256 research outputs found

    Intraoperative Neurophysiological Monitoring for Endoscopic Endonasal Approaches to the Skull Base: A Technical Guide.

    Get PDF
    Intraoperative neurophysiological monitoring during endoscopic, endonasal approaches to the skull base is both feasible and safe. Numerous reports have recently emerged from the literature evaluating the efficacy of different neuromonitoring tests during endonasal procedures, making them relatively well-studied. The authors report on a comprehensive, multimodality approach to monitoring the functional integrity of at risk nervous system structures, including the cerebral cortex, brainstem, cranial nerves, corticospinal tract, corticobulbar tract, and the thalamocortical somatosensory system during endonasal surgery of the skull base. The modalities employed include electroencephalography, somatosensory evoked potentials, free-running and electrically triggered electromyography, transcranial electric motor evoked potentials, and auditory evoked potentials. Methodological considerations as well as benefits and limitations are discussed. The authors argue that, while individual modalities have their limitations, multimodality neuromonitoring provides a real-time, comprehensive assessment of nervous system function and allows for safer, more aggressive management of skull base tumors via the endonasal route

    Pediatric primary intramedullary spinal cord glioblastoma

    Get PDF
    Spinal cord tumors in pediatric patients are rare, representing less than 1% of all central nervous system tumors. Two cases of pediatric primary intramedullary spinal cord glioblastoma at ages 14 and 8 years are reported. Both patients presented with rapid onset paraparesis and quadraparesis. Magnetic resonance imaging in both showed heterogeneously enhancing solitary mass lesions localized to lower cervical and upper thoracic spinal cord parenchyma. Histopathologic diagnosis was glioblastoma. Case #1 had a small cell component (primitive neuroectodermal tumor-like areas), higher Ki67, and p53 labeling indices, and a relatively stable karyotype with only minimal single copy losses involving regions: Chr8;pter-30480019, Chr16;pter-29754532, Chr16;56160245–88668979, and Chr19;32848902-qter on retrospective comparative genomic hybridization using formalin-fixed, paraffin-embedded samples. Case #2 had relatively bland histomorphology and negligible p53 immunoreactivity. Both underwent multimodal therapy including gross total resection, postoperative radiation and chemotherapy. However, there was no significant improvement in neurological deficits, and overall survival in both cases was 14 months.This report highlights the broad histological spectrum and poor overall survival despite multi modality therapy. The finding of relatively unique genotypic abnormalities resembling pediatric embryonal tumors in one case may highlight the value of genome-wide profiling in development of effective therapy. The differences in management with intracranial and low-grade spinal cord gliomas and current management issues are discussed

    Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation

    Get PDF
    Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. Methods We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. Results The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. Conclusions The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians

    Lessons Learned From the Design and Implementation of Myocardial Infarction Adjudication Tailored for HIV Clinical Cohorts

    Get PDF
    We developed, implemented, and evaluated a myocardial infarction (MI) adjudication protocol for cohort research of human immunodeficiency virus. Potential events were identified through the centralized Centers for AIDS Research Network of Integrated Clinical Systems data repository using MI diagnoses and/or cardiac enzyme laboratory results (1995–2012). Sites assembled de-identified packets, including physician notes and results from electrocardiograms, procedures, and laboratory tests. Information pertaining to the specific antiretroviral medications used was redacted for blinded review. Two experts reviewed each packet, and a third review was conducted if discrepancies occurred. Reviewers categorized probable/definite MIs as primary or secondary and identified secondary causes of MIs. The positive predictive value and sensitivity for each identification/ascertainment method were calculated. Of the 1,119 potential events that were adjudicated, 294 (26%) were definite/probable MIs. Almost as many secondary (48%) as primary (52%) MIs occurred, often as the result of sepsis or cocaine use. Of the patients with adjudicated definite/probable MIs, 78% had elevated troponin concentrations (positive predictive value = 57%, 95% confidence interval: 52, 62); however, only 44% had clinical diagnoses of MI (positive predictive value = 45%, 95% confidence interval: 39, 51). We found that central adjudication is crucial and that clinical diagnoses alone are insufficient for ascertainment of MI. Over half of the events ultimately determined to be MIs were not identified by clinical diagnoses. Adjudication protocols used in traditional cardiovascular disease cohorts facilitate cross-cohort comparisons but do not address issues such as identifying secondary MIs that may be common in persons with human immunodeficiency virus

    Reviewing the integration of patient data: how systems are evolving in practice to meet patient needs

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The integration of Information Systems (IS) is essential to support shared care and to provide consistent care to individuals – patient-centred care. This paper identifies, appraises and summarises studies examining different approaches to integrate patient data from heterogeneous IS.</p> <p>Methods</p> <p>The literature was systematically reviewed between 1995–2005 to identify articles mentioning patient records, computers and data integration or sharing.</p> <p>Results</p> <p>Of 3124 articles, 84 were included describing 56 distinct projects. Most of the projects were on a regional scale. Integration was most commonly accomplished by messaging with pre-defined templates and middleware solutions. HL7 was the most widely used messaging standard. Direct database access and web services were the most common communication methods. The user interface for most systems was a Web browser. Regarding the type of medical data shared, 77% of projects integrated diagnosis and problems, 67% medical images and 65% lab results. More recently significantly more IS are extending to primary care and integrating referral letters.</p> <p>Conclusion</p> <p>It is clear that Information Systems are evolving to meet people's needs by implementing regional networks, allowing patient access and integration of ever more items of patient data. Many distinct technological solutions coexist to integrate patient data, using differing standards and data architectures which may difficult further interoperability.</p

    A systematic review on integration mechanisms in human and animal health surveillance systems with a view to addressing global health security threats

    Get PDF
    Lymphatic filariasis and onchocerciasis are neglected tropical diseases (NTDs) targeted for elimination by mass (antifilarial) drug administration. These drugs are predominantly active against the microfilarial progeny of adult worms. New drugs or combinations are needed to improve patient therapy and to enhance the effectiveness of interventions in persistent hotspots of transmission. Several therapies and regimens are currently in (pre-)clinical testing. Clinical trial simulators (CTSs) project patient outcomes to inform the design of clinical trials but have not been widely applied to NTDs, where their resource-saving payoffs could be highly beneficial. We demonstrate the utility of CTSs using our individual-based onchocerciasis transmission model (EPIONCHO-IBM) that projects trial outcomes of a hypothetical macrofilaricidal drug. We identify key design decisions that influence the power of clinical trials, including participant eligibility criteria and post-treatment follow-up times for measuring infection indicators. We discuss how CTSs help to inform target product profiles
    • …
    corecore