interviews progress. the institution. If you are looking to create a
solution which could be used in different
Finally, keep in mind that structured activities and institutions it is important to identify all the
questionnaires are important to ensure focus is not potential users, how they interact and who will
lost, but ability to improvise and follow the be the potential main users (which can include
participants’ train of thought in a semi-structured different type of professionals)
interview format can often be invaluable to discover Impact of geographical, organisational and
user needs the team had not thought of or planned for. legislation factors on the level of maturity of
clinical processes. By association, institutions
2.3 Challenges of Interaction with the that are involved with certification
Users organizations and medical societies usually
have very clear ways of working which are
The first challenge of interacting with users on an based on best practices. This is also very
international level is communication. It is imperative closely related to differences in implementation
that the professionals that are participating in the of health services between different
discovery activities, fully understand what is institutions, regions and countries. In countries
presented so that your questions can be answered in where there are little or no public healthcare
the end of the exercises. institutions except for the primary care
To facilitate the understanding and better facilities, most Hospitals and private
communication we try to provide all the material and institutions will rely on certifications to
conduct all the activities in the language of the users, distinguish themselves from others. In the case
whenever possible. of countries where the Healthcare service is
Also, it is important to keep in mind that the realities very well managed by the government and
differ among institutions so the speech should be advances, chances are that standardization and
adapted to the reality of each institution and certification processes are stimulated if not
professional. You should always take into required by the government to guarantee the
consideration the following factors: minimum quality of services.
Technical resources. Not all institutions have Knowledge. It is easy to assume that different
the same resources, such as, imaging machines, types of professionals have different levels of
beds or medications. This has a very high knowledge. While that is true on a high level
impact on how the tasks are done, meaning that and most people have greater knowledge on
the same step in a process can be executed in their roles rather than on that of others, it is
different ways and sometimes even include a good to not only explore their roles, but also
third party institution who provides the how they interact with and perceive the roles of
resource. A good model based system can help others in the organisation. When approaching
not only to optimize the existing resources but users from different institutions, cities or even
also to find the best workflow using the countries, we must take in consideration their
resources available at each institution. knowledge not only regarding technology (how
597
ACP 2017 - Special Session on Analysis of Clinical Processes
familiar are they with the latest technology and together to share findings and debate if the
how they use it in their work) but also on the insights resonated with one or more
content level. As mentioned before, the interviewees before including this as relevant
involvement of the professionals with the latest insights for our results.
news on best practices will also define how
prepared they are to understand the concept to Concerning Clinical Pathways, a main insight that
be discussed during the user interactions. And was drawn from our study with users is how to bridge
as rewarding as it may be to involve Key the technical viewpoint and the user viewpoint: there
Opinion Leaders who are very much up to date are really two aspects to workflow modelling. One
with state of the art and best practices in the level are the workflow elements needed for user
area you want to discuss, it can be even more interaction to support them in their daily work; the
insightful to talk with users who have less or other level are those workflow elements which are
little knowledge of the theoretical aspects so essential to the user to follow a Clinical Pathway, but
that you can understand the real practical issues may not be relevant to model in technical terms,
the end-users are actually confronted with. either because it is not measurable or is difficult to
Nonetheless, it is good practice to assume the model, e.g. due to lack of evidence in the clinical IT
users know very little about the topic, and be systems.
prepared with a good but not restrictive
definition of the concept you want to present.
3 FILTERING KNOWLEDGE
INTO REQUIREMENTS
The main challenges we have had are:
How to transform information collected from
users into requirements usable by the technical
team?
How to ensure that the collected needs and
corresponding requirements are in some way
weighted to reflect the input from the variety of
users we interacted with?
To address the above, we employed a number of
methods, which included use of:
Raking/Rating systems where possible, e.g.
when confronting 3 user interface designs,
beyond asking for specific feedback, we also
asked the users to classify the designs from
their preferred one to least preferred one; for
the pre-assumed needs list, we asked the users
to rate each requirement as necessary, nice to
have, or not necessary
Quantitative data analysis wherever possible;
e.g., for the pre-assumed needs list, we
calculated a weighted average across the
groups and used this to rank the requirements Figure 1: Simplified clinical process example as it would be
in order of importance, which gave an objective described by the user. The boxes in grey represent the
perspective on the relative importance of the activities in the clinical process which are essential for the
rated requirements users to carry out the process but only essential to the people
Consensus technique whereby we analysed the carrying out the task and not the model; or not captured in
results of the interviews by first having a round the IT system because non-measurable or not included in
of insights extraction from our notes at an the IT documentation of the process.
individual interviewer level, before coming
598
Translating a Clinical Workflow into a Computer-executable Model - User Needs Discovery, Challenges and Lessons Learned
Taking the example of a high level description of In the end we are left with only the steps which
a clinical process as described by a user such as the can be detected from or triggered using specific
one in Figure 1, we can identify 5 steps identified in activities of the EMR. And while this might bring
grey, of such type, e.g., the communication some value in terms of process evaluation using the
interaction whereby the conversation process is more EMR, it is not so useful if we are trying to support
important than the actual data exchanged. In the same and stimulate the users to follow guidelines or
example we have the visual triage which is not processes using an abstract process model where the
measurable since it is done mostly following the same type of task can have different meanings and
professionals’ instinct and experience and it is not relevance.
associated with any record in the EMR; or activities We believe that a model that reflects the habits
such as “collection of samples” which are not and routines of the professionals and not just the steps
captured in the EMR because so far, when the EMR / recommendations of the protocols / guidelines /
is used mainly for documentation of patient medical pathways is the key to make a process support tool
data, there was no need to capture such process- operational and usable in clinical practice. That is, a
related information. model which guides the users into doing the right
The same model can be translated into a machine thing using more than just the steps that are recorded
executable model, including only the steps that can be in the EMR but also including those necessary for
found or recorded using the EMR, which would look their own routines. Such an ideal model based
more like the model presented in Figure 2. Here we solution would be the one that is capable of providing
can see loops appear in the place of a step by step the support for the human only tasks mentioned in
flow. While the user feels the need to represent every Figure 1, that usually have no place for representation
step of the process as being unique, when mapping in the EMR (e.g. nurse calls the lab to check status of
these to the EMR the distinction loses relevance. For sample analysis), even if they are not driving the
example we can say that “Medical Evaluation” and reasoning of the process. This support can be given
“Evaluation of results” are the same task since these not only by making the association between the
are represented by a new iteration of a clinical note in modelling tools with Clinical Decision Support
the EMR. Systems (CDS) but also organizational tools just like
Another big difference between a model described communication, schedule assistance tools or others.
by a clinical user and a technical model as the one of A severe limitation of modelling clinical processes
Figure 2 is the detail and grouping of steps. We can, (whether prospectively or derived from process
for example, remove the “Suspected Diagnosis” step mining) is the ability to derive representative models
described by the user as this is usually included only despite some essential activities not being represented
as part of the clinical note. Also, steps that are in in the event dataset.
distinct areas of the EMR and can be done in different Concerning those activities that are not possible to
contexts outside the flow described by the user can be model due to lack of evidence in the IT system,
represented as sub-processes. For this we have the these are essential to be aware of as this may imply:
example of the “Diagnostic sub-process” or the an incorrect (incomplete) representation of the
“Treatment sub-process” which can be done in a process when performing process discovery.
different order or sequence than the one of Figure 1 Which consists in applying process mining
when used in a different patient or clinical context. algorithms to an event log based on the
information from the Hospital’s EHR database,
to discover a process model. (van der Aalst, W.,
2016)
a necessary change to the IT system which may
have an impact on the workflow when trying to
derive a process model for real-time tracking of
process activities.
The latter has implications that go further than the
mere addition of a few requirements to the IT
solution: if the additional events cannot be captured
automatically, this will imply additional input from
Figure 2: Simplified clinical process example as it would be the users affecting their workflow and potentially
used in the backend. adding burden to the overall process. If the
workflow is affected, this would also call for other
599
ACP 2017 - Special Session on Analysis of Clinical Processes
measures such as co-creation with the users and Böckmann, B., Heiden, K. 2013. “Extracting and
change management leading up to and during Transforming Clinical Guidelines into Pathway Models
introduction of the technology to ensure acceptance for Different Hospital Information Systems.” Health
and good uptake of the solution. Information Science and Systems
1:13.doi:10.1186/2047-2501-1-13.
Coiera, E., 2000. “When Conversation Is Better Than
Computation.” Journal of the American Medical
4 CONCLUSIONS Informatics Association 7 (3): 277.
doi:10.1136/jamia.2000.0070277.
Dadam, P., Manfred R., Klaus K. 2000. “Clinical
Deriving clinical processes based on data available in
Workflows — The Killer Application for Process-
EHRs is a challenge for a number of reasons: different Oriented Information Systems?” In BIS 2000: 4th
hospitals are likely to implement similar processes in International Conference on Business Information
different ways due to different resources available Systems, PoznaĔ, Poland, 12–13 April 2000, edited by
and local constraints; not all process activities may be Witold Abramowicz and Maria E. Orlowska, 36–59.
directly extractable from the data, due to lack of London: Springer London. http://dx.doi.org/
documentation or impossibility to capture in a 10.1007/978-1-4471-0761-3_3.
structured format; any additional process-related data Jamoom, E. W., Heisey-Grove, D., Yang, N., Scanlon, P.,
which needs to be acquired may be seen as an 2016. “Physician Opinions about EHR Use by EHR
Experience and by Whether the Practice had optimized
additional burden on the users and may impede the
its EHR Use” Journal of Health & Medical Informatics
actual process we are trying to support. When 7 (4) OMICS International., ISSN: 2157-7420.
extracting knowledge from users to determine Latoszek-Berendsen, A., Tange, H., van den Herik, H.,
relevant events from data or to derive process models, Hasman. A. 2010. “From Clinical Practice Guidelines
one must be aware of the different realities of each to Computer-Interpretable Guidelines. A Literature
setting and user’s role, and try to capture the overall Overview.” Methods of Information in Medicine 49 (6):
process by approaching the various stakeholders that 550–70. doi:10.3414/ME10-01-0056.
often work together to make the entire clinical Mans, R., van der Aalst, W., Vanwersch, R., 2015. Process
process a reality. Mining in Healthcare: Evaluating and Exploiting
Operational Healthcare Processes; Springer.
It is really important to find a balance between the
Ologeanu-Taddei, R., Morquin, D., Domingo, H., &
tasks that need to be represented and shown to the Bourret, R., 2015. “Understanding the acceptance
user and the tasks that can be automated relieving factors of an Hospital Information System: evidence
burden from the user. For a good workflow support from a French University Hospital.” AMIA Annual
system we do not necessarily need to present all the Symposium Proceedings, 2015, 1001–1007.
steps of the process to the user nor represent in the Oosterhout, E., Talmon, J., Clercq, P., Schouten, H., Tange,
model all the intermediate steps that are taken by the H., Hasman, A., 2005. “Three-Layer Model for the
user. More than a good model, you will need extra Design of a Protocol Support System.” MIE 2003 74
support systems that can fill the gaps and fix the (2–4): 101–10. doi:10.1016/j.ijmedinf.2004.04.023.
Staccini, P., Joubert, M., Quaranta, J., Fieschi, D., Fieschi.
bottlenecks of the workflows.
M., 2001. “Modelling Health Care Processes for
Eliciting User Requirements: A Way to Link a Quality
Paradigm and Clinical Information System Design.”
ACKNOWLEDGEMENTS International Journal of Medical Informatics 64 (2–3):
129–42. doi:10.1016/S1386-5056(01)00203-9.
van der Aalst, W., 2016. “Process Mining: Data Science in
We would like to thank the participants in our
Action”, Springer.
research study for time and valuable input, as well as
our colleagues from our Research project for making
this work possible.
REFERENCES
Ash, J., Bates, D., 2004. Position Paper. “Factors and
Forces Affecting EHR System Adoption: Report of a
2004 ACMI Discussion” Journal of the American
Medical Informatics Association 2005; 12:8–12.doi:
10.1197/jamia.M1684.
600
Process Improvement in an Oncology Day Hospital: Design of a
Traceability and Indicator System
Abstract: Day hospitals (DH) are organizational structures that enable the supervision of patients who must go through
diagnosis methods or treatments taking several hours, but not requiring inpatient hospitalization. Oncology
Day Hospitals (ODH) are a particularly complex subset of DH, due to the variety and type of pathologies that
are treated in them, the characteristics of cytostatic drugs, the involvement of different hospital units and
professional profiles, the number of stages of the care procedure and the cost. In this paper, we describe the
design of a traceability and indicator system for ODH, which aims at improving the performance and quality
of service, providing three-folded benefits for patients, practitioners and hospital managers. The system is
currently being tested in a public hospital in the Autonomous Community of Madrid. Their users perceive
that they have access to a much more accurate fingerprint of everyday workflow, thus facilitating the design
of improvement actions.
601
Cañada, E., Casado, E. and Bernardos, A.
Process Improvement in an Oncology Day Hospital: Design of a Traceability and Indicator System.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 601-608
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
ACP 2017 - Special Session on Analysis of Clinical Processes
The TIS has been built on already available resources (seat, bed, pump, etc.) are ready, the 4)
information that was not being retrieved in an easy- patient is admitted to the ODH for the 5) drug
to-visualize way. The system aims at delivering three- administration. When the treatment is over, the
folded benefits: for the patient, to reduce and lighten administrative staff in charge proceeds to the 6)
the time at the ODH; for the clinician, to facilitate the patient discharge, who leaves the hospital. Figure 1
retrieval of real-time information about the workload summarizes the full workflow.
and improved agenda management thanks to the In practice, during all the process, it is needed to
existence of accurate and reliable indicators; for the do a follow up of the patients, personnel, resources
manager, to facilitate the design of actions to raise of and drugs. This tracking involves four Hospital Units:
the perceived quality of service and to handle ODH, Laboratory, External Consultations and
bottlenecks and process problems, so the impact of Pharmacy. The professional profiles participating in
the investments agenda can be better evaluated. the workflow are oncologist (FAC), pharmacologists
In this context, the paper is structured as follows. (PHAR), health staff (NUR), administrative staff
Section II describes the operation workflow at the (ADM) and ancillaries (ANC).
ODH and the subsequent TIS’ functional and non- As our objective is to build a traceability and
functional requirements. Section III describes the indicators system (TIS) that may report a real-time
deployed architecture and the customized real-time picture of the ODH operation and a full view of the
visualization interface. Section IV describes the service performance, it is important to analyze which
indicators. Finally, Section V concludes the work, milestones may be automatically retrieved through
stating the impressions gathered about the system and the APIs provided by the commercial information
defining further steps. systems that are already deployed in the Hospital. In
the particular case of Hospital Universitario Infanta
Sofía, these systems include the Hospital Information
2 OPERATIONAL CONTEXT System (Selene from Siemens), the Pharmacy
Information System (FarmaTools from Dominion)
and the Laboratory Information System (LIS-
2.1 Workflow Analysis ServoLab from Siemens). Apart from those, an
Appointment and Queue Tracking System for
A standard visit of a patient to the ODH is as follows:
consulting rooms (AQ-Quenda from Plexus
on arrival, the patient goes directly to take the 1)
Technologies) is also in use.
preliminary blood tests. After that, they head to the 2)
Table 1 summarizes all the events in the operation
medical consultation, where the practitioner
workflow. As the reader will notice, there are events
examines the overall situation and prescribes the
that are not being registered (e.g. when the patient
cytostatic drugs. The cytostatic drugs are then 3)
enters the hospital or the NUR takes blood), and some
prepared at the Pharmacy Service and sent to the
others that are still being registered in manual way,
ODH for dispensation. When the cytostatic drugs are
thus their timestamps cannot be directly integrated
prepared and delivered at ODH and the needed
into the TIS.
602
Process Improvement in an Oncology Day Hospital: Design of a Traceability and Indicator System
603
ACP 2017 - Special Session on Analysis of Clinical Processes
604
Process Improvement in an Oncology Day Hospital: Design of a Traceability and Indicator System
Figure 3: a) Main dashboard for traceability. From the fourth column on, it is possible to find the timestamps for the 10 jobs
in Table 2. The 11th job generates the alerts, marked as blocks in orange. In the top right corner of the Figure, a shortcut to
filter the available agendas is provided.
Everyday at 7:00 am, a cron job initiates the provides a business intelligence tool that summarizes
patients’ registry for the day, by using the agendas of a set of relevant key indicators, which can be
the ODH and the monographic agendas (related to the classified into four different groups: a) activity, b)
oncology specialties) or nominative ones (related to performance, c) procedural and d) quality of care
specific practitioners). Cron jobs are executed each 5- indicators.
10 minutes (configurable time), updating the data for Activity indicators reflect the day dynamics at the
real-time visualization and feeding the indicators’ Oncology Service (both at ODH and consultations).
database. These six indicators are directly accessible from
Access and interface personalization is carried out the interface in Figure 3 and include aspects such as
through IP control. ODH or Consultation users can snapshot of number of active patients in ODH and
access the ODH TIS through any browser in an patient distribution per agenda (in ODH and
authorized computer. The main interface, in Figure 3, consultations), protocol, visit type and treatment type.
is daily initialized and dynamically completed Table 3 shows an example of a protocol indicator, in
throughout the day, it starts “growing” when the ODH particular the one in which each chemotherapy
activity begins. The interface provides visual alerts protocol for a given cancer type is retrieved (an
(in orange) indicating when issues occur in the example of protocol is FOLFOX – oxaliplatin,
workflow. These alerts are informative up to now, fluorouracil, folinic acid - for gastric cancer).
being generated e.g. when “the laboratory results are
taking too long” or “the patient is not in the next step Table 3: Activity indicator example.
of the workflow”. In the future, it is desired that these
Activity indicator no. 4
alerts may trigger automatic or supervised responses,
Scope ODH, Oncology Consultations
such as “recall results from the laboratory” or “send a
and Pharmacy.
notification to the patient”.
In the right side of the real-time interface, there Definition Patient distribution per protocol.
are several options that enable to parametrize the TIS, Info. source Selene Replica, FarmaTools
showing information from a) all the agendas, only Formula Query that retrieves the total
from the ODH agendas or the Oncologists number of patients in the agendas
Consultations agendas, b) detailed information about of a) ODH (non-scheduled
the patient and c) day indicators. patients included) and b)
Oncology Consultations,
classified by protocol.
4 REPORTING Goal To be defined by the evaluator /
manager.
Apart from the visualization interface, the TIS
605
ACP 2017 - Special Session on Analysis of Clinical Processes
Table 4: Performance indicator example. Figure 4 shows the components for the extract,
transform and load (ETL) process necessary to
Performance indicator no. 8
generate the indicators. All these data are stored in the
Scope ODH
MySQL database and queried from a PHP service that
Definition Average stay duration at ODH.
uses Google Chart libraries to generate the final
Info. source Selene Replica, MySQL indicators
interface. Everyday, a cron job captures the main
database
dashboard screen of the traceability system and
Formula Query, average duration of
admitted patients in ODH. emails it to the designated receivers (e.g. Director of
Goal To be defined by the evaluator / the Oncology Service).
manager.
606
Process Improvement in an Oncology Day Hospital: Design of a Traceability and Indicator System
607
ACP 2017 - Special Session on Analysis of Clinical Processes
opinion about the best means and configuration improvement and economic sustainability. Am J Health
of alerts. Syst Pharm, 71(7), pp.579-85.
An important issue is related to human factors: to Galligioni, E., Berloffa, F., Caffo, O., Tonazzolli, G.,
assure the full exploitation of the visualization tool Ambrosini, G., Valduga, F., Eccher, C., Ferro, A. and
Forti, S., 2009. Development and daily use of an
for real time patient-flow management purposes wide electronic oncological patient record for the total
acceptance within the health team is needed. All management of cancer patients: 7 years' experience.
health staff members need to understand the ultimate Annals of Oncology, 20(2), pp. 349-352.
instrumental goal, focused on improving delivery of
quality of care and not staff monitoring. Specific
communication initiatives are needed to guarantee
that this fact is correctly understood. In this sense, the
involvement of navigator nurses in key steps control
has been shown of great help. In the next months, it is
expected that the tool is integrated in the daily activity
of the ODH and improved following the users
suggestions.
Taking into consideration this TIS, another tool is
currently being designed to monitor the workflow in
the 200 hospital consultations, so delay times and
bottlenecks can be identified.
ACKNOWLEDGMENT
Authors want to acknowledge the Hospital
Universitario Infanta Sofía Management for the
support to this initiative.
REFERENCES
Queralt M., Frías M.C., de Pedro, V., Ramírez, J., Mesalles,
M. 2015. Sistema de trazabilidad integral de
administración de citotóxicos. Boletín de Prevención de
Errores de Medicación de Cataluña, Vol. 12, no.4.
Kergosien, Y., Tournamille, J.F., Laurence, B. and Billaut,
J.C., 2011. Planning and tracking chemotherapy
production for cancer treatment: A performing and
integrated solution. International journal of medical
informatics, 80(9), pp.655-662.
SIAE (2015). Información estadística de hospitales.
Estadística de Centros Sanitarios de Atención
Especializada (National statistic information about
hospitals). Available at: https://www.msssi.gob.es/
estadEstudios/estadisticas/estHospiInternado/inforAn
ual/homeESCRI.htm.
Sini, E., Torresani, M., Locatelli, P., Restifo, N. and
Facchini, R., 2011. Information and communication
technologies enable a comprehensive governance of
patient safety in chemotherapy. An Italian framework
project. In 24th International Symposium on Computer-
Based Medical Systems (CBMS) (pp. 1-7). IEEE.
Masini, C., Nanni, O., Antaridi, S., Gallegati, D., Marri, M.,
Paolucci, D., Minguzzi, M. and Altini, M., 2014.
Automated preparation of chemotherapy: quality
608
S HORT PAPER
ICT: Health’s Best Friend and Worst Enemy?
Keywords: ICT, Health Problems, Stress, Black Plague, Affective Computing, Emotion, Personality, Coping.
Abstract: I propose a paradigm shift for health care, as there is an urgent need for i) continuous (semi-)automatic medical
checkups, ii) cost reduction, and iii) cure for the 21st century black plague (i.e., stress-related diseases) are
very much needed. To realize this ICT’s Paradox has to be solved. On the one hand, ICT can cause i)
musculoskeletal problems, ii) vision problems, iii) headache, iv) obesity, v) stress disorders (e.g., burn out),
vi) metabolic issues, vii) addiction (e.g., to games, social media, and Internet), viii) sleeping problems, ix)
social isolation, and x) an unrealistic world view. On the other hand, ICT claims to provide these problems’
solutions. Consequently, health informatics needs to adopt a holistic approach, improve its fragile theoretical
frameworks, and handle the incredible variance we all show. As a remedy, I propose to take up the challenge
to next-generation models of personality, as they are a crucial determinant in people’s stress coping style.
611
Broek, E.
ICT: Health’s Best Friend and Worst Enemy?.
In Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017) - Volume 5: HEALTHINF, pages 611-616
ISBN: 978-989-758-213-4
Copyright c 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
ACP 2017 - Special Session on Analysis of Clinical Processes
612
ICT: Health’s Best Friend and Worst Enemy?
ii) musculoskeletal problems (Åborg and Billing, trails are absent or conducted at a small scale, and so-
2003; Gowrisankaran and Sheedy, 2015), in- lutions are at a gadget level, instead of at the level
cluding Repetitive Stress Injury (RSI) 1 ; of aimed clinical solutions. Many roads can be fol-
iii) vision problems (Salibello and Nilsen, 1995; lowed to remedy this practice. The problem lies is
Gowrisankaran and Sheedy, 2015); the increasing tendency to just see what the computer
shows. (van den Broek, 2012)
iv) headache (Salibello and Nilsen, 1995; In the next section, I will pose one critical con-
Gowrisankaran and Sheedy, 2015); cept for health informatics, complementary to the
v) obesity (de Jong et al., 2013; Schmiege et al., prerequisites defined before (van den Broek et al.,
2016); 2009; van den Broek et al., 2010a; van den Broek
et al., 2010b; van den Broek et al., 2010c; van den
which can be complemented by: Broek et al., 2011): personality. Par excellence,
this concept illustrates affective computing’s three-
folded complexity, as depicted in Section 1. More-
vi) metabolic issues, such as vitamin deficien-
over, health informatics is also the claimed road to-
cies (Palacios and Gonzalez, 2014) and diabet-
wards next-generation personalized medicine (Poon
ics (de Jong et al., 2013);
et al., 2013). How can this be, if clients personalities
vii) addiction (e.g., to games, social media, and In- are ignored?
ternet (Zhou et al., 2017);
viii) sleeping problems (Beun, 2013; Nuutinen
et al., 2014); 3 PERSONALITY
ix) social isolation (Cacioppo and Hawkley, 2003;
Liu and Baumeister, 2016); and The urge to completely redesign our health care sys-
x) an unrealistic world view (e.g., resulting in de- tem relies on a both crucial and often ignored deter-
pression) (Donnelly and Kuss, 2016; Wood minant: personality. For each of the three reasons for
et al., 2016). this call for a paradigm shift, I will explain why per-
sonality is an essential part of the equation:
Note that, compared to Stigliani (1995)’s original list,
this list includes both more indirect ICT-related and i) Next-generation medical check-ups are per-
more mental health problems. sonalized. However, solely the medical check-
If any ICT branch should be health’s best friend, up does not help; in particular, healthy peo-
it is health informatics. In solving its challenges, ple have to be persuaded to start, improve,
health informatics relies on both clinical experience or maintain a healthy living style. Tailored
and knowledge of public health systems and organi- health messages are needed, next-generation
zations, while conducting experiments, interventions, customized (semi-)automatic ICT-based com-
and scalable approaches. (Kulikowski et al., 2012). munication (Kreuter et al., 2012).
Par excellence, ICT’s health informatics, should con- ii) I proposed to implement Mandl and Kohane
tain the identified computer-related health problems. (2016)’s patient-control paradigm and extend
From an ethical point of view, the ICT community it to people-health control to realize cost re-
should even consider this as one of its main priorities. duction; that is, ask people themselves to col-
When going through scientific literature, health lect their data. This requires sincere cooper-
informatics seems to have solved all ICT-related ation from people, as they are asked to con-
health problems. For example, musculoskeletal prob- tribute to their own electronic health records.
lems can be prevented using persuasive technol-
iii) The 21st century black plague is directly
ogy (Wang et al., 2014), the problem of obesity
linked to people’s coping style and, hence, per-
is approached similarly (Wang et al., 2014), as are
sonality (Zhou et al., 2017). “Coping is of-
headache (Minen et al., 2016), diabetics (Georga
ten defined as efforts to prevent or diminish
et al., 2014), sleeping problems (Beun, 2013), and so-
threat, harm, and loss, or to reduce associ-
cial isolation (Chen and Schulz, 2016). So, it seems
ated distress. Some prefer to limit the con-
to be a case of “One size fits all” (Suomi, 1996).
cept of coping to voluntary responses; others
However, many solutions are fragile, random control
include automatic and involuntary responses
1 Note. Stigliani (1995) mentioned RSI as separate entry. within the coping construct. . . . Personality
However, essentially it is a musculoskeletal problem and, does influence coping in many ways, however,
hence, placed here under this entry. some of which occur prior to coping. Even
613
ACP 2017 - Special Session on Analysis of Clinical Processes
prior to coping, personality influences the fre- based on it. This requires a well-argued combination
quency of exposure to stressors, the type of of lab and field data and, most likely, a merge of quan-
stressors experienced, and appraisals” (Carver titative and qualitative data (Fine and Elsbach, 2000;
and Connor-Smith, 2010). McCusker and Gunaydin, 2015).
With a foundation provided for personality’s key role
in the proposed paradigm shift, I will now sketch its
history, challenges as well as a solution approach. 4 CONCLUSION
In this article, at a functional level, I will take
a methodological perspective to personality and de- Health care is vibrant and yet conservative, a highly
scribe it in terms of its research traditions (or ap- complex field of science, engineering, and practice.
proaches) (Pervin, 2003): As is argued in Section 1, its foundations should be
i) clinical (e.g., including Freud’s work); reconsidered. ICT, and in particular, health informat-
ics, can play a crucial role in this process. However,
ii) statistical (e.g., the big-five (BF) model); and the stakes are high, including potentially big losses as
iii) experimental (e.g., including the work of well as big gains, as is discussed in Section 2, which
Wundt, Pavlov, and Skinner). makes such endeavor even more challenging. With
Clinical approaches to personality allow a holistic ap- paradigms such as personalized medicine and mobile
proach, while observing a great variety of phenom- health, the client is put central. However, so far the
ena, using self-reports and behavioral observations. client’s personality has been ignored (see Section 3). I
As such they satisfy two of the three dimensions of pose that the clinical tradition of personality research
complexity (i.e., holistic approach and explain the should be embraced by health informatics, realizing
huge variance). However, clinical approaches to per- that this would require a firm step back to enable the
sonality fail in the third dimension of complexity: so much needed steps forward.
generation of solid theoretical frameworks, as reliable As is illustrated via this article’s relatively
observations and tests of hypotheses are complicated lengthly list of references, an interdisciplinary, holis-
if possible at all. Statistical approaches to personality tic approach was taken. Nevertheless, many issues
focus on individual differences, using trait question- remained untouched. For example, social and cul-
naires instead of self-reports. This practice enables tural (Kaplan, 2017) and psychosocial issues (Kun,
statistical analysis of the relation between personal- 2016) should be considered on top of the evident
ity traits and other variables. However, this approach privacy and security concerns (Blobel et al., 2016).
suffers from studies on non-representative samples An analysis of the current state-of-the-art of elec-
(e.g., students) and a lack of both generalizability and tronic health records would have been appropriate as
specificity. The statistical approach can provide the- well (Wuyts et al., 2012; Stylianou and Talias, 2017).
oretical frameworks; but, fails to take a true holistic Moreover, a discussion on computational techniques
approach and simplifies reality and, hence, is unable for personality models at a functional level would
to explain the existing real world variance in personal- have been in place (cf. (Huys et al., 2016; Adams
ity traits. Experimental approaches to personality rely et al., 2016)). However, this article’s list of references
on laboratory studies on cause-effect relationships, provides a good starting point.
as such they are the opposite of clinical approaches. Health informatics is struggling, already since its
They violate the holistic approach and cannot explain recent conception (Kulikowski et al., 2012; Nelson
the huge variance of the real world. However, they and Staggers, 2018). Omnipresent computing power,
comply to the third dimension of complexity: gener- big data, rapidly improving sensor technology, and
ation of solid theoretical frameworks. our extended lives, have put it in the top list of so-
Models and theory used in affective computing ciety’s health agenda. This is a promising trend; but,
are heavily skewed towards the statistical approaches as posed, significantly more mass is needed to change
(cf. (Vinciarelli and Mohammadi, 2014)). To some the field’s paradigm and see all humans as clients, in-
extent this makes sense as the statistical approaches stead of only those who are already patients.
are most straightforward to model (e.g., using ma-
chine learning or general linear models). Although
understandable from a pragmatic stance, the above ACKNOWLEDGMENTS
analysis of the three research traditions of personal-
ity makes it hard to justify this position. I propose to I thank the two anonymous reviewers, who provided
reconsider and improve the clinical approach to per- excellent comments on an early draft of this arti-
sonality, such that computational models can be build cle. Moreover, I thank Winnie Teunissen for carefully
614
ICT: Health’s Best Friend and Worst Enemy?
proof reading of the pre-final version of this article. tics for integrating qualitative field data with quantita-
Last, I thank Gert-Jan de Vries for his invitation to tive lab data. Journal of Experimental Social Psychol-
present this article at his special session. ogy, 36(1):51–76.
Follmer, E. (2016). What we do to fit in: personality, cop-
ing, and Person-Environment fit. PhD thesis, Graduate
College, The University of Iowa, Iowa City, IA, USA.
REFERENCES Georga, E. I., Protopappas, V. C., Bellos, C. V., and Fo-
tiadis, D. I. (2014). Wearable systems and mobile ap-
Åborg, C. and Billing, A. (2003). Health effects of ‘the plications for diabetes disease management. Health
paperless office’ – evaluations of the introduction of and Technology, 4(2):101–112.
electronic document handling systems. Behaviour & Gowrisankaran, S. and Sheedy, J. E. (2015). Computer Vi-
Information Technology, 22(6):389–396. sion Syndrome: A review. Work, 52(2):303–314.
Adams, R. A., Huys, Q. J. M., and Roiser, J. P. (2016).
Huys, Q. J. M., Maia, T. V., and Frank, M. J. (2016).
Computational psychiatry: towards a mathematically
Computational psychiatry as a bridge from neuro-
informed understanding of mental illness. Journal of
science to clinical applications. Nature Neuroscience,
Neurology, Neurosurgery & Psychiatry, 87(1):53–63.
19(3):404–413.
Bartol, T. (2016). Recreating healthcare: The next genera-
Jarvis, C. (2016). Physical examination and health assess-
tion. The Nurse Practitioner, 41(11):10–11.
ment. St. Louis, MO, USA: Elsevier, Inc., 7th edition.
Beun, R. J. (2013). Persuasive strategies in mobile in-
somnia therapy: alignment, adaptation, and motiva- Kalisch, R., Müller, M. B., and Tüscher, O. (2015). A con-
tional support. Personal and Ubiquitous Computing, ceptual framework for the neurobiological study of re-
17(6):1187–1195. silience. Behavioral and Brain Sciences, 38:e92.
Blobel, B., Lopez, D. M., and Gonzalez, C. (2016). Patient Kaplan, J. (2017). Artificial Intelligence: Think again.
privacy and security concerns on big data for person- Communications of the ACM, 60(1):36–38.
alized medicine. Health and Technology, 6(1):75–81. Kreuter, M., Farrell, D., Olevitch, L., and Brennan, L.
Cacioppo, J. T. and Hawkley, L. C. (2003). Social isolation (2000/2012). Tailoring health messages: Customiz-
and health, with an emphasis on underlying mecha- ing communication with computer technology. LEA’s
nisms. Perspectives in Biology and Medicine, 46(3 Communication Series. Mahwah, NJ, USA: Rout-
Supplement):S39–S52. ledge, Taylor & Francis Group / Lawrence Erlbaum
Associates, Inc., reprint edition.
Carver, C. S. and Connor-Smith, J. (2010). Personality and
coping. Annual Review of Psychology, 61:679–704. Kulikowski, C. A., Shortliffe, E. H., Currie, L. M., Elkin,
Chen, Y.-R. R. and Schulz, P. J. (2016). The effect of P. L., Hunter, L. E., Johnson, T. R., Kalet, I. J., Lenert,
information communication technology interventions L. A., Musen, M. A., Ozbolt, J. G., Smith, J. W.,
on reducing social isolation in the elderly: A system- Tarczy-Hornoch, P. Z., and Williamson, J. J. (2012).
atic review. Journal of Medical Internet Research, AMIA Board white paper: definition of biomedi-
18(1):e18. cal informatics and specification of core competen-
cies for graduate education in the discipline. Jour-
de Jong, E., Visscher, T. L. S., HiraSing, R. A., Heymans, nal of the American Medical Informatics Association,
M. W., Seidell, J. C., and Renders, C. M. (2013). 19(6):931–938.
Association between TV viewing, computer use and
overweight, determinants and competing activities of Kun, L. (2016). Introductory remarks to the special issue on
screen time in 4- to 13-year-old children. International social implications of technology, in honor of the late
Journal of Obesity, 37(1):47–53. dr. Lodewijk Bos. Health and Technology, 6(1):1–4.
Dietz, W. H., Douglas, C. E., and Brownson, R. C. Liu, D. and Baumeister, R. F. (2016). Social networking
(2016). Chronic disease prevention: Tobacco avoid- online and personality of self-worth: A meta-analysis.
ance, physical activity, and nutrition for a healthy Journal of Research in Personality, 64:79–89.
start. Journal of the American Medical Association Lundberg, U. and Cooper, C. L. (2011). The science of
(JAMA), 316(16):1645–1646. occupational health: Stress, psychobiology, and the
Donnelly, E. and Kuss, D. J. (2016). Depression among new world of work. Chichester, West Sussex, UK:
users of social networking sites (SNSs): The role of Wiley-Blackwell / John Wiley & Sons Ltd.
SNS addiction and increased usage. Journal of Addic- Mandl, K. D. and Kohane, I. S. (2016). Time for a patient-
tion and Preventive Medicine, 1(2):#107. driven health information economy? The New Eng-
Fang, R., Pouyanfar, S., Yang, Y., Chen, S.-C., and Iyengar, land Journal of Medicine, 374(3):205–208.
S. S. (2016). Computational health informatics in the McCusker, K. and Gunaydin, S. (2015). Research using
big data age: A survey. ACM Computing Surveys qualitative, quantitative or mixed methods and choice
(CSUR), 49(1):Article No. 12. based on the research. Perfusion, 30(7):537–542.
Ferlie, E., Montgomery, K., and Pedersen, A. R. (2016). Minen, M. T., Torous, J., Raynowska, J., Piazza, A.,
The Oxford Handbook of health care management. Grudzen, C., Powers, S., Lipton, R., and Sevick,
Oxford, UK: Oxford University Press, 1st edition. M. A. (2016). Electronic behavioral interventions
Fine, G. A. and Elsbach, K. D. (2000). Ethnography and ex- for headache: A systematic review. The Journal of
periment in social psychological theory building: Tac- Headache and Pain, 17(1):Article 51.
615
ACP 2017 - Special Session on Analysis of Clinical Processes
Nelson, R. and Staggers, N. (2018). Health informatics: Proceedings of the International Conference on Bio-
An interprofessional approach. St. Louis, MO, USA: Inspired Systems and Signal Processing, pages 188–
Elsevier, Inc., 2nd edition. 193, Valencia – Spain.
Newby, ABC Catalyst, J. (06/09/2007). Work- van den Broek, E. L., Janssen, J. H., van der Zwaag, M. D.,
place stress: Stopping the juggernaut. URL: and Healey, J. A. (2010b). Prerequisites for Affec-
http://www.abc.net.au/catalyst/stories/s2025212.htm tive Signal Processing (ASP) – Part III. In Fred, A.,
[Last accessed on January 5, 2017]. Filipe, J., and Gamboa, H., editors, Biosignals 2010:
Nuutinen, T., Roos, E., Ray, C., Villberg, J., Välimaa, Proceedings of the International Conference on Bio-
R., Rasmussen, M., Holstein, B., Godeau, E., Beck, Inspired Systems and Signal Processing, pages 432–
F., Léger, D., and Tynjälä, J. (2014). Computer 435, Valencia – Spain.
use, sleep duration and health symptoms: A cross- van den Broek, E. L., Janssen, J. H., van der Zwaag, M. D.,
sectional study of 15-year olds in three countries. In- Westerink, J. H. D. M., and Healey, J. A. (2011).
ternational Journal of Public Health, 59(4):619–628. Prerequisites for Affective Signal Processing (ASP) –
Palacios, C. and Gonzalez, L. (2014). Is vitamin D defi- Part V: A response to comments and suggestions. In
ciency a major global public health problem? The Proceedings of the International Conference on Bio-
Journal of Steroid Biochemistry and Molecular Biol- Inspired Systems and Signal Processing, pages 301–
ogy, 144(Part A):138–145. 306, Rome, Italy.
Pervin, L. A. (2003). The Science of Personality. New van den Broek, E. L., Janssen, J. H., Westerink, J. H. D. M.,
York, NY, USA: Oxford University Press, Inc., 2nd and Healey, J. A. (2009). Prerequisites for Affec-
edition. tive Signal Processing (ASP). In Encarnação, P. and
Poon, C. C. Y., Wang, M. D., and Bonato, P. (2013). Edi- Veloso, A., editors, Biosignals 2009: Proceedings of
torial: Special issue on health informatics and person- the International Conference on Bio-Inspired Systems
alized medicine. IEEE Transactions on Biomedical and Signal Processing, pages 426–433, Porto – Portu-
Engineering, 60(1):143–146. gal.
Salibello, C. and Nilsen, E. (1995). Is there a typical VDT van den Broek, E. L., van der Zwaag, M. D., Healey, J. A.,
patient? a demographic analysis. Journal of the Amer- Janssen, J. H., and Westerink, J. H. D. M. (2010c).
ican Optometric Association, 66(8):479–483. Prerequisites for Affective Signal Processing (ASP) –
Part IV. In Kim, J. and Karjalainen, P., editors, Pro-
Schmiege, S. J., Gance-Cleveland, B., Gilbert, L., Aldrich,
ceedings of the 1st International Workshop on Bio-
H., Gilbert, K. C., and Barton, A. (2016). Identifying
inspired Human-Machine Interfaces and Healthcare
patterns of obesity risk behavior to improve pediatric
Applications – B-Interface, pages 59–66, Valencia –
primary care. Journal of Specialists in Pediatric Nurs-
Spain.
ing, 21(1):18–28.
Vinciarelli, A. and Mohammadi, G. (2014). A survey of
Schmitz, U. and Wolkenhauer, O. (2016). Systems
personality computing. IEEE Transactions on Affec-
Medicine, volume 1386 of Methods in Molecular Bi-
tive Computing, 5(3):273–291.
ology / Springer Protocols. New York, NY, USA: Hu-
mana Press / Springer Science+Business Media. Wang, S.-C., Jiang, C., and Chern, J.-Y. (2014). Pro-
moting healthy computer use: Timing-informed com-
Stigliani, J. (1995). The computer user’s survival guide:
puter health animations for prolonged sitting com-
Staying healthy in a high tech world. Sebastopol, CA,
puter users. Behaviour & Information Technology,
USA: O’Reilly Associates, Inc.
33(3):295–301.
Stylianou, A. and Talias, M. A. (2017). Big data in health-
Wood, M. A., Bukowski, W. M., and Lis, E. (2016). The
care: A discussion on the big challenges. Health and
digital self: How social media serves as a setting that
Technology, 7:[in press].
shapes youths emotional experiences. Adolescent Re-
Suomi, R. (1996). One size fits all – or does it? Behaviour search Review, 1(2):163–173.
& Information Technology, 15(5):301–312.
Wuyts, K., G, V., Scandariato, R., Joosen, W., and Du-
van den Broek, E. L. (2010). Beyond biometrics. Procedia mortier, J. (2012). What electronic health records dont
Computer Science, 1(1):2505–2513. know just yet. a privacy analysis for patient communi-
van den Broek, E. L. (2011). Affective Signal Processing ties and health records interaction. Health and Tech-
(ASP): Unraveling the mystery of emotions. PhD the- nology, 2(3):159–183.
sis, Human Media Interaction (HMI), Faculty of Elec- Zhou, Y., Li, D., Li, X., Wang, Y., and Zhao, L. (2017). Big
trical Engineering, Mathematics, and Computer Sci- five personality and adolescent internet addiction: The
ence, University of Twente, Enschede, The Nether- mediating role of coping style. Addictive Behaviors,
lands. 64:42–48.
van den Broek, E. L. (2012). Affective computing: A
reverence for a century of research, volume 7403 of
Lecture Notes in Computer Science, pages 434–448.
Berlin/Heidelberg, Germany: Springer-Verlag.
van den Broek, E. L., Janssen, J. H., Healey, J. A., and
van der Zwaag, M. D. (2010a). Prerequisites for Af-
fective Signal Processing (ASP) – Part II. In Fred, A.,
Filipe, J., and Gamboa, H., editors, Biosignals 2010:
616
AUTHOR I NDEX
Aalst, W. . . . . . . . . . . . . . . . . 573 Ciampi, M. . . . . . . . . . . . . . . 497 Hanschke, V. . . . . . . . . . . . . 435
Abbas, R. . . . . . . . . . . . . . . . 451 Cicció, J. . . . . . . . . . . . . . . . . 252 Hauge, L. . . . . . . . . . . . . . . . 383
Abdulrazak, B. . . . . . . . . . . . . 96 Cirilli, F. . . . . . . . . . . . . . . . . 340 Hautala, A. . . . . . . . . . . . . . . . 88
AbuBaker, A. . . . . . . . . . . . . 213 Clutterbuck, D. . . . . . . . . . . 457 Hawthorne, C. . . . . . . . . . . . 463
Alexandru, C-A. . . . . . . . . . 457 Corvò, A. . . . . . . . . . . . . . . . 573 Heidbreder, M. . . . . . . . . . . . . 35
Alexandru, C. . . . . . . . . . . . 435 Crawford, E. . . . . . . . . . . . . .362 Hein, A. . . . . . . . . . . . . 159, 222
Alikhani, I. . . . . . . . . . . 88, 291 Heinks, A. . . . . . . . . . . . . . . 159
Aloulou, H. . . . . . . . . . . . . . . . 96 Dalakleidi, K. . . . . . . . . . . . 284 Hellmers, S. . . . . . . . . . . . . . 159
Alvarez, S. . . . . . . . . . . . . . . 178 Dasenbrock, L. . . . . . . . . . . 159 Hernandez, B. . . . . . . . . . . . 119
Ammann, R. . . . . . . . . . . . . . . 88 Dawadi, R. . . . . . . . . . . . . . . 244 Herrero, P. . . . . . . . . . . . . . . 119
Arida, J. . . . . . . . . . . . . . . . . .205 Deighan, C. . . . . . . . . . . . . . 435 Hesser, J. . . . . . . . . . . . . . . . . 236
Asghar, Z. . . . . . . . . . . . . . . . 244 Dennis, T. . . . . . . . . . . . . . . . 537 Hnojský, L. . . . . . . . . . . . . . 441
Axelsson, C. . . . . . . . . . . . . . 407 Deshpande, P. . . . . . . . . . . . 553 Holmes, A. . . . . . . . . . . . . . . 119
Dewitt, P. . . . . . . . . . . . . . . . 230 Hompes, B. . . . . . . . . . . . . . 573
Badr, N. . . . . . . . . . . . . 199, 205 Dias, A. . . . . . . . . . . . . . 66, 377 Höök, K. . . . . . . . . . . . . . . . . . . 9
Bauer, J. . . . . . . . . . . . . . . . . 159 Dixit, P. . . . . . . . . . . . . 573, 585 Huang, B. . . . . . . . . . . . . . . . 413
Bauer, M. . . . . . . . . . . . . . . . . 48 Dragoni, N. . . . . . . . . . . . . . 383
Beecham, S. . . . . . . . . . . . . . 451 Idrissi, M. . . . . . . . . . . . . . . . 147
Bellaaj, H. . . . . . . . . . . . . . . 484 Elashkar, E. . . . . . . . . . . . . . 169 Ishchuk, T. . . . . . . . . . . . . . . 424
Bellmunt, J. . . . . . . . . . . . . . . 96 Eler, G. . . . . . . . . . . . . . . . . . 297
Benhiba, L. . . . . . . . . . . . . . . 147 Emcke, T. . . . . . . . . . . . . . 35, 41 Jacobsen, F. . . . . . . . . . . . . . 128
Bennett, T. . . . . . . . . . . . . . . 230 Endelin, R. . . . . . . . . . . . . . . . 96 Jayaraman, S. . . . . . . . . . . . . 553
Bernardos, A. . . . . . . . . . . . . 601 Eschborn, S. . . . . . . . . . . . . . 305 Ježek, P. . . . . . . . . . . . . . . . . .396
Billore, S. . . . . . . . . . . . . . . . 407 Jmaiel, M. . . . . . . . . . . . . . . . 484
Boas, M. . . . . . . . . . . . . . . . . 377 Falco, I. . . . . . . . . . . . . . . . . . 508 Junior, F. . . . . . . . . . . . . . . . . 297
Boaud, J. . . . . . . . . . . . . . . . . 370 Filho, J. . . . . . . . . . . . . . . . . . 348
Bohmann, D. . . . . . . . . . . . . 477 Fleuriot, J. . . . . . . . . . . . . . . 457 Kabir, A. . . . . . . . . . . . . . . . . 178
Borgs, C. . . . . . . . . . . . . . . . . 276 Fontanella, M. . . . . . . . . . . . 497 Kaddachi, F. . . . . . . . . . . . . . . 96
Bracken, B. . . . . . . . . . . . . . . . 11 Forastiere, M. . . . . . . . . . . . 545 Kaldoudi, E. . . . . . . . . . . . . . 418
Brandão, P. . . . . . . . . . . . . . . 517 Foster, I. . . . . . . . . . . . . . . . . 526 Kaliaperumal, V. . . . . . . . . . 553
Brasil, C. . . . . . . . . . . . . . . . . 348 Fraisse, P. . . . . . . . . . . . . . . . . 96 Karlsen, R. . . . . . . . . . . . . . . . 17
Brinker, K. . . . . . . . . . . . . . . 305 Freisleben, B. . . . . . . . . . . . . 484 Kawamoto, M. . . . . . . . . . . . 429
Brizius, A. . . . . . . . . . . . . . . 526 Fudickar, S. . . . . . . . . . . . . . 159 Kinsella, J. . . . . . . . . . . . . . . 463
Broek, E. . . . . . . . . . . . . . . . . 611 Kleckova, J. . . . . . . . . . . . . . 334
Browne, A. . . . . . . . . . . . . . . . 77 Galletti, A. . . . . . . . . . . . . . . 526 Klement, N. . . . . . . . . . . . . . 260
Brůha, P. . . . . . . . . . . . 441, 477 Gargiulo, F. . . . . . . . . . . . . . 497 Kraft, V. . . . . . . . . . . . . . . . . 477
Brune, B. . . . . . . . . . . . . . . . .305 Gastaldi, L. . . . . . . . . . . . . . . 340 Kryl, M. . . . . . . . . . . . . . . . . 334
Brune, T. . . . . . . . . . . . . . . . . 305 Gay, J. . . . . . . . . . . . . . . . . . . 319 Kurumatani, K. . . . . . . . . . . 429
Bruneau, B. . . . . . . . . . . . . . 362 Gay, P. . . . . . . . . . . . . . . . . . . 313
Buijs, J. . . . . . . . . . . . . . . . . . 573 Ge, Y. . . . . . . . . . . . . . . . . . . . 106 Larburu, N. . . . . . . . . . . . . . . 370
Buman, M. . . . . . . . . . . . . . . 319 Geleijnse, G. . . . . . . . . . . . . 585 Lee, E. . . . . . . . . . . . . . . . . . . 354
Georgiou, P. . . . . . . . . . . . . . 119 Leitão, A. . . . . . . . . . . . . . . . 594
Caballero, H. . . . . . . . . . . . . 573 Gertz, M. . . . . . . . . . . . . . . . .236 Li, S. . . . . . . . . . . . . . . . . . . . 413
Caffarel, J. . . . . . . . . . . . . . . 594 Gourgand, M. . . . . . . . . . . . .260 Lin, Y-C. . . . . . . . . . . . . . . . . 401
Cañada, E. . . . . . . . . . . . . . . 601 Grangeon, N. . . . . . . . . . . . . 260 Liu, J. . . . . . . . . . . . . . . . . . . . 413
Cardoso, S. . . . . . . . . . . . . . . 401 Groß, A. . . . . . . . . . . . . . . . . 401 Locatelli, P. . . . . . . . . . . . . . 340
Carlos, D. . . . . . . . . . . . . . . . 348 Gwadry-Sridhar, F. . . . . . . . . 48 López, B. . . . . . . . . . . . . . . . 313
Carroll, N. . . . . . 268, 389, 451 Lopez, M. . . . . . . . . . . . . . . . 362
Casado, E. . . . . . . . . . . . . . . 601 Hall, C. . . . . . . . . . . . . . . . . . . 57 López-Bermejo, A. . . . . . . . 313
Charani, E. . . . . . . . . . . . . . . 119 Hameed, T. . . . . . . . . . . . . . . 139 Loutfi, A. . . . . . . . . . . . . . . . 147
Chedrawi, C. . . . . . . . . . . . . 205 Han, C. . . . . . . . . . . . . . . . . . 326 Lu, C. . . . . . . . . . . . . . . . . . . . . 77
Choudhury, A. . . . . . . . . . . . 553 Handler, D. . . . . . . . . . . . . . . 383 Luccio, D. . . . . . . . . . . . . . . . 526
617
Lundberg, J. . . . . . . . . . . . . . 407 Polónia, D. . . . . . . . . . . . . . . 377 Silveira, M. . . . . . . . . . . . . . .401
Prabhune, A. . . . . . . . . . . . . 236 Silvestri, S. . . . . . . . . . . . . . . 497
Mabotuwana, T. . . . . . . . . . . . 57 Prior, R. . . . . . . . . . . . . . . . . . 517 Sliwa, J. . . . . . . . . . . . . . . . . . 561
Macía, I. . . . . . . . . . . . . . . . . 370 Prokop, T. . . . . . . . . . . . . . . . 441 Šnejdar, P. . . . . . . . . . . . . . . . 477
Madugula, A. . . . . . . . . . . . . 469 Pruski, C. . . . . . . . . . . . . . . . 401 Solvi, S. . . . . . . . . . . . . . . . . .340
Magalhães, T. . . . . . . . . . . . .348 Pulli, P. . . . . . . . . . . . . . . . . . 244 Soung, S. . . . . . . . . . . . . . . . 313
Maier, F. . . . . . . . . . . . . . . . . 319 Spognardi, A. . . . . . . . . . . . . 383
Manataki, A. . . . . . . . . 435, 457 Queirós, A. . . . . . . . . . . 66, 377 Spruit, M. . . . . . . . . . . . . . . . 191
Marcellino, L. . . . . . . . . . . . 526 Quesada, L. . . . . . . . . . . . . . 252 Srour, F. . . . . . . . . . . . . . . . . . 199
Mason, D. . . . . . . . . . . . . . . . . 26 Stojic, I. . . . . . . . . . . . . . . . . .469
Mazurek, P. . . . . . . . . . . . . . 128 Racak, L. . . . . . . . . . . . . . . . .334 Stotzka, R. . . . . . . . . . . . . . . 236
Mazza, B. . . . . . . . . . . . . . . . 585 Rahm, E. . . . . . . . . . . . . . . . . 401 Stretton, E. . . . . . . . . . . . . . . 594
McCreedy, L. . . . . . . . . . . . . . 77 Ramaswamy, L. . . . . . . . . . . 319 Swar, B. . . . . . . . . . . . . . . . . 139
McGlothlin, J. . . . . . . . 362, 469 Rasheed, K. . . . . . . . . . . . . . 319
Mdhaffar, A. . . . . . . . . . . . . . 484 Rawson, T. . . . . . . . . . . . . . . 119 Taylor, L. . . . . . . . . . . . . . . . 435
Mi˛ekina, A. . . . . . . . . . . . . . 128 Reddy, V. . . . . . . . . . . . . . . . 553 Thokala, N. . . . . . . . . . . . . . 553
Mohammed, M. . . . . . . . . . . . 26 Rehor, P. . . . . . . . . . . . . . . . . 477 Tormey, D. . . . . . . . . . . . . . . . 77
Mokhtari, M. . . . . . . . . . . . . . 96 Reynaud-Delaître, C. . . . . . 401 Travers, M. . . . . . . . . . . . . . . 268
Montella, R. . . . . . . . . . . . . . 526 Riccio, A. . . . . . . . . . . . . . . . 526
Moonis, M. . . . . . . . . . . . . . . 178 Richardson, I. . . 213, 268, 389, Vaganova, E. . . . . . . . . . . . . 424
Moore, L. . . . . . . . . . . . . . . . 119 451 Vaks, Y. . . . . . . . . . . . . . . . . . 362
Morawski, R. . . . . . . . . . . . . 128 Richter, A. . . . . . . . . . . . . . . 276 Vařeka, L. . . . . . . . . . . . . . . . 441
Mordvanyuk, N. . . . . . . . . . 313 Robertson, D. . . . . . . . . . . . . 435 Vcelak, P. . . . . . . . . . . . . . . . 334
Morell, J. . . . . . . . . . . . . . . . . . 17 Rocha, N. . . . . . . . . . . . . 66, 377 Verde, L. . . . . . . . . . . . . . . . . 545
Moretti, A. . . . . . . . . . . . . . . 362 Rodriguez-Cancio, M. . . . . 537 Vries, G-J. . . . . . . . . . . . . . . 585
Moss, L. . . . . . . . . . . . . . . . . 463 Rölker-Denker, L. . . . . . . . . 222
Mouček, R. . . . . .396, 441, 477 Romeny, B. . . . . . . . . . . . . . . . . 5 Wagner, J. . . . . . . . . . . . . . . . 128
Muro, N. . . . . . . . . . . . . . . . . 370 Ru, B. . . . . . . . . . . . . . . . . . . 106 Wang, H. . . . . . . . . . . . . . . . . 370
Ruddle, R. . . . . . . . . . . . . . . . . 26 Warner-Hillard, C. . . . . . . . 106
Naddeo, S. . . . . . . . . . . . . . . 545
Ruiz, C. . . . . . . . . . . . . . . . . . 178 Westerink, J. . . . . . . . . . . . . . . . 7
Neira, R. . . . . . . . . . . . . . . . . 585
White, J. . . . . . . . . . . . . . . . . 537
Nia, R. . . . . . . . . . . . . . . . . . . 169
Salcedo, V. . . . . . . . . . . . . . . . 17 Wilson, M. . . . . . . . . . . . . . . 362
Niazi, A. . . . . . . . . . . . . . . . . 319
Samayoa, C. . . . . . . . . . . . . . 362 Winder, J. . . . . . . . . . . . . . . . 370
Nikan, S. . . . . . . . . . . . . . . . . . 48
Sánchez, E. . . . . . . . . . . . . . . 370 Wojtusiak, J. . . . . . . . . . . . . . 169
Nikita, K. . . . . . . . . . . . . . . . 284
Sannino, G. . . . . . . . . . 508, 545 Wyatt, J. . . . . . . . . . . . . . . . . 362
Noponen, K. . . . . . . . . . . . . . . 88
Santos, V. . . . . . . . . . . . . . . . 297
Noselli, M. . . . . . . . . . . . . . . . 26
Sarantea, M. . . . . . . . . . . . . . 284 Xu, G. . . . . . . . . . . . . . . . . . . 326
O’Connor, P. . . . . . . . . . . . . 213 Sashima, A. . . . . . . . . . . . . . 429
O’Leary, P. . . . . . . . . . . . . . . 213 Schalk, I. . . . . . . . . . . . . . . . . 191 Yang, J. . . . . . . . . . . . . . . . . . 326
O’Mahony, J. . . . . . . . . . . . . 213 Schmidt, D. . . . . . . . . . . . . . 537 Yao, L. . . . . . . . . . . . . . . . . . . 106
Ostermann, T. . . . . . . . . . 35, 41 Schnell, R. . . . . . . . . . . . . . . 276 Yazdansepas, D. . . . . . . . . . 319
Schuster, F. . . . . . . . . . . . . . . . 41 Yu, B. . . . . . . . . . . . . . . . . . . . 413
Papapanagiotou, P. . . . 435, 457 Schuster, R. . . . . . . . . . . . 35, 41
Pappas, J. . . . . . . . . . . . . . . . 362 Seppänen, T. . . . . . . . . . . . . . . 88 Zebarjadi, N. . . . . . . . . . . . . 291
Pereira, L. . . . . . . . . . . . . . . . . 66 Séroussi, B. . . . . . . . . . . . . . 370 Zemtsov, A. . . . . . . . . . . . . . 424
Pietro, G. . . . . . . . . . . . 508, 545 Shaw, M. . . . . . . . . . . . . . . . . 463 Zhang, P. . . . . . . . . . . . . . . . . 537
Piper, I. . . . . . . . . . . . . . . . . . 463 Shishido, H. . . . . . . . . . . . . . 297 Zhdanov, D. . . . . . . . . . . . . . 424
Pistorio, A. . . . . . . . . . . . . . . 340 Silva, J. . . . . . . . . . . . . . . . . . 517 Zheng, L. . . . . . . . . . . . . . . . 236
Pla, A. . . . . . . . . . . . . . . . . . . 313 Silva, R. . . . . . . . . . . . . . . . . 348 Zhu, S. . . . . . . . . . . . . . . . . . . 326
618
Proceedings of BIOSTEC 2017 - Volume 5: HEALTHINF
http://www.biostec.org
by SCITESOFT
IN COOPERATION WITH
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All Rights Reserved
ISBN: 978-989-758-213-4