Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2011 Apr;24(2):203-7.
doi: 10.1007/s10278-010-9311-8.

Challenges for data storage in medical imaging research

Affiliations

Challenges for data storage in medical imaging research

Steve G Langer. J Digit Imaging. 2011 Apr.

Abstract

Researchers in medical imaging have multiple challenges for storing, indexing, maintaining viability, and sharing their data. Addressing all these concerns requires a constellation of tools, but not all of them need to be local to the site. In particular, the data storage challenges faced by researchers can begin to require professional information technology skills. With limited human resources and funds, the medical imaging researcher may be better served with an outsourcing strategy for some management aspects. This paper outlines an approach to manage the main objectives faced by medical imaging scientists whose work includes processing and data mining on non-standard file formats, and relating those files to the their DICOM standard descendents. The capacity of the approach scales as the researcher's need grows by leveraging the on-demand provisioning ability of cloud computing.

PubMed Disclaimer

Figures

Fig 1.
Fig 1.
A high level view of the key image file components, showing the relationships between the raw files, their DICOM descendent files, and the MIRTH parsing engine creating a database to cross-reference the two data sets for subsequent data mining.
Fig 2.
Fig 2.
One potential database schema for relating DICOM image objects to the proprietary “raw” files that created them. The table “known_scanners” forms a knowledge base of scanner and software versions that allow linking a specific DICOM image object to the raw file(s) that created it. The table “DICOM_image” then links to one or more “image_parameter” tables to record values of interest to the researcher (slice thickness, reconstruction kernel, pulse sequence, etc.). If the database encounters an unknown scanner model, an entry is made in the “alerts” table so that the knowledge base can be expanded.

Similar articles

Cited by

References

    1. Nagy PG. The future of PACS. Med Phys. 2007;34(7):2676–2682. doi: 10.1118/1.2743097. - DOI - PubMed
    1. He R, Niu J, Yuan M, Hu J: A novel cloud based model of pervasive computing. Computer and information technology, 2004. CIT '04. The Fourth International Conference on 14–16 Sept. 2004, pp 693–700
    1. Langer SG, Stewart BK. Computer security: A primer. J Digit Imaging. 1999;12(3):114–113. doi: 10.1007/BF03168630. - DOI - PMC - PubMed
    1. CTP: http://mircwiki.rsna.org/index.php?title=CTP-The_RSNA_Clinical_Trial_Pro.... Last viewed April 2010
    1. Schneier B. Applied Cryptography. 2. New York: Wiley; 1996. pp. 28–29.

MeSH terms