Literature DB >> 35360481

Construction of a Health Management Model for Early Identification of Ischaemic Stroke in Cloud Computing.

Yuying Yang1, Qing Chang2, Jing Chen3, Xiangkun Zhou4, Qian Xue2, Aixia Song2.   

Abstract

Knowledge discovery and cloud computing can help early identification of ischaemic stroke and provide intelligent, humane, and preventive healthcare services for patients at high risk of stroke. This study proposes constructing a health management model for early identification and warning of ischaemic stroke based on IoT and cloud computing, and discusses its connotation, constructive ideas, and research content so as to provide reference for its health management in order to develop and implement countermeasures and to compare the awareness of early stroke symptoms and first aid knowledge among stroke patients and their families before and after the activity. The rate of awareness of early symptoms and first aid among stroke patients and their families increased from 36% to 78%, and the difference was statistically significant (P < 0.05) before and after the activity.
Copyright © 2022 Yuying Yang et al.

Entities:  

Mesh:

Year:  2022        PMID: 35360481      PMCID: PMC8964206          DOI: 10.1155/2022/1018056

Source DB:  PubMed          Journal:  J Healthc Eng        ISSN: 2040-2295            Impact factor:   2.682


1. Introduction

A health education team was formed in the Department of Emergency Medicine and the Department of Neurology to promote early symptom recognition and first aid knowledge, and a clear division of labour and standardised teaching materials created a good space and atmosphere for teaching [1-3]. In addition, the “Green Health” WeChat public number was set up to promote stroke and first aid knowledge through the Internet in the form of graphics and videos, which not only enriched the form of education on stroke disease and first aid knowledge but also broadened the publicity channels and helped to promote the education of stroke patients and their families on stroke disease and first aid knowledge. This is conducive to the homogenisation of stroke patients' and families' knowledge of stroke disease and first aid, and can improve the effectiveness of education [4-6]. Using WeChat as a new communication medium not only breaks the limits of time and space but also allows for the instant dissemination of new knowledge and information, enabling interactive communication between healthcare professionals and patients and their families [3] so that stroke patients and their families can learn about stroke disease knowledge and first aid anytime and anywhere, thus increasing the level of knowledge of stroke disease and first aid among patients and their families [7]. Quality management is an automatic and spontaneous activity carried out by people at the work site or in interrelated areas [8], characterised by a combination of leaders, technicians, and employees, with individuals gaining a sense of involvement and achievement in their work [9]. At the same time, circle activities improve the motivation of the circle members, enhance team cohesion, and contribute to the progress and development of the stroke patient team. Therefore, quality management circle activities can improve the work ability of individual members and promote the development of stroke patient teams [10]. In summary, the use of quality management circles not only improves the ability of stroke patients and their families to identify early symptoms but also gives full play to the individual potential of the circle members, improves their individual work ability, and promotes the development of the stroke patient workforce.

2. Stroke Management Model

2.1. Internet of Things

The IoT management model is based on Internet of Things (IoT) technology and with its superior bionic characteristics. It is a powerful tool in expanding human thinking, liberating human labour, and promoting social progress. In summary, the IoT management model is a four-sided linkage of the sensing side (radio frequency identification, sensors, etc.) [11], the transmission side (Internet, mobile Internet and 5G technology, etc.) [1], the cloud side (cloud computing, big data technology, artificial intelligence, etc.), [12] and the application side (various network platforms), with each side integrating technological innovation, management innovation, and institutional innovation, forming a modern intelligent management model of “four linked ends and three in one” [13]. The sending end is the base layer of the IoT management model and is the necessary gateway for the exchange of information in the virtual and real space of the IoT management model [14]. In other words, the sensing side is the input side of the IoT management model system, which acts directly on the environment, and the information technology mainly relies on its various sensing devices that identify and capture information, such as radio frequency identification (RFID) technology and wearable devices. The cloud is the “brain” of the IoT management model, relying on powerful comprehensive analysis functions to continuously output power for the survival of the IoT management model [15]. After receiving the information captured by the sensing end, the cloud uses modern information technology, such as big data technology and management cloud computing, to conduct a comprehensive analysis. This process takes decision makers out of the tedious process of information analysis and allows them to focus on making good decisions [16]. The “trinity” innovation system of the IoT management model, with its “four-end linkage” organisational structure, only provides a realistic framework for the IoT management model, but to make it work in practice, it is necessary to rely on the “trinity” system. “Trinity” system guarantees to clear the realistic obstacles for the IoT management model [17-19].

2.2. Health Management

Health management is a process of comprehensive management of health risk factors for an individual or a population [20]. This process is carried out by professionals who provide advisory guidance and follow-up counselling services to enable individuals to receive comprehensive health maintenance and protection services in multiple dimensions, including social, psychological, environmental, nutritional, and exercise, through health information collection, health testing, health assessment, personalised health management programmes, and health interventions [21].

3. Building Ideas

Data collection: patients at a risk of stroke have their signs collected by lower limb muscle monitors, voice recognition devices, and other sign monitoring devices [22]. Operation and monitoring: the data are transmitted wirelessly to the user's terminal access device and application software, and the stroke cloud platform organises it into a database for monitoring, calculation, and analysis. Once the monitored indicators reach the threshold, an alarm signal will be sent out via GPS and healthcare professionals will take immediate action to ensure that the stroke patient is treated within a short and valuable window of time (see Figure 1).
Figure 1

IoT and cloud-based health management model for early identification and warning of ischaemic stroke.

To achieve partial encryption of medical stroke patient privacy information based on cloud computing, a data transfer model for encrypting medical stroke patient privacy information is constructed in a finite domain [23]. The ciphertext transfer protocol is Decrypt (sk, c)A−1=T=(t), the encrypted transfer control of the medical stroke patient privacy information system is performed using public key cryptography, the system master key is constructed, and the dynamic key for encrypting medical stroke patient privacy information safely is as follows: Using the security parameter ν as input, the unscripted data in the medical stroke patient privacy information are authorized to be encrypted using a random variable signed encryption algorithm, a user authentication protocol for encrypting medical stroke patient privacy information is established, and an encapsulation protocol for partially encrypting medical stroke patient privacy information is constructed [24], and the entropy and minimum entropy for encrypting medical stroke patient privacy information are obtained as shown in equation (2), respectively. For the identity user, considering the randomness of the output certificate, the security parameter K and symmetric key K of medical stroke patient privacy information encryption are input, and the key of medical stroke patient privacy information system encryption is reset. Through the key expansion method, the key expansion sequence X=x1, x2,…, x of medical stroke patient privacy information is obtained. The method of p-order cyclic group mapping is adopted. The weighted vectors and of medical stroke patients' privacy information with a length of bits are generated, and the encrypted ciphertext sequence of medical stroke patients' privacy information is S=x1+, x2+⋯+x. The user ID and message M are entered, and the ciphertext of layer L+1 of medical stroke patients' privacy information transmission data is shown in the following equation: Using the keyword encryption algorithm, the user ID private key sk and two identities ID, ID are entered and the output sequence of plaintext medical stroke patient privacy information is as follows: The resulting arithmetic coding model for encrypting private information of medical stroke patients is shown in Figure 2.
Figure 2

Arithmetic coding model for encryption of private information of medical stroke patients.

This paper proposes a cloud-based data encryption algorithm for establishing an arithmetic coding model for stroke patient privacy information and designing a key for stroke patient privacy information [25]. The decrypted private key of ID is used for key resigning to obtain a statistic P value ≥ 0.01 for the decrypted key, and the transformed ciphertext is processed for cloud information fusion when it satisfies KS ∈ {0,1}, by generating four empty lists H1 − list, H2 − list, ds  k − list, and rsk − list to obtain a linear encoding distribution function for the privacy information of medical stroke patients, as shown in the following equation:where Ι denotes the private key of the medical care private message sender; the initial value I = [0, 1] is set, f is rewritten as f(y)=∑cy to obtain the feature vector v ∈ Z, the public key of the medical care private message transmission pk=se2, (u)1≤,  se3,  (δ(0))0≤,  (δ(1))0≤ private key sk=(s, s)1 ≤ i, j ≤ μ is calculated to obtain the medical stroke patient privacy information encryption and decryption protocol [24, 26]. h 1′,…, h′ ∈ Z is randomly selected to achieve key construction of private information for medical stroke patients, as shown in Figure 3.
Figure 3

Key design for private information of medical stroke patients.

4. Case Studies

4.1. Object

110 stroke patients and their families in the Emergency Medicine and Neurology Departments from 18 March 2020 to 18 April 2020 were selected for the preprotocol circle activity, and 110 stroke patients and their families hospitalized from 25 April 2020 to 25 June 2020 were selected for the postprotocol circle activity. Stroke patients and their families have little knowledge of stroke risk factors and early warning signs, with a 23.7% awareness rate of stroke warning signs [27]. The majority of stroke patients in China do not recognise stroke symptoms at an early stage thus delaying the best time for treatment, which seriously affects the outcome and prognosis of stroke patients. Therefore, the theme of this campaign is to raise awareness of early warning for stroke patients and their families so as to improve their ability to recognise stroke symptoms and knowledge of first aid and to enable them to seek timely medical attention and receive effective treatment [28].

4.2. Results

After the implementation of the campaign, the awareness rate of patients and family members about early stroke symptoms and first aid was 78%, based on the formula: target achievement rate = (postimprovement data - preimprovement data)/(target value - preimprovement data) × 100%, resulting in a target achievement rate of 116.7%. Knowledge of early stroke symptoms and first aid among stroke patients and their families before and after the event is shown in Table 1.
Table 1

Comparison of stroke patients' and families' knowledge of early stroke symptom recognition and first aid.

TimeNumber of peopleKnow (person)Awareness rate (%)
Before development1104036
After development1108678
The circle members have grown in the use of QC techniques, team spirit, responsibility and honour, communication and coordination, motivation, logical thinking, professional knowledge, and personal potential, especially in the area of QC techniques and personal potential (see Figure 4).
Figure 4

Five star result radar map.

5. Simulation Test Analysis

MATLAB was used to design the experiments. The key extraction homomorphic vector was , and the sampling frequency of the private information of stroke patients was 15 MHz Table 2.
Table 2

Experimental parameter settings.

Parameter setting t max ML P m P c
Parameter value1226130.450.79
Based on the above parameter settings, the partial encryption of private information of medical stroke patients was obtained, and the time-domain distribution of the original encrypted data was obtained [29, 30], as shown in Figure 5.
Figure 5

Time-domain distribution of data encryption.

Using the data in Figure 5 as the study object, the partial encryption of stroke patients' private information was performed and the encryption results were obtained, as shown in Figure 6.
Figure 6

Encrypted data output.

Analysis of Figure 6 shows that the method in this paper can effectively achieve the partial encryption of private information of medical stroke patients, with good encryption resistance to attacks. The encryption depth was tested, and the comparison results were obtained, as shown in Table 3.
Table 3

Medical stroke patient privacy information encryption depth test.

Iterations (time)This method/dBReference [4] (dB)Reference [5] (dB)
10013.578.2111.76
20024.7511.4613.54
30032.4415.5322.53
40042.6520.4625.57
As can be seen from Table 3, when the number of iterations is 100, 200, 300, 400, etc., the test results obtained by using this paper for the encryption depth of medical stroke patients' privacy information are higher than those obtained by traditional methods, and when the number of iterations is 400, the encryption depth of medical stroke patients' privacy information by using this paper is as high as 400 dB. The encryption is more resistant to attacks, and the encryption depth is deeper.

6. Conclusions

The incidence of stroke is currently high, but the state of implementation of early stroke recognition is worrying. The delay in admission of stroke patients is serious, with a delay in the attendance rate of approximately 60%. The early identification of ischaemic stroke patients needs urgent improvement. The application of this model, consisting of muscle force acquisition sensors, voice acquisition sensors, network data storage, cloud data processing, mobile cloud clients, and network transmission, can achieve accurate and timely identification of ischaemic stroke patients who have just developed a stroke at any time and any place, and provide timely alerts through Internet of Things and cloud platform [29, 30].
  16 in total

1.  Construction of urease-negative mutants of Yersinia enterocolitica serotypes O:3 and o:8: role of urease in virulence and arthritogenicity.

Authors:  C Gripenberg-Lerche; L Zhang; P Ahtonen; P Toivanen; M Skurnik
Journal:  Infect Immun       Date:  2000-02       Impact factor: 3.441

Review 2.  Non-classical mechanisms of heart repair.

Authors:  Gina C Schatteman
Journal:  Mol Cell Biochem       Date:  2004-09       Impact factor: 3.396

3.  An unusual case of clear cell sarcoma arising in the jejunum highlights the diagnostic value of molecular genetic techniques in establishing a correct diagnosis.

Authors:  R Achten; M Debiec-Rychter; I De Wever; R Sciot
Journal:  Histopathology       Date:  2005-04       Impact factor: 5.087

4.  Long-term effect of suboptimal dietary magnesium on magnesium and calcium contents of organs, on cold tolerance and on lifespan, and its pathological consequences in rats.

Authors:  O Heroux; D Peter; A Heggtveit
Journal:  J Nutr       Date:  1977-09       Impact factor: 4.798

5.  Lack of TAFI increases brain damage and microparticle generation after thrombolytic therapy in ischemic stroke.

Authors:  J Orbe; N Alexandru; C Roncal; M Belzunce; P Bibiot; J A Rodriguez; J C M Meijers; A Georgescu; J A Paramo
Journal:  Thromb Res       Date:  2015-06-11       Impact factor: 3.944

6.  A case of hemiparesis associated with cranial nerve lesions due to intravascular lymphomatosis(2003:4b).

Authors:  Y De Bruecker; P Demaerel; G Wilms; R Sciot; F Ballaux; W Robberecht
Journal:  Eur Radiol       Date:  2003-07       Impact factor: 5.315

7.  Association of the tumour necrosis factor alpha -308G/A polymorphism with the risk of diabetes in an elderly population-based cohort.

Authors:  B T Heijmans; R G J Westendorp; S Droog; C Kluft; D L Knook; P E Slagboom
Journal:  Genes Immun       Date:  2002-06       Impact factor: 2.676

8.  ESC-BRAIN: experimental and clinical stroke research--do they connect?. Meeting report of the ESC-BRAIN joint symposium held in London and Shanghai in May 2013.

Authors:  J-C Baron; I M Macrae; H P Adams; U Dirnagl
Journal:  Cerebrovasc Dis       Date:  2013-10-30       Impact factor: 2.762

9.  Current genomics in cardiovascular medicine.

Authors:  Vinit Sawhney; Scott Brouilette; Dominic Abrams; Richard Schilling; Benjamin O'Brien
Journal:  Curr Genomics       Date:  2012-09       Impact factor: 2.236

Review 10.  Nutrigenetics and metabolic disease: current status and implications for personalised nutrition.

Authors:  Catherine M Phillips
Journal:  Nutrients       Date:  2013-01-10       Impact factor: 5.717

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.