Other search tools

About this data

The publication data currently available has been vetted by Vanderbilt faculty, staff, administrators and trainees. The data itself is retrieved directly from NCBI's PubMed and is automatically updated on a weekly basis to ensure accuracy and completeness.

If you have any questions or comments, please contact us.

Results: 1 to 10 of 19

Publication Record

Connections

Genome-wide study of resistant hypertension identified from electronic health records.
Dumitrescu L, Ritchie MD, Denny JC, El Rouby NM, McDonough CW, Bradford Y, Ramirez AH, Bielinski SJ, Basford MA, Chai HS, Peissig P, Carrell D, Pathak J, Rasmussen LV, Wang X, Pacheco JA, Kho AN, Hayes MG, Matsumoto M, Smith ME, Li R, Cooper-DeHoff RM, Kullo IJ, Chute CG, Chisholm RL, Jarvik GP, Larson EB, Carey D, McCarty CA, Williams MS, Roden DM, Bottinger E, Johnson JA, de Andrade M, Crawford DC
(2017) PLoS One 12: e0171745
MeSH Terms: Adult, Aged, Algorithms, Antihypertensive Agents, Blood Pressure, Case-Control Studies, Computer Communication Networks, Datasets as Topic, Drug Resistance, Electronic Health Records, Ethnic Groups, Genome-Wide Association Study, Genotype, Humans, Hypertension, Male, Middle Aged, Polymorphism, Single Nucleotide, Risk Factors
Show Abstract · Added May 5, 2017
Resistant hypertension is defined as high blood pressure that remains above treatment goals in spite of the concurrent use of three antihypertensive agents from different classes. Despite the important health consequences of resistant hypertension, few studies of resistant hypertension have been conducted. To perform a genome-wide association study for resistant hypertension, we defined and identified cases of resistant hypertension and hypertensives with treated, controlled hypertension among >47,500 adults residing in the US linked to electronic health records (EHRs) and genotyped as part of the electronic MEdical Records & GEnomics (eMERGE) Network. Electronic selection logic using billing codes, laboratory values, text queries, and medication records was used to identify resistant hypertension cases and controls at each site, and a total of 3,006 cases of resistant hypertension and 876 controlled hypertensives were identified among eMERGE Phase I and II sites. After imputation and quality control, a total of 2,530,150 SNPs were tested for an association among 2,830 multi-ethnic cases of resistant hypertension and 876 controlled hypertensives. No test of association was genome-wide significant in the full dataset or in the dataset limited to European American cases (n = 1,719) and controls (n = 708). The most significant finding was CLNK rs13144136 at p = 1.00x10-6 (odds ratio = 0.68; 95% CI = 0.58-0.80) in the full dataset with similar results in the European American only dataset. We also examined whether SNPs known to influence blood pressure or hypertension also influenced resistant hypertension. None was significant after correction for multiple testing. These data highlight both the difficulties and the potential utility of EHR-linked genomic data to study clinically-relevant traits such as resistant hypertension.
0 Communities
2 Members
0 Resources
19 MeSH Terms
CranialCloud: a cloud-based architecture to support trans-institutional collaborative efforts in neurodegenerative disorders.
D'Haese PF, Konrad PE, Pallavaram S, Li R, Prassad P, Rodriguez W, Dawant BM
(2015) Int J Comput Assist Radiol Surg 10: 815-23
MeSH Terms: Cloud Computing, Computer Communication Networks, Cooperative Behavior, Humans, Neurodegenerative Diseases, Research
Show Abstract · Added February 23, 2016
PURPOSE - Neurological diseases have a devastating impact on millions of individuals and their families. These diseases will continue to constitute a significant research focus for this century. The search for effective treatments and cures requires multiple teams of experts in clinical neurosciences, neuroradiology, engineering, and industry. Hence, the need to communicate a large amount of information with accuracy and precision is more necessary than ever for this specialty.
METHODS - In this paper, we present a distributed system that supports this vision, which we call the CranialVault Cloud (CranialCloud). It consists in a network of nodes, each with the capability to store and process data, that share the same spatial normalization processes, thus guaranteeing a common reference space. We detail and justify design choices, the architecture and functionality of individual nodes, the way these nodes interact, and how the distributed system can be used to support inter-institutional research.
RESULTS - We discuss the current state of the system that gathers data for more than 1,600 patients and how we envision it to grow.
CONCLUSION - We contend that the fastest way to find and develop promising treatments and cures is to permit teams of researchers to aggregate data, spatially normalize these data, and share them. The CranialVault system is a system that supports this vision.
0 Communities
1 Members
0 Resources
6 MeSH Terms
The Mid-South clinical Data Research Network.
Rosenbloom ST, Harris P, Pulley J, Basford M, Grant J, DuBuisson A, Rothman RL
(2014) J Am Med Inform Assoc 21: 627-32
MeSH Terms: Comparative Effectiveness Research, Computer Communication Networks, Delivery of Health Care, Electronic Health Records, Georgia, Humans, Information Dissemination, Information Systems, Medical Record Linkage, Outcome Assessment (Health Care), Patient-Centered Care, Tennessee
Show Abstract · Added January 26, 2016
The Mid-South Clinical Data Research Network (CDRN) encompasses three large health systems: (1) Vanderbilt Health System (VU) with electronic medical records for over 2 million patients, (2) the Vanderbilt Healthcare Affiliated Network (VHAN) which currently includes over 40 hospitals, hundreds of ambulatory practices, and over 3 million patients in the Mid-South, and (3) Greenway Medical Technologies, with access to 24 million patients nationally. Initial goals of the Mid-South CDRN include: (1) expansion of our VU data network to include the VHAN and Greenway systems, (2) developing data integration/interoperability across the three systems, (3) improving our current tools for extracting clinical data, (4) optimization of tools for collection of patient-reported data, and (5) expansion of clinical decision support. By 18 months, we anticipate our CDRN will robustly support projects in comparative effectiveness research, pragmatic clinical trials, and other key research areas and have the capacity to share data and health information technology tools nationally.
Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
0 Communities
1 Members
0 Resources
12 MeSH Terms
Validating DICOM transcoding with an open multi-format resource.
Yvernault BC, Theobald CD, Smith JC, Villalta V, Zald DH, Landman BA
(2014) Neuroinformatics 12: 615-7
MeSH Terms: Computer Communication Networks, Database Management Systems, Humans, Neuroimaging, Programming Languages, Radiology Information Systems
Added May 27, 2014
0 Communities
2 Members
0 Resources
6 MeSH Terms
Validation of electronic medical record-based phenotyping algorithms: results and lessons learned from the eMERGE network.
Newton KM, Peissig PL, Kho AN, Bielinski SJ, Berg RL, Choudhary V, Basford M, Chute CG, Kullo IJ, Li R, Pacheco JA, Rasmussen LV, Spangler L, Denny JC
(2013) J Am Med Inform Assoc 20: e147-54
MeSH Terms: Algorithms, Computer Communication Networks, Electronic Health Records, Genetic Association Studies, Genetic Research, Humans, Medical Audit, Phenotype, United States, Validation Studies as Topic
Show Abstract · Added May 27, 2014
BACKGROUND - Genetic studies require precise phenotype definitions, but electronic medical record (EMR) phenotype data are recorded inconsistently and in a variety of formats.
OBJECTIVE - To present lessons learned about validation of EMR-based phenotypes from the Electronic Medical Records and Genomics (eMERGE) studies.
MATERIALS AND METHODS - The eMERGE network created and validated 13 EMR-derived phenotype algorithms. Network sites are Group Health, Marshfield Clinic, Mayo Clinic, Northwestern University, and Vanderbilt University.
RESULTS - By validating EMR-derived phenotypes we learned that: (1) multisite validation improves phenotype algorithm accuracy; (2) targets for validation should be carefully considered and defined; (3) specifying time frames for review of variables eases validation time and improves accuracy; (4) using repeated measures requires defining the relevant time period and specifying the most meaningful value to be studied; (5) patient movement in and out of the health plan (transience) can result in incomplete or fragmented data; (6) the review scope should be defined carefully; (7) particular care is required in combining EMR and research data; (8) medication data can be assessed using claims, medications dispensed, or medications prescribed; (9) algorithm development and validation work best as an iterative process; and (10) validation by content experts or structured chart review can provide accurate results.
CONCLUSIONS - Despite the diverse structure of the five EMRs of the eMERGE sites, we developed, validated, and successfully deployed 13 electronic phenotype algorithms. Validation is a worthwhile process that not only measures phenotype performance but also strengthens phenotype algorithm definitions and enhances their inter-institutional sharing.
0 Communities
1 Members
0 Resources
10 MeSH Terms
Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations.
Ge Y, Ahn DK, Unde B, Gage HD, Carr JJ
(2013) J Am Med Inform Assoc 20: 157-63
MeSH Terms: Computer Communication Networks, Computer Security, Confidentiality, Diagnostic Imaging, Feasibility Studies, Health Records, Personal, Humans, Information Dissemination, Information Storage and Retrieval, North Carolina, Patient Participation, Radiology Information Systems, United States, User-Computer Interface
Show Abstract · Added February 28, 2014
BACKGROUND - Current image sharing is carried out by manual transportation of CDs by patients or organization-coordinated sharing networks. The former places a significant burden on patients and providers. The latter faces challenges to patient privacy.
OBJECTIVE - To allow healthcare providers efficient access to medical imaging data acquired at other unaffiliated healthcare facilities while ensuring strong protection of patient privacy and minimizing burden on patients, providers, and the information technology infrastructure.
METHODS - An image sharing framework is described that involves patients as an integral part of, and with full control of, the image sharing process. Central to this framework is the Patient Controlled Access-key REgistry (PCARE) which manages the access keys issued by image source facilities. When digitally signed by patients, the access keys are used by any requesting facility to retrieve the associated imaging data from the source facility. A centralized patient portal, called a PCARE patient control portal, allows patients to manage all the access keys in PCARE.
RESULTS - A prototype of the PCARE framework has been developed by extending open-source technology. The results for feasibility, performance, and user assessments are encouraging and demonstrate the benefits of patient-controlled image sharing.
DISCUSSION - The PCARE framework is effective in many important clinical cases of image sharing and can be used to integrate organization-coordinated sharing networks. The same framework can also be used to realize a longitudinal virtual electronic health record.
CONCLUSION - The PCARE framework allows prior imaging data to be shared among unaffiliated healthcare facilities while protecting patient privacy with minimal burden on patients, providers, and infrastructure. A prototype has been implemented to demonstrate the feasibility and benefits of this approach.
1 Communities
1 Members
0 Resources
14 MeSH Terms
Barriers and facilitators to the use of computer-based intensive insulin therapy.
Campion TR, Waitman LR, Lorenzi NM, May AK, Gadd CS
(2011) Int J Med Inform 80: 863-71
MeSH Terms: Computer Communication Networks, Decision Support Systems, Clinical, Drug Therapy, Computer-Assisted, Electronic Health Records, Humans, Insulin, Intensive Care Units, Nurses, Qualitative Research, Retrospective Studies, Trauma Centers, Workflow
Show Abstract · Added January 20, 2015
PURPOSE - Computerized clinical decision support systems (CDSSs) for intensive insulin therapy (IIT) are increasingly common. However, recent studies question IIT's safety and mortality benefit. Researchers have identified factors influencing IIT performance, but little is known about how workflow affects computer-based IIT. We used ethnographic methods to evaluate IIT CDSS with respect to other clinical information systems and care processes.
METHODS - We conducted direct observation of and unstructured interviews with nurses using IIT CDSS in the surgical and trauma intensive care units at an academic medical center. We observed 49h of intensive care unit workflow including 49 instances of nurses using IIT CDSS embedded in a provider order entry system. Observations focused on the interaction of people, process, and technology. By analyzing qualitative field note data through an inductive approach, we identified barriers and facilitators to IIT CDSS use.
RESULTS - Barriers included (1) workload tradeoffs between computer system use and direct patient care, especially related to electronic nursing documentation, (2) lack of IIT CDSS protocol reminders, (3) inaccurate user interface design assumptions, and (4) potential for error in operating medical devices. Facilitators included (1) nurse trust in IIT CDSS combined with clinical judgment, (2) nurse resilience, and (3) paper serving as an intermediary between patient bedside and IIT CDSS.
CONCLUSION - This analysis revealed sociotechnical interactions affecting IIT CDSS that previous studies have not addressed. These issues may influence protocol performance at other institutions. Findings have implications for IIT CDSS user interface design and alerts, and may contribute to nascent general CDSS theory.
2011 Elsevier Ireland Ltd. All rights reserved.
0 Communities
1 Members
0 Resources
12 MeSH Terms
A health insurance portability and accountability act-compliant ocular telehealth network for the remote diagnosis and management of diabetic retinopathy.
Li Y, Karnowski TP, Tobin KW, Giancardo L, Morris S, Sparrow SE, Garg S, Fox K, Chaum E
(2011) Telemed J E Health 17: 627-34
MeSH Terms: Computer Communication Networks, Computer Security, Diabetic Retinopathy, Diagnosis, Computer-Assisted, Disease Management, Health Insurance Portability and Accountability Act, Humans, Image Processing, Computer-Assisted, Mississippi, North Carolina, Ophthalmology, Telemedicine, Tennessee, United States
Show Abstract · Added June 11, 2018
In this article, we present the design and implementation of a regional ocular telehealth network for remote assessment and management of diabetic retinopathy (DR), including the design requirements, network topology, protocol design, system work flow, graphics user interfaces, and performance evaluation. The Telemedical Retinal Image Analysis and Diagnosis Network is a computer-aided, image analysis telehealth paradigm for the diagnosis of DR and other retinal diseases using fundus images acquired from primary care end users delivering care to underserved patient populations in the mid-South and southeastern United States.
0 Communities
1 Members
0 Resources
MeSH Terms
A secure protocol to distribute unlinkable health data.
Malin BA, Sweeney L
(2005) AMIA Annu Symp Proc : 485-9
MeSH Terms: Algorithms, Computer Communication Networks, Computer Security, Confidentiality, Database Management Systems, Genetic Privacy, Humans, Medical Records Systems, Computerized
Show Abstract · Added March 29, 2013
Health data that appears anonymous, such as DNA records, can be re-identified to named patients via location visit patterns, or trails. This is a realistic privacy concern which continues to exist because data holders do not collaborate prior to making disclosures. In this paper, we present STRANON, a novel computational protocol that enables data holders to work together to determine records that can be disclosed and satisfy a formal privacy protection model. STRANON incorporates a secure encrypted environment, so no data holder reveals information until the trails of disclosed records are provably unlinkable. We evaluate STRANON on real-world datasets with known susceptibilities and demonstrate data holders can release significant quantities of data with zero trail re-identifiability.
1 Communities
1 Members
0 Resources
8 MeSH Terms
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
Malin B, Sweeney L
(2004) J Biomed Inform 37: 179-92
MeSH Terms: Algorithms, Computer Communication Networks, Computer Security, Confidentiality, Database Management Systems, Databases, Genetic, Genetic Privacy, Genetic Testing, Genomics, Information Storage and Retrieval, Medical Records Systems, Computerized
Show Abstract · Added March 29, 2013
The increasing integration of patient-specific genomic data into clinical practice and research raises serious privacy concerns. Various systems have been proposed that protect privacy by removing or encrypting explicitly identifying information, such as name or social security number, into pseudonyms. Though these systems claim to protect identity from being disclosed, they lack formal proofs. In this paper, we study the erosion of privacy when genomic data, either pseudonymous or data believed to be anonymous, are released into a distributed healthcare environment. Several algorithms are introduced, collectively called RE-Identification of Data In Trails (REIDIT), which link genomic data to named individuals in publicly available records by leveraging unique features in patient-location visit patterns. Algorithmic proofs of re-identification are developed and we demonstrate, with experiments on real-world data, that susceptibility to re-identification is neither trivial nor the result of bizarre isolated occurrences. We propose that such techniques can be applied as system tests of privacy protection capabilities.
1 Communities
1 Members
0 Resources
11 MeSH Terms