“Advancing Health Images”- Current Trends and Prospective

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 12 - Mar 2014
“Advancing Multicloud Methods to Support User Design Electronic
Health Images”Current Trends and Prospective
Authors : Dr.J.Umamaheswari(1),Nisreen Alzhrani(2),Ruhi Fatima(3), Syeda Nausheen(4)
Majmaah University,College of Computer and Information Science, Al-majmaah, Saudi Arabia.
ABSTRACT
In spite of many decades of research on the effectual
development of quantifiable image system in
medicine, the implementation of health technology to
improve patient concern images continues to be slow
in presentation procedures, process, and medicinal
drugs in healthcare. This is relevant to all medical
reports as well, as a rural care discipline. The
critical reason for slow espousal is the poor usability
of raw data used in clinical systems, which makes it
difficult for physians to take the helm through the
information and obtain an incorporated view of
patient data.. The terms cloud is of extensive for
easily accessible, and cost has made many
researchers and clinicians to concentrate in cloud
computing. Healthcare researchers are moving their
hard work to the cloud, because they need passable
resources to practice, stock up, swap, and use large
quantities of medical image.The cloud used as a
private datas and public datas by the needed physian
for analysis is made as a impel. In this, A
documentation of the information processing about
the image data strategies used by the physician
during a typical patient examination. A cloud
computing task analysis (CCTA) trends to observe
how the images are stored in cloud and used as a
private datas and public datas by the needed physian
for analysis is made as a impel.
Keywords: Cloud computing, cloud services,
medical imaging, scalability, Security,,picture
archiving and communication system.
1.INTRODUCTION
Cloud computing is now-a-days growing vast among
the organizations and used as a technology which can
meet all the requirements of the association refers to
grid of computers serving as a service for the storage
space and security in high performance computing
business in medical era. The popular model among
the clouds is public cloud to many users , in the
public cloud environment, services are provided
through a resources . The resources are constructed
using collective shared possessions and are accessible
over internet public cloud . Public cloud is mostly
used among the multiple users and it can be
categorized as Software as a service {SaaS} this is
most commonly used storage and online office
application one of the best feature of cloud is its
location independent and its simplicity, Because it
does not involve any leg work offering both simple
and complex needs. Private cloud provides right to
use the benefits of the cloud - dexterity, scalability,
effectiveness utilizes with the public cloud. Servicelevel agreements and security precautions grown-up
to the impact of outages and time is minimized for
improving the concept. Eventually, some prediction
would be the majority of private cloud deployments
will become hybrid clouds, ie., your private cloud
today, may be a hybrid cloud tomorrow. The private
cloud is positioning itself as the adviser of all
services for the enterprise, whether they are private,
public, hybrid or traditional. The collective advances
of the cloud technology is developing by considering
the security and scalabilty of medical image for
communication in pacs which is made viable for the
medical scenario system.
(1)
1.1 Types of clouds
1.1.1
Public cloud are concerning factors like security,cost,
configuration, infrastructure , efficiency and
ISSN: 2231-5381
http://www.ijettjournal.org
Page 583
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 12 - Mar 2014
vulnerability which are concentrated
by the
providers for the user accessing through the internet.
popular model among the clouds is public cloud to
many users , in the public cloud popular because they
are virtualization .The virtualized background are
constructed using collective resources and made
accessible over internet service to multiple users
using the same shared physical infrastructure. These
Public cloud is commonly used by the multiple users
with Software as a service {SaaS} for storage and
online office application which is independent that
involve both simple and complex needs. Although
all types clouds provide the users with same
computing capability but the advantages as the
name implies “public” is publicly available to all the
users or organization as a resourceful tool. The
limitation of public cloud is that, all users over the
globe uses the same infrastructure team with limited
configuration and security measures which are
These
clouds
are
important for the medical images of the patient to be
very confidential mode. A provider should manage
and maintain the resources the applications with
storage space in such a manner users can access to
only those resources which they need by connecting
to internet .The organization confidently depend on
the third party for obtaining services such as servers,
data storage and application. These are made only
through internet , thus preventing the cost complexity
and time consuming process , so this can be done by
cloud services by logging a particular website with
the login ID and Password .The public cloud users
can turn on and off their computing resources
through API access and can configure and pay for
their use online . fig :1 shows the representation of
cloud into process(8),(9),(10).
SaaS
Software as a Service which is a form of cloud
computing specially used as public as web to deliver
applications that are supervised by the third-party
and its interface is accessed on the clients . these can
be processed directly from a web browser without
any installation directly from the vendors to the
individual computers . A simple architecture of a
cloud which has a front end and the back end that are
connected through a network. The system consider
the front end as a computer user and the back end as
the cloud part of the system. A central server
moniters the traffic and the demands of the clients to
ensure that everything is ideal which is followed by
the
protocols that are restricted
and allows
networked computers to communicate with each
other. When the servers are are disturbed which
slowdowns the speed ,a physical server is used to run
down its own operating system reduces the need for
more physical machines. The systems requires more
storage devices to keep all its clients' information
stored and have a backup copy of all information.
The redundancy of the copies stored enable the
central server to access backup machines to retrieve
data(11) .
1.1.2 Private cloud
Private cloud computing is always known as virtual
infrastructure services deployed though the software
and platform layers . The IaaS layer is the fastest
growing segment of cloud, but it is not necessarily
the most important. The private cloud can be tested
with creating simple applications, so that the
organization can adopt private cloud or not. The
process of virtualization improves the efficient of the
organization by virtual machines can treat as internal
ISSN: 2231-5381
and external cloud .The infrastructure is owned and
managed by third party provider or organization that
can be located as off-premise/on-premise and
accessible for the sole organization that provides ondemand self-service, broad network access, rapid
elasticity, measured service instantaneously to any
organization’s needed. For cloud computing the
component is considered as virtualization not a cloud
by itself. This technology allows organizations to
http://www.ijettjournal.org
Page 584
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 12 - Mar 2014
share and allocate resources that deploys service in
private cloud as IaaS (Infrastructure as service) . The
security issues in private cloud concentrate the
architecture which may the mode of the data to be(3)
Database
(storage)
Computer networks
control node
client
application servers
Fig:1 representation of cloud computing.
kept confidently by the hospitals from varies roof of
models. The resources configured to protect the
machines may communicate other virtual machine
were they are hypervisor vulnerabilities and network
level authentication which is very important for the
medical image of the patient can be identified only by
the organization whose has upload it. Security
resources of different types of data and sensitivity of
the resources is highly recommended(5,6,7).
1.1.3 Hybrid computing
In this environment of cloud, an organization
provides and manages some resources internal and
others provided as external . The hybrid approach
ISSN: 2231-5381
allows a conglomerate to lead the data to be
scalability and cost-effectiveness that a public cloud
computing environment offers without exposing
http://www.ijettjournal.org
Page 585
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 12 - Mar 2014
mission-critical applications and data to third-party
vulnerabilities which is refereed as hybrid cloud or
hybrid IT. There are different types of applications
include which is effective in management strategy for
hybrid deployment for configuration management,
change control , security, fault management because
a hybrid cloud combines public cloud and private
data centre principles. This is a very important
conceptual for the medical images of different
organization comes under control in cloud . The
hybrid cloud deploy the changes which should be
minimized that does not cause damage for medical
database which is considered as more precious as the
life of human is invaluable . Hybrid always can
integrate with the web-based services which will be
easier for the organization to look up the data
whenever necessary in the place of living . It is also
embedded browser to improve access to dynamic
online content. The application in hybrid are web
app which can store the data on a remote server and
delivered the data through a browser interface. In
mobile sector the web apps are contrasted with native
apps which are very particular installed on that
device while the native application are developed for
a specific platform and installed on a computing
device and web application for multiple platforms
and not installed but available in the internet through
a browser .
2.Hybrid approach to suppress the noise
An hybrid approach used to store the medical images
of numerous data from different organization to
preserve the datas which are more convergence and it
will be successively proved to be an resourceful tool
to concentrate on large amount of data for
Fig.2
experimentation using fully automatic retrieval
system. In fig-2 shows few sample images which has
to be stored in cloud by the organization and the
physian who utilizes the datas whenever it is
necessary(17),(18),(19).
sample medical CT images.
When the medical images are collected by sensors
are contaminated by noise. This distortion due to
additive Gaussian noise caused by poor image
acquisition or by transferring the image in noisy
communication channels. This noise removal can be
effectively done by llinear methods. In the same way
,acoustic equipments also have some noise that are
present internally during transmission. An hybrid
approach with wavelet transform and median filter
can avoid this distortion were the coefficients are
transferred.Typically,new development environments
need to continue to support inheritance applications
and data. With many new tools, inheritance databases
can be accessed by newer programs which can be
utilized by the organization to extracted noise free
images which will be useful for the physian to the
strategy. The replication of the cloud is shown in fig -
extracted .Soft threshold applied to extract the
coefficient of noisy image. The wavelet threshold
denoise gain s each coefficient from the detail
subbands with a soft threshold function obtain the
resultant apparent image. This works in reducing the
noise in the image by suppressing the noise pixel
when the images are stored in cloud . The quantified
data stored in the hybrid cloud proves whenever it is
used by physians for analysis by removing the noise
presented in the images while it is analyse
3 which is shown to store the images of different
hospitals by an hybrid approach of cloud using both
private and public, in case the physian can store the
images of the patient in public cloud which can used
by other doctors for references and use to store data
as private that is concern as privacy which cannot
viewed or utilized by others from the cloud.
.
.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 586
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 12 - Mar 2014
client
Datas
logic
Application
Cloud data A
Cloud data B
Hospital 1
Hospital 2
Fig-3 Replication of application system using hospital information
The virtualized data are highly scalable where the
virtual application delivery controllers the data’s.
This environment is used where customers need to be
able to scale capacity flexibility to use the application
as demand fluctuates. The vendors working with
cloud providers to deliver cloud load balancers for
application acceleration, availability assurance and
scalability.
3. Cloud Computing transparency
The biggest transparency for cloud computing
are confidence and discretion. The idea of handing
over important data to another company
apprehensions is not suited for the medical industries,
since some of the datas should be privacy used . This
is very big criteria to be solved for the medical
industries. The Corporate directors might vacillate to
take advantage of a cloud computing system, because
they can't keep their hospital medical information as
a public criteria. The organization goes for a reliable
security measures to the information to the place they
rely. It's in their interest to employ the most advanced
techniques to protect their clients' data which are
ISSN: 2231-5381
fluctuate according the time concepts. When privacy
is considered, a client can log in from any location to
access data and applications to compromise the
satisfaction of reliable data to be updated. Cloud
computing companies will need to find ways to
protect client privacy by using authentication
techniques such as watermarking or by using their
password and user names. It can also be protected by
authorization which is not a pirated format that can
access only the data and applications relevant to the
sector. The researchers suggest the better usage of
public and private cloud designed according to the
user satisfaction as a hybrid cloud.
http://www.ijettjournal.org
Page 587
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 12 - Mar 2014
4.Conclusion
This revision reinforced the significance of applying
perceptive hybrid methods to design a clinical
system. Applying the concept of hybrid cloud to the
user significance about the images used in the cloud
for further processes of communication. This
scenario of simulating the actual patient to encounter
the decision making, when diagnosing and treating a
patient from wherever the organization is processed.
The retrieval and review should significantly
contribute the flexibility and task appropriate
information in electronic medical records.
5. References:
1. Sarvesh Kumar, Jahangeer Ali, Ashish Bhagat ,
Jinendran P.K , “An Approach of Creating a Private Cloud
for Universities and Security Issues in Private Cloud”
International Journal of Advanced Computing, Vol.36,
Issue.1 pg. 1134 – 1137.
2. Ashish Raj, Harjasdeep Singh, Praveen Ghanghas, Vol. 2
Issue 4, April – 2013 “An Approach to Private Cloud Using
LAMP and EyeOS”, International Journal of Engineering
Research & Technology
Pg. 922 - 925
“Buttressing volatile desktop grids with cloud resources
within a reconfigurable environment service for workflow
orchestration”, Journal of Cloud Computing: Advances,
Systems and Applications 2014.
10. Loewen G, Galloway J, Robinson J, Hong X and
Vrbsky
“THUNDER: helping underfunded NPO’s distribute
electronic resources” Journal of Cloud Computing:
Advances, Systems and Applications, 2013.
11. Grolinger K, Higashino WA, Tiwari A and Capretz
“Data management in cloud environments: NoSQL and
New SQL data stores” ,Journal of Cloud Computing:
Advances, Systems and Applications 2013.
12. Makkes MX, Taal A, Osseyran A and Grosso P, “A
decision framework for placement of applications in clouds
that minimizes their carbon footprint”,Journal of Cloud
Computing: Advances, Systems and Applications ,2013.
13. Jingwei Huang, David M Nicol,” Trust mechanisms for
cloud computing,Journal of Cloud Computing: Advances,
Systems and Applications ,2013.
14. Thomas H Beach, Omer F Rana, Yacine Rezgui,
Manish Parashar, “Cloud computing for the architecture,
engineering & construction sector: requirements, prototype
& experience”Journal of Cloud Computing: Advances,
Systems and Applications, 2013.
3. Hong-Linh Truong, Tran-Vu Pham, Nam Thoai,
Schahram Dustdar,
DOI: 10.4018/978-1-4666-09570.ch005 “ Cloud Computing for Education and Research in
Developing Countries” ,Pg 78 -94.
15. John Zic, Thomas Hardjon,”Towards a cloud-based
integrity measurement service”, Journal of Cloud
Computing: Advances, Systems and Applications , 2013.
4. David W Chadwick, Matteo Casenove, Kristy Siu My
private cloud – granting federated access to cloud resources
, Journal of Cloud Computing: Advances, Systems and
Applications 2013,
16. Steven J Johnston, Neil S O’Brien, Hugh G Lewis,
Elizabeth E Hart, Adam White, Simon J, “Clouds in
Space: Scientific Computing using
Windows Azure”,
Journal of Cloud Computing: Advances, Systems and
Applications 2013.
5. Joyent , Security in Public and Private Cloud
Infrastructures,
2012,http://www.joyent.com/documents/Joyent-Securityin-Public-andPrivate-Cloud-Infrastructures-WhitePaper.pdf
17. A survey on securing the virtual cloud
Robert Denz, Stephen TaylorJournal of Cloud Computing:
Advances, Systems and Applications 2013,
6. Pankaj Arora, Rubal Chaudhry Wadhawan,
Er. Satinder Pal Ahuja , Volume 2, Issue 1, ISSN: 2277
128X-“ Cloud Computing Security Issues in Infrastructure
as a Service” 2012.
7. Microsoft Private Cloud,– “A comparative look at
Functionality, Benefits, and Economics”,2012.
8. Dai W and Bassiouni M, Advances, Systems and
Applications “An improved task assignment scheme for
Hadoop running in the clouds” Journal of Cloud
Computing, 2013.
18. Leimeister, Stefanie, fortiss,et.al.,” THE BUSINESS
PERSPECTIVE OF CLOUD COMPUTING : ACTORS,
ROLES, AND VALUE NETWORKS” , Proceedings of
18th European Conference on Information Systems (ECIS
2010),2010, 1-12.
19. Eric S. Kirkendall, Linda M. Goldenhar,et.al,.”
Transitioning from a computerized provider order entry and
paper documentation system to an electronic health
record:Expectations and experiences of hospital
staff”,International
journal
of
medical
informatics,2013,1037-1045.
9. Winter SC, Reynolds CJ, Kiss T, Terstyanszky GZ,
Greenwell P, McEldowney S, Acs S and Kacsuk
ISSN: 2231-5381
http://www.ijettjournal.org
Page 588
Download