Medical Informatics: Computers, Decisions, and Communications Vlad Olchanski, PhD o Moscow Institute of Physics and Technology o Institute of Control Sciences o International Institute for Applied Systems Analysis Download content as o World Health Organization MS PPT presentation o Medical College of Virginia November 14, 2001 MCV Course for 4th year medical students Dr. Olchanski Home Page Medical Informatics Outline of Course Philosophy of Governing Life Informatics Component 1 Information Technology Computers Communications Internet Component 2 Decision Support and Theory Medical Records Diagnostic Support Pharmaceutical Prescriptions Health System Modeling Data Mining Medical Informatics INTRODUCTION Download content as MS PPT presentation Why Learn Medical Informatics? Cutting Edge Technologies: 1930s Radio communications 1990s Computers, Internet Why Learn Medical Informatics? In the 1920-1930s the Radio was very cool. In those days, the Radio was not a black box with buttons you have in your car. To get a good reception, you had to know a little bit about electronics and things... Why Learn Medical Informatics? Computers are cool today. If you don’t know a little bit about what "coils” are inside you will get frustrated and will bother other people. And yet we want computers and IT now! Why Learn Medical Informatics? 21st Century the Age of Informatics Major Tool of Informatics -- INTERNET IT is not as simple today as is Radio. Internet will turn into a black box with buttons. But not today. And not tomorrow. Why Learn Medical Informatics? Therefore, to behave as a conscious Medical Professional, a Physician of today has to know the basics of Information Technology as well as the basics of Physiology and Pharmacology. Yet the Information Technology alone cannot help you without the intellectual component of Medical Informatics: the Decision Theory. Phi Beta Kappa - philosophia biou kybernetes Philosophy Governs Life Philosophy Mathematics Natural Philosophy Physics Engineering General Theory of Systems Cybernetics Informatics Kybernetes Governs Cybernetics General Theory of Systems Bertalanffy (Austria-Hungary), Bogdanov (Russia) - 1908 Crash of empires after the Great War The Second World War: FLAK, Enigma Norbert Wiener (MIT): Cybernetics: Control and Communication in the Animal and the Machine - 1948 Theory of Information, Finite Mathematics, Probabilities John von Neumann (Princeton) Alan Turing (Bletchley Park) Claud Shannon (MIT) Andrey Kolmogorov (Moscow State) First Computers This weaponry could not protect England: Cybernetics Theory of Information Communications Coding Algorithms Probabilities and Stochastic Processes Theory of Control Operations Research Optimization Management Science Systems Analysis Applications Live, bio-systems Engineering, machines, robots Organizational systems Computer Science Systems Analysis Decision Support, Artificial Intelligence Whence Informatics? Concept of Cybernetics too broad Word Cybernetics tarnished, devalued by Sci-Fi and Pop culture Pragmatic reduction to Computer Science in USA CS translated into INFORMATIQUE in France Backward translation of CS as INFORMATICS expanding the scope Handbook of Medical Informatics http://www.mieur.nl/mihandbook http://www.mihandbook.stanford.edu/ This excellent book unfortunately has very little coverage of the Internet applications. Otherwise, this is the #1 Resource! Medical Informatics Definitions Medical Information Science is the science of using system-analytic tools . . . to develop procedures (algorithms) for management, process control, decision making and scientific analysis of medical knowledge - Ted Shortliffe Medical Informatics comprises the theoretical and practical aspects of information processing and communication, based on knowledge and experience derived from processes in medicine and health care - Jan van Bemmel Whence Informatics? Computer Science and Informatics are practically synonyms: the difference in emphasizing the application aspect Informatics is frequently understood as broadly as Cybernetics -Information Processing including Decision Making and Systems Analysis Names used for Medical Informatics medical computer science medical information science computer application(s) in medicine health informatics, and more specialized terms such as nursing informatics dental informatics and so on. Informatics - What? Information Technology and Theory Computers, Communications, Data Processing, Algorithms Decision Theory and Applications Bayesian Approach, Expert Systems, Artificial Intelligence, Knowledge-based Systems, Algorithms A Good INTRO to Informatics But should we go all the way together? Medical Informatics INFORMATION TECHNOLOGY COMPUTERS Download content as MS PPT presentation Computers: Evolution Von Neuman and the first MAINFRAME at IAS (1948) Vacuum tubes, punch cards or tape Batch mode of operation Low reliability - maintenance team of electronics engineers Transistors - Bill Shockley, 1956 NP MINICOMPUTERS MICROCOMPUTERS Interactive mode of operation Higher reliability due to Transistors Interactive mode of operation Reduced size and enhanced reliability due to Integrated Circuits SUPERMINIS WORKSTATIONS PERSONAL COMPUTERS Renamed from minicomputers to show due respect SUPERCOMPUTERS Computers: Operating Systems Mainframe OS -- oriented to batch processing Minicomputers -- more interactive, usually designed by hardware manufacturer, like RSX, VMS for late DEC machines Unix - an attempt to standardize Personal computers -- CP/M, MS DOS, IBM OS/2, Mac OS, Windows, Unix Internet developed mainly on Unix machines Computers: Operating Systems Windows should not be used for critical applications Programming Mainframe A punch card and the editing tool Page 104 of a program listing H Programming Mainframe Booting your computer -- giving it a kick? Programming Mainframe Booting your computer -giving it a kick? No! It is short from bootstrapping. “Bootstrap” was the name of a short length of the punched tape that was fed to a computer to initiate loading of the Operating System. Computer Architecture CPU, RAM, Bus, etc. are discussed in class Computers: Objects Files: Windows Commander: “http://www.ghisler.com” Name Type Size Time Attrib Owner long name, DOS name avoid spaces in names! extension, internal header, MIME type actual / on disk creation / modification / access hidden / system sysadmin/owner / group / world/other Directories (folders): c:\ ..\ root parent Computers: Startup Files config.sys autoexec.bat system.ini win.ini Registry System.dat User.dat SAM in Unix: .cshrc Text editors: Notepad.exe UltraEdit.exe Computers: Commands dir cd delete copy mkdir rmdir attrib xcopy diskcopy format tree date, time path set sort more /p - by page help /? -? /h -h Computer Architecture Data storage on disks File Allocation Table Security issues are discussed in class after Information Coding presentation Some Utilities Calculator (scientific mode) Character Map (Symbols to Computer Code) Notepad (Text editor) Medical Informatics INFORMATION TECHNOLOGY COMMUNICATIONS Download content as MS PPT presentation Communication Protocol Layers ISO Open System Interface Internet the application level is what we use: Email, FTP, Telnet, HTTP, etc. the physical layer is a stream of bits Internet Protocols FTP (file transfer protocol) serves to exchange data with a remote computer Telnet allows to run programs on a remote computer Terms: Upload - send TO a remote recipient Download - receive FROM a remote sender Remote Computing - I Fred at UBC has report software... Wilma at CUNY has data, needs report! Remote Computing - II Fred sends Wilma the username and the password Never by EMAIL !!! Wilma at CUNY has data, needs report! Remote Computing - III Fred at UBC has report software... FTP Wilma uploads her data with FTP Remote Computing - IV Fred at UBC has report software... Telnet Wilma manipulates her data on Fred’s computer with Telnet Remote Computing - V Fred at UBC has report software... FTP Wilma downloads the report with FTP Remote Computing - VI Fred at UBC has report software... Email Wilma prints the report in her office and sends her kisses to Fred by email Remote Computing Security Using Email - 1 Email is very much like Regular Mail: sending mail and receiving are done quite differently! To send mail, you may to drop it in any mail drop box in the street. To send email, you may connect and use any SMTP server in the world. It is for public convenience. SMTP server sends email Using Email - 2 You send a letter thru a Mail Drop Box You may use any one you find in the street Using Email - 3 You send an email thru a SMTP server You may use any one you find in the Internet Using Email - 4 Email is very much like Regular Mail: sending mail and receiving are done quite differently! To receive mail, you must have either your own mailbox or rent a box at any Post Office. To receive email, you must have an account with any POP3 server. It will be your private possession. You may have as many as you may wish. POP3 server receives email Using Email - 5 To receive a letter, you must have a home or a number in a US Post Office Using Email - 6 To receive an email, you must have an account at a POP or IMAP mail server you may have as many of these as you like Using Email - 7 POP server delivers all messages to your computer -good when you are on a fast connection IMAP server delivers only message headers and messages on demand -- good when you are on a dial-up Yet you will not have all messages on your computer T’bird, Eudora, TheBat! support multiple email accounts Webmail allows to use email with your browser -good when you are on the go Hotmail, Yahoo, etc. may be used for simple purposes -but it is not a true email Using Email - 8 You read and send email with Email Client There are so many different Email Client programs -make your own choice BUT some of Email Clients and some of Email USERS go outside of Internet Standards - incompatibility of messages - errors in transmission and reception Using Email - 9 SMTP An operative set of POP3 boxes POP3 Using Email - 10 Basic Rules of Nice Conduct 1. Never consider email as confidential 2. Email should best be a simple message 3. Do not send messages formatted with HTML -not all email clients can deal with them, confirms a hit for spammers (impossible in AOL email program ) 4. Avoid sending binary attachments these may come corrupted and can carry viruses How to avoid binary attachments in Email, see “http://www.intmed.vcu.edu/inm/advice.html” The Most Intimate Secret Like Wine dichotomy in Russia - White wine: Moonshine, Vodka, Brandy - Red wine: all the rest The Most Intimate Secret Data dichotomy in Internet - Text files: Plain English text: A-Z, a-z, 0-9 - Binary files: all the rest The Most Intimate Secret Symbols -- Bytes -- Octets Secret == 53 65 63 72 65 74 Bits 1010011 1100101 1100011 1110010 1100101 1110100 Sept “bits” fassent un “octet”! This is the ASCII Standard. Yet -Éç == C9 E7 == 11001001 11100111 Now you see that the French have a reason to call the “byte” not “septet” but “octet”! If you strip the 8th bit then corruption occurs: É -> 49 == I and ç -> 67 == g The Most Intimate Secret The 7-bit data trasmission was set into the infrastructure The Most Intimate Secret The Revelation Only text files may be sent through Internet Binary files will come corrupted To send a binary, it must be converted to a text file (encoded) and on the receiving end the encoded file must be decoded. In FTP protocol, the type must be told explicitly In Email, binary files go as attachments. There are different encode/decode procedures which may lead to confusion and errors Security: Cryptography Sherlock Holmes: The Dancing men ELSIE . .RE . ARE .TO M.EET .THY .GO . elsie PrePare To Meet Thy GoD come here at once Security: Cryptography Edgar Allan Poe: Gold-bug 53++!305))6*;4826)4+.)4+);806*;48!8`60))85;]8*:+*8!83(88)5*!; 46(;88*96*?;8)*+(;485);5*!2:*+(;4956*2(5*4)8`8*; 4069285);)6!8)4++;1(+9;48081;8:8+1;48!85;4)485!528806*81(+9;48;(88;4(+?3 4;48)4+;161;:188;+?; 8 there ; " 4 " +) " * " 5 " 6 " !1 " 0 " 92 " :3 " ? " ` " -. " are 33. 26. In English, the letter which most frequently occurs is e. 19. Afterwards, the succession runs thus: 16. 13. aoidhnrstuycfglmwbkpqxz 12. 11. 8. 6. 5. 4. 3. 2. 1. 5 represents a ! " d 8 " e 3 " g 4 " h 6 " i * " n + " o ( " r ; " t A good glass in the bishop's hostel in the devil's seat twenty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out. Security: Criptography Enigma, German Coding Machine Security: Cryptography Encryption with a keyword “this is plaintext” , the key is “key” + (add codes) “keykeykeykeykeyke” Encrypted text: “dxkfpsnputmsodjss” Plain book, a simple but efficient tool Decryption with a keyword -- the key must be sent to the recipient this is the weakest point Encrypted text: “dxkfpsnputmsodjss” , the key is “key” - (subtract codes) “keykeykeykeykeyke” One-time Decrypted text: pad “this is plaintext” Security: Cryptography PGP: Pretty Good Protection Fred’s public key My key ring of public keys of my correspondents My secret private key My public key stored on my website and in public depositories Security: Cryptography I send message to Fred Dear Fred, bla-bla... Fred reads my message ]hk@s#2kdMs0fHquja... Fred’s public key Fred’s private key Fred answers my message I read Fred’s answer My public key Dear Vlad, bla-bla... Dear Fred, bla-bla... My private key Msios$[\iqN7dkoZnu... Dear Vlad, bla-bla... Security: Cryptography Communications. Security 80% trash, 5% pearls Internet Protocols Usenet, News, Forums -- NNTP Protocol A small ISP carries ~45,000 groups. Different ISPs give different groups, have different scopes Medical and Health Related Groups listed: www.mipt.vcu.edu/ng.html Internet Protocols World Wide Web == HTTP protocol User client -- browser Netscape, Internet Explorer, Opera, Firefox WWW is only a small part of Internet !!! AOL and MSN are not Internet at all !!! Internet AOL gateway MSN gateway archive.salon.com/tech/feature/2001/06/26/locking_up_the_web/index3.html Internet Services Providers give you full Internet Internet Connectivity Internet Addresses DSN: views.vcu.edu look up Host file Domain Name Server connect IP: 128.172.65.8 Telephones Name: Vlad Olchanski look up Personal notebook Phone Directory dial Number: 804.828.5384 PING and TRACERT accessible through START/RUN Internet Connectivity A decent ISP must give a client: o SMTP address to send email o POP3 address to access the mailbox o NNTP address to get Newsgroups Additionally: o Space to host website at ISP’s IP address o FTP access to update website Optionally: o Static IP address for hosting own website Information Technology Viruses Viruses, Trojans, Worms, Bots, Denial of Service Virus Shields, Firewalls are discussed in class. Read also Steve Gibson’s saga about a virus attack: http://grc.com/dos/intro.htm Information Technology: Secure Use of Internet Now let us see a presentation on how to practice Internet connectivity safely. Information Technology Basics of Security - 1 • make sure workstation is physically safe and secure • never send passwords by email • never paste passwords beside the workstation • install and regularly (weekly) update virus protection • avoid sending attachments • never open unsolicited attachments, always check and double-check the attachment’s file extension Information Technology Basics of Security -2 never open unexpected file with extensions EXE COM DOC DLL PIF LNK VBS (Windows does not show LNK and PIF extensions) Never click on a link – hover the link with mouse and look at the status bar where the link leads when clicked firewall may protect both yourself and the world but may also cheat you) Information Theory Sender and Receiver Noise and Distortion Codes Detecting Errors Codes Correcting Errors Checksums Data Packets are discussed in class Information Theory Data Compression zip, arj, rar, tar, gz, binhex, 7u, etc. Image Compression Image Formats bmp, tiff, gif, jpg, png, etc. are discussed in class. Image compression immediately leads to WEB DESIGN Web Design What is a good website? -- presentable for all users: WIN, Mac, Unix, etc. -- acceptable for all browsers: Opera, Netscape, Firefox, MSIE, Safari, etc. -- loads fast: byte size < 50 kB -- does not use Cutting Edge technologies Learn the culture of Web Design at webpagesthatsuck.com review the Daily Sucker site daily! A web design project is done by students. Collection here Medical Informatics DECISION SUPPORT AND THEORY Download content as MS PPT presentation The Fundamental Principle of Decision Theory THE BAYES THOREM [New Knowledge] = [Experimentation] x [Old Knowledge] Application: Making Diagnosis [Old Knowledge] - we know disease D prevalence, p(D) [New Knowledge] - we need to know if the patient has disease D if he has symptom S, p(D|S) [Experimentation] - Bayes Theorem builds the Likelihood Function: L(D|S) = p(S|D) / {p(S|D) p(D) + p(S|’D) p(‘D)} Now this Likelihood Function modifies the Old Knowledge: p(D|S) = L(D|S) p(D) Medical Decision Support to mention a few Clinical Systems Financial Medical Records Comprehensive Diagnostic Systems QMR, Iliad, DXPlain, etc. Pharmaceutical Prescriptions Health System Modeling Research Data Mining Medical Decision Support Clinical Systems Computerized Medical Record systems are discussed in class: TMR -- CMR from Duke Medical Center MedicaLogica Pharmaceutical System for Multiple Drug Therapy in ICU, Pharm-X is discussed in class Comprehensive system for VCU HealthSystem is discussed in class. Medical Decision Support Diagnostic Systems observations knowledge base decision mechanism diagnoses explanations feedback to adjust observations Knowledge Engineering, Expert Systems, AI are discussed in class Medical Decision Support Health Systems Modeling - 1 Primary Care Physician Supply - 1 Medical Decision Support Health Systems Modeling - 2 Primary Care Physician Supply - 2 Medical Decision Support Health Systems Modeling - 3 Primary Care Physician Supply - 3 Medical Decision Support Measurement and Statistics Use only reasonable precision, round up numbers to convey your purpose Medical Informatics RECOMMENDED RESOURCE FOR ADVANCED STUDIES Download content as MS PPT presentation Handbook of Medical Informatics http://www.mieur.nl/mihandbook http://www.mihandbook.stanford.edu/ MCV Course for 4th year medical students Handbook of Medical Informatics I. Data and Information 1 Introduction and Overview 2 Information and Communication Handbook of Medical Informatics II. Data in Computers 3 Data Processing 4 Database Management 5 Telecommunication, Networking and Integration Handbook of Medical Informatics III. Data from Patients 6 Coding and Classification 7 The Patient Record 8 Biosignal Analysis 9 Medical Imaging 10 Image Processing and Analysis Handbook of Medical Informatics IV. Patient-Centered Information Systems 11 Primary Care 12 Clinical Departmental Systems 13 Clinical Support Systems 14 Nursing Information Systems Handbook of Medical Informatics V. Medical Knowledge and Decision Support 15 Methods for Decision Support 16 Clinical Decision-Support Systems 17 Strategies for Medical Knowledge Acquisition 18 Predictive Tools for Clinical Decision Support Handbook of Medical Informatics VI. Institutional Information Systems 19 Modeling of Health Care for Information Systems Development 20 Hospital Information Systems: Clinical Use 21 Hospital Information Systems; Technical Choices 22 Health Information Resources Handbook of Medical Informatics VII. Methodology for Information Processing 23 Logical Operations 24 Biostatistical Methods 25 Biosignal Processing Methods 26 Advances in Image Processing 27 Pattern Recognition 28 Modeling for Decision Support 29 Structuring the Computer-based Patient Record 30 Evaluation of Clinical Information Systems Handbook of Medical Informatics VIII. Methodology for Information Systems 31 Human-Computer Interaction in Health Care 32 Costs and Benefits of Information Systems 33 Security in Medical Information Systems 34 Standards in Health-care Informatics and Telematics in Europe 35 Project Management Handbook of Medical Informatics IX. Medical Informatics as a Profession 36 Education and Training in Medical Informatics 37 International Developments in Medical Informatics Handbook of Medical Informatics Unfortunately lacks the details on the Internet Education vs Vocational Training Medical Informatics THE END OF PRESENTATION Download content as MS PPT presentation MCV Course for 4th year medical students