Machine Learning Applications in the Neuro ICU: A Solution to Big Data Mayhem?

被引:14
|
作者
Chaudhry, Farhan [1 ,2 ,3 ]
Hunt, Rachel J. [3 ]
Hariharan, Prashant [4 ]
Anand, Sharath Kumar [1 ,2 ]
Sanjay, Surya [1 ,2 ]
Kjoller, Ellen E. [1 ,2 ]
Bartlett, Connor M. [1 ,2 ]
Johnson, Kipp W. [5 ]
Levy, Phillip D. [1 ,2 ]
Noushmehr, Houtan [3 ]
Lee, Ian Y. [3 ]
机构
[1] Wayne State Univ, Dept Emergency Med, Detroit, MI 48202 USA
[2] Wayne State Univ, Integrat Biosci Ctr, Detroit, MI 48202 USA
[3] Henry Ford Hosp, Dept Neurosurg, Detroit, MI 48202 USA
[4] Wayne State Univ, Dept Biomed Engn, Detroit, MI USA
[5] Icahn Sch Med Mt Sinai, Dept Genet & Genom Sci, New York, NY 10029 USA
来源
FRONTIERS IN NEUROLOGY | 2020年 / 11卷
关键词
neurocritical care; machine learning; artificial intelligence; neurology; intensive and critical care; PREDICTION; MODELS; NETWORKS;
D O I
10.3389/fneur.2020.554633
中图分类号
R74 [神经病学与精神病学];
学科分类号
摘要
The neurological ICU (neuro ICU) often suffers from significant limitations due to scarce resource availability for their neurocritical care patients. Neuro ICU patients require frequent neurological evaluations, continuous monitoring of various physiological parameters, frequent imaging, and routine lab testing. This amasses large amounts of data specific to each patient. Neuro ICU teams are often overburdened by the resulting complexity of data for each patient. Machine Learning algorithms (ML), are uniquely capable of interpreting high-dimensional datasets that are too difficult for humans to comprehend. Therefore, the application of ML in the neuro ICU could alleviate the burden of analyzing big datasets for each patient. This review serves to (1) briefly summarize ML and compare the different types of MLs, (2) review recent ML applications to improve neuro ICU management and (3) describe the future implications of ML to neuro ICU management.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Advanced Machine Learning Applications in Big Data Analytics
    Li, Taiyong
    Deng, Wu
    Wu, Jiang
    ELECTRONICS, 2023, 12 (13)
  • [2] Survey of Machine Learning Methods for Big Data Applications
    Vinothini, A.
    Priya, S. Baghavathi
    2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS), 2017,
  • [3] Current applications of big data and machine learning in cardiology
    Renato Cuocolo
    Teresa Perillo
    Eliana De Rosa
    Lorenzo Ugga
    Mario Petretta
    Journal of Geriatric Cardiology, 2019, 16 (08) : 601 - 607
  • [4] Current applications of big data and machine learning in cardiology
    Cuocolo, Renato
    Perillo, Teresa
    De Rosa, Eliana
    Ugga, Lorenzo
    Petretta, Mario
    JOURNAL OF GERIATRIC CARDIOLOGY, 2019, 16 (08) : 601 - 607
  • [5] What’s new in ICU in 2050: big data and machine learning
    Sébastien Bailly
    Geert Meyfroidt
    Jean-François Timsit
    Intensive Care Medicine, 2018, 44 : 1524 - 1527
  • [6] What's new in ICU in 2050: big data and machine learning
    Bailly, Sebastien
    Meyfroidt, Geert
    Timsit, Jean-Francois
    INTENSIVE CARE MEDICINE, 2018, 44 (09) : 1524 - 1527
  • [7] Data Mining and Machine Learning Applications for Educational Big Data in the University
    Abe, Keisuke
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 350 - 355
  • [8] Using machine learning to optimize parallelism in big data applications
    Brandon Hernandez, Alvaro
    Perez, Maria S.
    Gupta, Smrati
    Muntes-Mulero, Victor
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1076 - 1092
  • [9] Machine Learning Algorithms for Big Data Applications With Policy Implementation
    Wu, Jianzu
    Zhang, Kunxin
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2022, 34 (03)
  • [10] CryptoML: Secure Outsourcing of Big Data Machine Learning Applications
    Mirhoseini, Azalia
    Sadeghi, Ahmad-Reza
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 149 - 154