Next Article in Journal
Stable Variable Selection Method with Shrinkage Regression Applied to the Selection of Genetic Variants Associated with Alzheimer’s Disease
Previous Article in Journal
Sound-Absorbing, Thermal-Insulating Material Based on Poly(methylsiloxane) Xerogel and Cellulose Nanofibers
Previous Article in Special Issue
Fractal Analysis Applied to the Diagnosis of Oral Cancer and Oral Potentially Malignant Disorders: A Comprehensive Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Special Issue on eHealth Innovative Approaches and Applications

by
Stefano Silvestri
* and
Francesco Gargiulo
*
Institute for High Performance Computing and Networking, ICAR-CNR, Via Pietro Castellino 111, 80131 Naples, Italy
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2024, 14(6), 2571; https://doi.org/10.3390/app14062571
Submission received: 11 March 2024 / Accepted: 14 March 2024 / Published: 19 March 2024
(This article belongs to the Special Issue eHealth Innovative Approaches and Applications)

1. Introduction

Innovative ICT technologies, approaches and applications are becoming increasingly pervasive in several domains, including in medicine and healthcare. In these latter cases, physicians and medical professionals can recently incorporated complex and advanced systems, based on the latest technologies, into their daily routines. Scientific research constantly proposes new approaches and applications with high potential for usage in the eHealth sector. For example, the advent of digitised images in pathology and advances in Artificial Intelligence (AI) have led to an explosion of innovation in the traditional field of pathology, creating what is now described as Computational Pathology [1], which defines new and increasingly effective AI approaches for digital image analysis. Similarly, the pervasive adoption of AI in other medical fields has allowed the definition and implementation of innovative systems to support the work of physicians, medical professionals and policy makers, such as recommender systems [2], smart patient support and remote monitoring systems [3,4]. Another technology that has become increasingly pervasive in medicine in recent years is the Internet of Medical Things (IoMT), which is currently largely adopted in healthcare; this technology is redefining smart healthcare systems and approaches to providing care [5].
Furthermore, the great recent improvements in the field of Natural Language Processing (NLP), with the release of Large Language Models (LLMs) such as ChatGPT, also impacted the biomedical domain, quickly leading to the widespread use of these models in medical research (as in other domains) or in healthcare. Recently, LLMs have provided functional eHealth applications ranging from the development of virtual medical assistants to the acceleration of various benchmarks of several biomedical information tasks, including document classification or relation extraction, exploiting closed-domain models such as BioBERT [6], or BERTMeSH [7]. Examples of further innovative eHealth technologies based on LLMs are smart assistants and question-answering systems, such as Med-PaLM 2 [8], ChatDoctor [9] or MedPrompt [10], which obtain very promising performances and results.
On the other hand, this current revolution in the medical domain, thanks to these new technologies and approaches, has some drawbacks and issues that must be taken into account in order to effectively exploit all its advantages without any risks or problems. eHealth approaches must guarantee the required levels of privacy and security [11,12,13] during the processing, transmission and sharing of medical and personal information, preventing violations or thefts of patients’ sensitive medical data. The scarcity of medical and clinical datasets with high-quality annotations is also a limitation in the development and improvement of innovative eHealth approaches [14,15,16]. Furthermore, the increasing number of connected medical devices and the complex digital healthcare delivery systems cause several cyber security issues [17,18], due to the increased risk of surface attack. Thus, defining innovative cyber security techniques specifically tailored for the healthcare domain is required. The growing volume of medical data, and their complexity and heterogeneity, pose additional challenges for the effective extraction of valuable insights [19,20,21]. In this case, tailored approaches are also required [22,23]. Moreover, physician, medical professional and patient awareness must be increased, and all parties must be warned of the possibilities and threats inherent to digital medicine [24,25].
In this scenario, it becomes crucial to disseminate the most recent results and enhancements achieved by research in the domain of eHealth. While taking full advantage of the latest advances in ICT approaches applied to the medical sector, their issues and limits must also be highlighted in order to, finally, facilitate the effective and widespread adoption and usage of the most innovative eHealth systems by patients, physicians and healthcare organisations.
This Special Issue presents innovative eHealth approaches and applications, which apply the most recent ICT technologies and techniques, such as IA, IoMT and others, to implement smart tools and methodologies to support the work of physicians and to promote the adoption of new eHealth tools in medicine and by healthcare organisations. At the same time, these contributions address the issues that usually affect this domain, like data privacy, the cyber security of the devices and healthcare infrastructures, the awareness and the involvement of medical personnel, etc. Therefore, the articles included in this Special Issue represent useful resources targeted to a multidisciplinary audience.

2. Published Articles

The main purpose of this Special Issue was to collect recent developments and research in the eHealth domain, presenting innovative approaches and applications while considering a multidisciplinary approach and multi-perspective views, including medicine, Information and Communication Technologies, Artificial Intelligence (AI), Internet of Things (IoT), Big Data Analytics, Cyber Security, and others. The focus of this Special Issue centres on the whole e-health domain.
In total, there were 13 contributions selected for this Special Issue (listed after Section 3), which propose innovative approaches and applications in the previously mentioned areas. These articles have been provided by researchers with broad expertise in different fields and backgrounds, such as medicine, informatics and engineering.
The published papers belong to the main specific areas of eHealth, while some papers present multidisciplinary approaches; therefore, they are included in more than one area: (i) COVID-19 classification; (ii) Artificial Intelligence; iii) Medical Imaging; (iv) Fractal Analysis; (v) Internet of Medical Things (IoMT); (vi) Machine Learning; (vii) Cyber Security; viii) Mobile Medical Apps; (ix) Scientific Literature Retrieval; and (x) Large Language Models. A summary of the papers published in this Special Issue is presented below.
Silvestri et al. (contribution 1) described a complex Deep Learning architecture, whose main aim is to improve the eXtreme Multilabel Text Classification problem [26] related to the classification and large-scale semantic indexing of scientific articles in PubMed [27]. In detail, the authors proposed an architecture called the Hierarchical Deep Neural Network (HDNN), which reproduces the same topology of the label set, in the case where this set is hierarchically organised (such as the MeSH adopted by PubMed). The experimental assessment performed by the authors compared the performances of the proposed HDNN with a classic flat CNN DL architecture for text classification when applied to task of semantically indexing PubMed articles. The results showed that the HDNN outperforms the CNN, in particular in the cases of hierarchical measures, demonstrating that, when a hierarchical label set is available, the reproduction of the label hierarchy directly into the DL architecture provides significant benefits. On the other hand, this complex and deep architecture has a high computational time, due to the need, during training, of propagating the weights calculated in a certain level to the next level before updating the weights of the next level of the HDNN architecture. Therefore, a more efficient parallel architecture is foreseen as an area of future work by the authors.
The contribution of Inigo Lopez-Gazpio (contribution 2) introduced an innovative Problem-Based Learning (PBL) methodology to enhance the teaching of Android programming education, specifically tailored for the development of nutritional applications. The main novelty of the proposed approach is the integration of advanced programming concepts with practical application development, fostering deeper understanding and engagement among students. In detail, this application allows the programmers to access extensive and detailed nutritional information from different open-access food databases. The proposed approach was tested in a research project that involved third-year students of the Computer Science faculty at the University of Deusto in Spain. The students were engaged in the development of applications aimed at improving access to nutritional knowledge. The preliminary results of this research indicated a significant improvement in student engagement and learning outcomes compared to traditional teaching methods, underlining the possible use of this methodology in fostering research and advancing educational practices in computer science. The findings not only provided insights related to the unique challenges associated with Android programming, but also suggested possible customised educational strategies that can optimise the learning experience.
Alourani et al. (contribution 3) presented a framework for the efficient management of IoMT devices over an Information Centric Network (ICN). The current massive traffic growth generated by IoMT causes challenges related to the transmission of these data [12]. An approach to reduce IoMT traffic is the adoption of ICN [28], which leverages persistent naming multicast communication and thus reduces the response time. In this way, ICN used for IoMT can reduce the overhead due to the distribution of commonly accessed content. On the other hand, the excessive and unbalanced energy consumption of the IoMT devices that the ICN could cause can degrade the performance of the network. To address this issue, the authors presented a framework called the Dynamic Cache Scheme (DCS), which implements energy-efficient cache scheduling in IoMT over ICN with the aim of reducing network traffic and mitigating energy-related issues. This framework establishes a balance between multi-hop traffic and data item freshness by leveraging an effective use for caching in IoMT. The authors tested several parameters, such as the cache–hit ratio, stretch and content retrieval latency, comparing the obtained results with the current state of the art. The results demonstrated that the DCS approach outperforms the compared models in terms of the cache–hit ratio, stretch and content retrieval latency. The authors also assessed its possible adoption in other domains and scenarios.
Viana dos Santos Santana et al. (contribution 4) compared different ML models for the correct classification of COVID-19 and influenza (which present similar symptoms) during coexisting outbreaks in Brazil. In detail, they tested Decision Tree (DT), Multilayer Perceptron (MLP), Gradient Boosting Machine (GBM), Random Forest (RF), eXtreme Gradient Boosting (XGBoost), K-Nearest Neighbors, Support Vector Machine (SVM), and Logistic Regression algorithms on real COVID-19 and influenza datasets, which are openly available and were acquired by Brazilian healthcare. The obtained results were also assessed using a 10-fold cross-validation method, which increased their confidence. Finally, the authors analysed and commented on the obtained results, highlighting some specific features of each tested approach, and providing useful hints for the adoption of ML-based systems in the decision-making processes of physicians and policy makers.
The paper from Karagiannis et al. (contribution 5) discusses the cyber security issues related to the transmission of standard DICOM (Digital Imaging and Communications in Medicine) medical images. The universal adoption of DICOM images has revolutionised digital imaging in medicine, providing standard tools for the storage, sharing and transmission of both medical images and their related data (included, in a standard way, into the DICOM tags of the image). On the other hand, the implementation and deployment of the DICOM protocol often suffer from incomplete understanding, causing cyber security vulnerabilities within the healthcare ecosystem [29]. The authors of the paper proposed a specific implementation of DICOM for the communication of images and their related data to the PACS (Picture Archiving and Communication System) servers, whose main purpose is to address possible cyber threats. Moreover, they also implemented a simulation environment which is able to produce network traffic related to the use of the DICOM protocol. Overall, the resources provide the researchers with an advanced platform for the implementation of security control tests for evaluating the robustness of security measures, identifying vulnerabilities, and testing security configurations. In this way, they gain a comprehensive understanding of DICOM communication and its practical implementation. Finally, the generated traffic allowed for the creation of realistic datasets, which are useful for the development of ML, and anomaly detection techniques.
Suvirtat et al. (contribution 6) investigated the use of Large Language Models (LLMs) for coding inpatient diagnoses. ICD coding is very useful for several tasks, ranging from statistical analysis to clinical research or medical billing, as well as for ensuring and improving the interoperability of medical documents. Moreover, the application of ICD coding is often mandatory for several official documents in many countries. The automatic application of ICD coding is not an easy task due to the very large number of codes; moreover, the complexity of clinical and medical language, which is used in many documents that must be tagged with the corresponding ICD codes, makes this task more difficult. The paper presented an analysis of the performance of three LLMs (mBERT [30], Multilingual E5 [31] and MEDPSU-RoBERTa [32]), examining their performances on a very large Thai language dataset formed from inpatient admissions. The results showed satisfactory results and confirmed that MEDPSU-RoBERTa, which is a domain-specific model, is able to achieve the best results. The results also highlighted that the performances are strictly dependent on the datasets, obtaining more accurate results in the cases of codes with larger number of samples, while the rarity of certain diseases (and corresponding documents in the datasets) posed challenges to accurate coding. Finally, the results underlined the difficulties when the models are faced with long clinical documents.
Czekster et al. (contribution 7) produced work focused on the security of IoMT devices, presenting a systematic literature review of Risk Assessment approaches specifically devoted to the IoMT. IoMT devices can be very effective instruments in supporting the remote management and care of patients; on the other hand, as they are able to collect and transmit sensitive data, they have critical and strict security requirements. While classic cyber security Risk Assessment approaches can be exploited to identify and assess potential risks, they are not able to manage sophisticated cyber-attacks in near real time. In these latter cases, Dynamic Risk Assessment (DRA) approaches [33] are more suitable for tackling the risks to patients when using IoMT devices. The authors produced a detailed literature review of RA related to the IoMT, highlighting the current trends and the more recent approaches in this field. In more detail, the review first focused on the significant ways of mitigating the impact of unauthorised intrusions, protecting end-users from personal data leakage and ensuring the device usage continuity. Furthermore, the paper identified the main research directions for DRA, addressing the challenges related to the dynamic infrastructures and the uncertain attack surfaces, with the aim of improving user protection and preventing cyber attacks.
The contribution from Pervan et al. (contribution 8) described a DICOM-based medical image communication system named Medical Imaging and Diagnostics on the Move (MIDOM). The proposed system includes some enhancements based on evolutions of the custom lossless Classification and Blending Predictor Coder (CBPC) [34] compression method previously developed by the same authors. Moreover, the MIDOM system was also integrated with Orthanc [35], a lightweight DICOM server, and a medical images-storing PACS server. The proposed system was tested on five real-world anonymised medical image sets, evaluating compression ratios and latency reduction, with the aim of simulating scenarios where medical service availability might be severely limited. The obtained results in all scenarios demonstrated that MIDOM, exploiting the included compression methods, was able to lower the network latency by at least 60% with respect to the transmission of raw and uncompressed image sets, allowing, at the same time, the perfect reconstruction of medical images.
Karagiannis et al. (contribution 9) described Chidroid, a mobile Android application whose purpose is retrieving, collecting and distributing logs from smart healthcare devices in the domain of the IoMT. The growing adoption of IoMT-connected devices in healthcare has also caused an increase in cyber attacks [36], which could potentially provide attackers with access to patients’ Personal Health Information (PHI) [37]. The approach described in this paper allows for the creation of datasets, semi-structured data or structured data from unstructured data. These datasets can be very useful for the development of AI methods for detecting cyber security threats and vulnerabilities and mitigating them. Moreover, Chidroid can be used as a policy-based tool to analyse the security issues in the most recent versions of Android. The tests performed demonstrated the effectiveness of the application, which retrieves logs and system metrics from several IoMT devices. Finally, the paper presented a method to perform a security analysis on Android devices that uses minimal system resources and reduces battery consumption.
The study from Fordellone et al. (contribution 10) focuses on an entropy-based fuzzy clustering technique for interval-valued data (EFC-ID) for cancer detection. The early detection of cancer can improve the chances of successful treatment, and screening techniques have the purpose of identifying possible signs of specific cancers or pre-cancers before symptoms have developed. On the other hand, precise detection mainly relies on human experience, and is thus affected by human and visual inspection errors. The authors tested the proposed clustering approach on the Breast dataset, demonstrating that EFC-ID can obtain better results compared to FKM in terms of several metrics (AUC, sensitivity and specificity). Moreover, further experiments on the Multiple Myeloma data demonstrated that EFC-ID outperforms the classic FKM in terms of Chi-squared, Accuracy rate and Adjusted Rand Indexes. The obtained results confirmed that the proposed EFC-ID is able to correctly identify the natural partition.
Contaldo et al. (contribution 11) presented a review paper that reports on the recent literature on the applications of fractal analysis devoted to the diagnosis of oral cancer and Oral Potentially Malignant Disorders. In the case of fractal analysis applied to diagnostics, the Fractal Dimension (FD) is usually calculated as a measure of the degree of regularity of a tissue or structure [38]. This feature can be applied to the analysis of lesions (such as oral lesions) to determine the degree of irregular tissue/vascularisation derailment; physicians correlate this with the nature of the lesion with the aim of identifying possible cancerous lesions. This paper evaluates the recent published literature on the fractal analysis of oral cancer and its precursors, namely Oral Potentially Malignant Disorders (OPMDs), investigating the specific FD that can be predictive of cancer and OPMDs. The authors only considered articles from three literature databases (Scopus, PubMed and Web of Science), and investigated according to the PRISMA checklist to analyse if fractal analysis can support the diagnosis of oral cancer and, moreover, if it can distinguish it from its precursors. The results of this review highlighted that fractal analysis, when applied to oral oncology, is promising, because it can be adopted as an effective and noninvasive diagnostic and prognostic tool for various premalignant lesions, especially for measuring the progression of premalignant lesions and OPMDs [39].
Kioskli et al. (contribution 12) framed the current state of cyber hygiene, explaining the related context and habits of end-users. They then proposed several best practices that should be adopted by healthcare organisations and professionals in order to achieve a high level of cyber hygiene, particularly regarding human-centric approach. Currently, critical healthcare infrastructures are very vulnerable to cyber attacks [40], as demonstrated by the several successful cyber attacks in recent years. Many of these are caused by a lack of awareness and incorrect behaviours on the part of end-users, who do not adopt the required level of cyber hygiene, i.e, regularly and promptly applying software updates, or adopting unique and strong passwords. Thus, the issues faced in this paper are of great importance and urgency, considering the large and increasing number of cyber attacks in the healthcare domain; these are very often caused by human errors. Therefore, cyber education can prevent many of the issues caused by poor cyber hygiene. On the other hand, cyber security and hygiene eduction for non-expert users (such as in the case of the healthcare domain) should adopt human-centric approaches to be more effective. Therefore, this paper firstly reports the best practices that should be adopted by healthcare organisations and professionals to achieve a high level of cyber hygiene. Moreover, it explains how these best practises could be applied in a use-case scenario with the aim of improving awareness about privacy and cyber security. Finally, the authors presented their long-term vision based on human-centric approaches, which aims to facilitate the development of efficient practices and education associated with cyber hygiene, leveraging a flexible, adaptable and practical framework.
The article from Junaid et al. (contribution 13) is a review of the more recent advances in Artificial Intelligence and Wearable Sensors in Healthcare Delivery. The combined use of AI and IoT in healthcare allows for defining frameworks and solutions for the smart analysis of health and clinical data, improving the work of physicians and providing additional evidence for clinical decisions. Therefore, the authors highlighted how the application of AI and the IoT has changed healthcare service delivery from the traditional hospital-centred model to a personal portable device-centred model. In detail, this literature review highlights how recent research describes the advantages of embracing AI techniques and wearable sensors in tasks related to innovating and optimising the analysis of health and clinical data. Moreover, the review also discusses some challenges related to the issues of using AI and the IoT applied to healthcare data analysis. Finally, it identifies some issues and opportunities for future work.

3. Future of eHealth Applications and Approaches

This Special Issue gathered several studies in the field of eHealth, and the results of the published research describe interesting innovative approaches and applications from this domain. This Special Issue also underlines some of the issues that remain, as well as some risks and limits, proposing possible solutions.
In detail, some of the presented papers focused on Artificial Intelligence and Machine Learning applied to medicine and care applications, such as COVID-19 classification (contribution 4), biomedical scientific literature semantic indexing (contribution 1), the early detection of breast cancer (contribution 10) and reviewing the more recent combined use of Artificial Intelligence and IoMT wearable sensors in healthcare (contribution 13). Other papers considered eHealth cyber security, proposing a simulation environment to test DICOM communication and evaluate the related risks (contribution 5), producing a literature review of the cyber security issues of IoMT devices (contribution 7) and framing the current state of cyber hygiene in the eHealth domain, proposing a human-centric approach for the effective education of non-expert users on the best cyber security practises (contribution 12). One published paper reviewed the application of a Fractal Analysis methodology for oral cancer diagnosis (contribution 11). Another paper proposed a traffic and energy optimisation for IoMT devices (contribution 3). A study that describes the use of LLMs for automatic ICD-10 classification was presented in contribution 6, comparing them on a very large Thai language dataset formed from inpatient admissions. Two applications were, respectively, described in contribution 8 and contribution 9, presenting, in the first case, a DICOM-based medical image communication system enhanced with advanced compression methods, and, in the latter case, an Android application for the collection and distributions of logs from IoMT devices, tailored to analyse their cyber security issues. Finally, an approach to support the development of applications related to the nutritional domain has been presented in contribution 2.
The eHealth domain, thanks to evolutions in its technologies and the methods, is constantly evolving, and, therefore, new volumes of this Special Issue have been planned for the future.

Funding

This work is supported by European Union - NextGenerationEU - National Recovery and Resilience Plan (Piano Nazionale di Ripresa e Resilienza, PNRR) - Project: “SoBigData.it - Strengthening the Italian RI for Social Mining and Big Data Analytics” - Prot. IR0000013 - Avviso n. 3264 del 28/12/2021, and by the European Commission, grant number 101083563, DS4HEALTH—Digital skills for Healthcare Transformation.

Acknowledgments

This Special Issue would not have been possible without the contributions of the authors and the reviewers. We congratulate all authors. Moreover, we would like to take this opportunity to express our sincere gratitude to all the reviewers. Finally, we place on record our gratitude to Simona Sada and to Giuseppe Trerotola for their technical and administrative supports.

Conflicts of Interest

The authors declare no conflicts of interest.

List of Contributions

  • Silvestri, S.; Gargiulo, F.; Ciampi, M. Integrating PubMed Label Hierarchy Knowledge into a Complex Hierarchical Deep Neural Network. Appl. Sci. 2023, 13, 13117. https://doi.org/10.3390/app132413117
  • Lopez-Gazpio, I. Bridging Theory and Practice: An Innovative Approach to Android Programming Education through Nutritional Application Development and Problem-Based Learning. Appl. Sci. 2023, 13, 12140. https://doi.org/10.3390/app132212140.
  • Alourani, A.; Sardaraz, M.; Tahir, M.; Khan, M.S. Dynamic and Energy Efficient Cache Scheduling Framework for IoMT over ICN. Appl. Sci. 2023, 13, 11840. https://doi.org/10.3390/app132111840
  • Santana, I.V.d.S.; Sobrinho, A.; da Silva, L.D.; Perkusich, A. Machine Learning for COVID-19 and Influenza Classification during Coexisting Outbreaks. Appl. Sci. 2023, 13, 11518. https://doi.org/10.3390/app132011518
  • Karagiannis, S.; Magkos, E.; Ntantogian, C.; Cabecinha, R.; Fotis, T. Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication. Appl. Sci. 2023, 13, 10072. https://doi.org/10.3390/app131810072
  • Suvirat, K.; Tanasanchonnakul, D.; Chairat, S.; Chaichulee, S. Leveraging Language Models for Inpatient Diagnosis Coding. Appl. Sci. 2023, 13, 9450. https://doi.org/10.3390/app13169450
  • Czekster, R.M.; Grace, P.; Marcon, C.; Hessel, F.; Cazella, S.C. Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT. Appl. Sci. 2023, 13, 7406. https://doi.org/10.3390/app13137406
  • Pervan, B.; Tomic, S.; Ivandic, H.; Knezovic, J. MIDOM-A DICOM-Based Medical Image Communication System. Appl. Sci. 2023, 13, 6075. https://doi.org/10.3390/app13106075
  • Karagiannis, S.; Ribeiro, L.L.; Ntantogian, C.; Magkos, E.; Campos, L.M. Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT. Appl. Sci. 2023, 13, 3061. https://doi.org/10.3390/app13053061
  • Fordellone, M.; Benedictis, I.D.; Bruzzese, D.; Chiodini, P. A Maximum-Entropy Fuzzy Clustering Approach for Cancer Detection When Data Are Uncertain. Appl. Sci. 2023, 13, 2191. https://doi.org/10.3390/app13042191
  • Contaldo, M.; Spirito, F.D.; Palo, M.P.D.; Amato, A.; Fiori, F.; Serpico, R. Fractal Analysis Applied to the Diagnosis of Oral Cancer and Oral Potentially Malignant Disorders: A Comprehensive Review. Appl. Sci. 2024, 14, 777. https://doi.org/10.3390/app14020777
  • Kioskli, K.; Fotis, T.; Nifakos, S.; Mouratidis, H. The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Appl. Sci. 2023, 13, 3410. https://doi.org/10.3390/app13063410
  • Junaid, S.B.; Imam, A.A.; Abdulkarim, M.; Surakat, Y.A.; Balogun, A.O.; Kumar, G.; Shuaibu, A.N.; Garba, A.; Sahalu, Y.; Mohammed, A.; et al. Recent Advances in Artificial Intelligence and Wearable Sensors in Healthcare Delivery. Appl. Sci. 2022, 12, 10271. https://doi.org/10.3390/app122010271

References

  1. Hosseini, M.S.; Bejnordi, B.E.; Trinh, V.Q.H.; Chan, L.; Hasan, D.; Li, X.; Yang, S.; Kim, T.; Zhang, H.; Wu, T.; et al. Computational pathology: A survey review and the way forward. J. Pathol. Inform. 2024, 15, 100357. [Google Scholar] [CrossRef] [PubMed]
  2. Etemadi, M.; Bazzaz Abkenar, S.; Ahmadzadeh, A.; Haghi Kashani, M.; Asghari, P.; Akbari, M.; Mahdipour, E. A systematic review of healthcare recommender systems: Open issues, challenges, and techniques. Expert Syst. Appl. 2023, 213, 118823. [Google Scholar] [CrossRef]
  3. Wen, M.H.; Bai, D.; Lin, S.; Chu, C.J.; Hsu, Y.L. Implementation and experience of an innovative smart patient care system: A cross-sectional study. BMC Health Serv. Res. 2022, 22, 126. [Google Scholar] [CrossRef] [PubMed]
  4. Ciampi, M.; Coronato, A.; Naeem, M.; Silvestri, S. An intelligent environment for preventing medication errors in home treatment. Expert Syst. Appl. 2022, 193, 116434. [Google Scholar] [CrossRef]
  5. Ajagbe, S.A.; Awotunde, J.B.; Adesina, A.O.; Achimugu, P.; Kumar, T.A. Internet of Medical Things (IoMT): Applications, Challenges, and Prospects in a Data-Driven Technology. In Intelligent Healthcare: Infrastructure, Algorithms and Management; Springer Nature: Singapore, 2022; pp. 299–319. [Google Scholar] [CrossRef]
  6. Lee, J.; Yoon, W.; Kim, S.; Kim, D.; Kim, S.; So, C.H.; Kang, J. BioBERT: A pre-trained biomedical language representation model for biomedical text mining. Bioinformatics 2019, 36, 1234–1240. [Google Scholar] [CrossRef] [PubMed]
  7. You, R.; Liu, Y.; Mamitsuka, H.; Zhu, S. BERTMeSH: Deep contextual representation learning for large-scale high-performance MeSH indexing with full text. Bioinformatics 2020, 37, 684–692. [Google Scholar] [CrossRef] [PubMed]
  8. Singhal, K.; Tu, T.; Gottweis, J.; Sayres, R.; Wulczyn, E.; Hou, L.; Clark, K.; Pfohl, S.; Cole-Lewis, H.; Neal, D.; et al. Towards Expert-Level Medical Question Answering with Large Language Models. arXiv 2023, arXiv:cs.CL/2305.09617. [Google Scholar]
  9. Li, Y.; Li, Z.; Zhang, K.; Dan, R.; Jiang, S.; Zhang, Y. ChatDoctor: A Medical Chat Model Fine-Tuned on a Large Language Model Meta-AI (LLaMA) Using Medical Domain Knowledge. Cureus 2023, 15, e40895. [Google Scholar] [CrossRef]
  10. Ahmed, A.; Zeng, X.; Xi, R.; Hou, M.; Shah, S.A. MED-Prompt: A novel prompt engineering framework for medicine prediction on free-text clinical notes. J. King Saud Univ. Comput. Inf. Sci. 2024, 36, 101933. [Google Scholar] [CrossRef]
  11. Ciampi, M.; Sicuranza, M.; Silvestri, S. A Privacy-Preserving and Standard-Based Architecture for Secondary Use of Clinical Data. Information 2022, 13, 87. [Google Scholar] [CrossRef]
  12. Pradyumna, G.R.; Hegde, R.B.; Bommegowda, K.B.; Jan, T.; Naik, G.R. Empowering Healthcare With IoMT: Evolution, Machine Learning Integration, Security, and Interoperability Challenges. IEEE Access 2024, 12, 20603–20623. [Google Scholar] [CrossRef]
  13. Thapa, C.; Camtepe, S. Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 2021, 129, 104130. [Google Scholar] [CrossRef] [PubMed]
  14. Chatterjee, P.; Das Sharma, K.; Chakrabarti, A. Weakly supervised learning in domain transfer scenario for brain lesion segmentation in MRI. Multimed. Tools Appl. 2024, 1–17. [Google Scholar] [CrossRef]
  15. Zhang, Y.; Chen, J.; Ma, X.; Wang, G.; Bhatti, U.A.; Huang, M. Interactive medical image annotation using improved Attention U-net with compound geodesic distance. Expert Syst. Appl. 2024, 237, 121282. [Google Scholar] [CrossRef]
  16. Silvestri, S.; Gargiulo, F.; Ciampi, M. Iterative Annotation of Biomedical NER Corpora with Deep Neural Networks and Knowledge Bases. Appl. Sci. 2022, 12, 5775. [Google Scholar] [CrossRef]
  17. Islam, S.; Papastergiou, S.; Kalogeraki, E.M.; Kioskli, K. Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems. Appl. Sci. 2022, 12, 4443. [Google Scholar] [CrossRef]
  18. Silvestri, S.; Islam, S.; Amelin, D.; Weiler, G.; Papastergiou, S.; Ciampi, M. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. Int. J. Inf. Secur. 2024, 23, 32–50. [Google Scholar] [CrossRef]
  19. Karatas, M.; Eriskin, L.; Deveci, M.; Pamucar, D.; Garg, H. Big Data for Healthcare Industry 4.0: Applications, challenges and future perspectives. Expert Syst. Appl. 2022, 200, 116912. [Google Scholar] [CrossRef]
  20. Luchini, C.; Pea, A.; Scarpa, A. Artificial intelligence in oncology: Current applications and future perspectives. Br. J. Cancer 2022, 126, 4–9. [Google Scholar] [CrossRef]
  21. Busnatu, S.; Niculescu, A.G.; Bolocan, A.; Petrescu, G.E.D.; Păduraru, D.N.; Năstasă, I.; Lupușoru, M.; Geantă, M.; Andronic, O.; Grumezescu, A.M.; et al. Clinical Applications of Artificial Intelligence—An Updated Overview. J. Clin. Med. 2022, 11, 2265. [Google Scholar] [CrossRef]
  22. Wang, Y.; Wang, L.; Rastegar-Mojarad, M.; Moon, S.; Shen, F.; Afzal, N.; Liu, S.; Zeng, Y.; Mehrabi, S.; Sohn, S.; et al. Clinical information extraction applications: A literature review. J. Biomed. Inform. 2018, 77, 34–49. [Google Scholar] [CrossRef] [PubMed]
  23. Gargiulo, F.; Silvestri, S.; Ciampi, M. A Big Data architecture for knowledge discovery in PubMed articles. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017; pp. 82–87. [Google Scholar] [CrossRef]
  24. Sezgin, E.; Özkan Yildirim, S.; Yildirim, S. Investigation of physicians’ awareness and use of mHealth apps: A mixed method study. Health Policy Technol. 2017, 6, 251–267. [Google Scholar] [CrossRef]
  25. Affinito, L.; Fontanella, A.; Montano, N.; Brucato, A. How physicians can empower patients with digital tools: A joint study of the Italian Scientific Society of Internal Medicine (FADOI) and the European Federation of Internal Medicine (EFIM). J. Public Health 2022, 30, 897–909. [Google Scholar] [CrossRef]
  26. Liu, J.; Chang, W.; Wu, Y.; Yang, Y. Deep Learning for Extreme Multi-label Text Classification. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval; ACM: Shinjuku, Tokyo, Japan, 2017; pp. 115–124. [Google Scholar] [CrossRef]
  27. Nentidis, A.; Krithara, A.; Paliouras, G.; Gasco, L.; Krallinger, M. BioASQ at CLEF2022: The Tenth Edition of the Large-scale Biomedical Semantic Indexing and Question Answering Challenge. In Advances in Information Retrieval; Hagen, M., Verberne, S., Macdonald, C., Seifert, C., Balog, K., Norvaag, K., Setty, V., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 429–435. [Google Scholar]
  28. Vasilakos, A.V.; Li, Z.; Simon, G.; You, W. Information centric network: Research challenges and opportunities. J. Netw. Comput. Appl. 2015, 52, 1–10. [Google Scholar] [CrossRef]
  29. Eichelberg, M.; Kleber, K.; Kämmerer, M. Cybersecurity Challenges for PACS and Medical Imaging. Acad. Radiol. 2020, 27, 1126–1139. [Google Scholar] [CrossRef] [PubMed]
  30. Devlin, J.; Chang, M.W.; Lee, K.; Toutanova, K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers); Burstein, J., Doran, C., Solorio, T., Eds.; Association for Computational Linguistics: Minneapolis, MN, USA, 2019; pp. 4171–4186. [Google Scholar] [CrossRef]
  31. Wang, L.; Yang, N.; Huang, X.; Jiao, B.; Yang, L.; Jiang, D.; Majumder, R.; Wei, F. Text embeddings by weakly-supervised contrastive pre-training. arXiv 2022, arXiv:2212.03533. [Google Scholar]
  32. Suvirat, K.; Chairat, S.; Horsiritham, K.; Kongkamol, C.; Chaichulee, S. De-identification of Thai Free-text Clinical Notes. In Proceedings of the 2023 15th Biomedical Engineering International Conference (BMEiCON), Pittsburgh, PA, USA, 5–18 October 2023; pp. 1–5. [Google Scholar] [CrossRef]
  33. Cheimonidis, P.; Rantos, K. Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review. Futur. Internet 2023, 15, 324. [Google Scholar] [CrossRef]
  34. Knezovic, J.; Kovac, M.; Mlinaric, H. Classification and blending prediction for lossless image compression. In Proceedings of the MELECON 2006–2006 IEEE Mediterranean Electrotechnical Conference, Malaga, Spain, 16–19 May 2006; pp. 486–489. [Google Scholar] [CrossRef]
  35. Jodogne, S.; Bernard, C.; Devillers, M.; Lenaerts, E.; Coucke, P. Orthanc—A lightweight, restful DICOM server for healthcare and medical research. In Proceedings of the 2013 IEEE 10th International Symposium on Biomedical Imaging, San Francisco, CA, USA, 7–11 April 2013; pp. 190–193. [Google Scholar] [CrossRef]
  36. Thomasian, N.M.; Adashi, E.Y. Cybersecurity in the Internet of Medical Things. Health Policy Technol. 2021, 10, 100549. [Google Scholar] [CrossRef]
  37. Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of Security and Privacy for the Internet of Medical Things (IoMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, 29–31 May 2019; pp. 457–464. [Google Scholar] [CrossRef]
  38. Bayrak, E.A.; Kirci, P. Fractal Analysis Usage Areas in Healthcare. In System Analysis & Intelligent Computing: Theory and Applications; Springer International Publishing: Cham, Switzerland, 2022; pp. 377–406. [Google Scholar] [CrossRef]
  39. Spyridonos, P.; Gaitanis, G.; Bassukas, I.D.; Tzaphlidou, M. Evaluation of vermillion border descriptors and relevance vector machines discrimination model for making probabilistic predictions of solar cheilosis on digital lip photographs. Comput. Biol. Med. 2015, 63, 11–18. [Google Scholar] [CrossRef]
  40. Rees, D. Cyber Attacks in Healthcare: The Position across Europe. Available online: https://www.pinsentmasons.com/out-law/analysis/cyber-attacks-healthcare-europe (accessed on 8 March 2024).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Silvestri, S.; Gargiulo, F. Special Issue on eHealth Innovative Approaches and Applications. Appl. Sci. 2024, 14, 2571. https://doi.org/10.3390/app14062571

AMA Style

Silvestri S, Gargiulo F. Special Issue on eHealth Innovative Approaches and Applications. Applied Sciences. 2024; 14(6):2571. https://doi.org/10.3390/app14062571

Chicago/Turabian Style

Silvestri, Stefano, and Francesco Gargiulo. 2024. "Special Issue on eHealth Innovative Approaches and Applications" Applied Sciences 14, no. 6: 2571. https://doi.org/10.3390/app14062571

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop