Article ID Journal Published Year Pages File Type
384461 Expert Systems with Applications 2012 10 Pages PDF
Abstract

Considering the demand for improvement of monitoring the elders’ states of health, various kinds of intelligent medical devices have been designed by health care industries recently. This paper, therefore, develops an integrated Institutional Review Board (IRB) system to connect to hospitals, clinics, manufacturers, and customers for sharing information, reducing administrative costs, and further improving the quality of intelligent medical devices design. Moreover, two efficient security protocols are designed to establish secure communications in our developed integrated IRB system for protecting sensitive and confidential information. Main contributions of our developed IRB system are listed below. (i) The developed system provides a similar expert system to assist the development of intelligent medical devices and instantaneous management of clinical trails. (ii) Information about clinical trials and knowledge, clinical professionals, and trail investigators can be well constructed and maintained as a knowledge base for improving quality and efficiency of future clinical trials. (iii) The system provides a standard operating process and project management for clinical trials. (iv) It is efficient in accessing to IRB certification. (v) The developed system allows or assists the trial investigators and manufactures to communicate and cooperate with one another via a platform. (vi) Secure communications can be established in our IRB system, and hence all sensitive and confidential information can be protected from being disclosed. (vii) It is secure against potential attacks while users login to the developed IRB system.

► The system provides a expert system to assist the new medical product development. ► Information is constructed as knowledge for improving quality of future trials. ► The system assists the trial users to cooperate with one another via a platform. ► It is secure against potential attacks while users login to the developed system.

Related Topics
Physical Sciences and Engineering Computer Science Artificial Intelligence
Authors
, , ,