Home Technology peripherals AI From early cancer screening to disease tracking, how is AI changing medical imaging?

From early cancer screening to disease tracking, how is AI changing medical imaging?

Apr 12, 2023 pm 11:01 PM
AI ai

You can penetrate deep into the human body without even needing a doctor. Doesn’t it sound a bit incredible? Radiology medical imaging technology has made great progress, and with the support of AI, it has taken a big step forward. Using the powerful computing power of AI and machine learning to scan the human body and look for subtle differences that may be overlooked by the human eye is what the medical community is currently doing.

From early cancer screening to disease tracking, how is AI changing medical imaging?

Today's medical imaging involves a series of complex technologies that analyze every data point to find disease from health and signal from noise. In the early decades of radiology, researchers were primarily tasked with improving the resolution of body photographs, and in subsequent decades the task was to interpret the data to ensure nothing was missed.

While the primary mission of imaging technology was to diagnose medical conditions, imaging technology is now becoming an important part of treatment, especially in the field of cancer. Doctors study the images and let them help them monitor the spread of cancer cells so they can know faster and better whether treatments are working. Imaging has begun to play a new role, and the way patients are treated has changed. Doctors have more information and can choose better treatments for their patients.

Basak Dogan, associate professor at the University of Texas Southwestern Medical Center, said: "In the next five years we will see functional imaging becoming part of treatment. Today's standard imaging cannot answer the real clinical questions that patients want treatment It can have higher accuracy, so they can make better decisions based on richer information, and functional technology can help them."

Early Diagnosis

Make full use of images and automatically read as much as possible to save radiologists valuable time. This is the first obstacle encountered by most images, whether it is X-ray, CT scan, MRI or ultrasound. At this time, computer-assisted algorithms can come into play, using powerful computing power to train the computer to distinguish between abnormality and normality. This is work currently being done.

For years software experts have been working hand-in-hand with radiologists to analyze large amounts of normal and abnormal images. Doctors feed the results into computer programs, allowing the computers to learn over time so that they can eventually differentiate between abnormalities. The more images you compare and the more you learn, the stronger the AI’s discrimination ability will be.

The FDA has approved an imaging algorithm with an accuracy of 80-90%. Still, the FDA requires that even if a machine learning algorithm makes a discovery, it will ultimately be up to humans to make the decision. AI can flag discovered doubts for doctors to review, so that doctors can provide answers to patients faster.

At Mass General Brigham, they use about 50 algorithms to assist with treatment, from detecting aneurysms and cancer to spotting symptoms of embolisms and strokes. Half of the algorithms have been approved by the FDA, and others are still being tested.

Keith Dreyer, Chief Data Science Officer and Vice Chairman of the Department of Radiology, General Hospital, said: "Our goal is to detect diseases early. Sometimes it takes human doctors several days to accurately diagnose, but computers are different, they never sleep. If computers can make accurate diagnoses, treatment will be faster."

Better tracking of patients

Integrating AI into medical care, computer-assisted screening As the first step, machine learning has become an important tool for monitoring patients and tracking subtle changes. These techniques are extremely important in cancer treatment, as doctors determine whether cancer cells are growing, shrinking, or staying the same, which is important in deciding how to treat them.

Dogan said: "The patient is undergoing chemotherapy, what is happening to the cancer cells? It is difficult for us to understand. Standard imaging technology cannot detect any changes before the chemotherapy is completed, and the entire process may last several months. It may take several days. It takes months to see shrinkage."

With AI imaging, we can detect changes in cancer cells that are independent of size and anatomy. Dogan added: "In the early stages of chemotherapy, most of the changes in cancer cells have not yet reached the level of cell death. The changes exist in modified interactions between immune cells and cancer cells."

In many cases the cancer cells do not Instead of shrinking in predictable ways from the outside in, small pockets of cancer cells within the tumor may die while others live on, leaving the entire mass pockmarked like a bug-bitten sweater. Because cell death is often associated with inflammation, sometimes the size of cancer cells is still increasing, but the number of cancer cells is not necessarily increasing. Standard imaging cannot tell us how many cancer cells are alive and how many are dead. The most commonly used imaging techniques for breast cancer are mammograms and ultrasound, which are used simply to look for anatomical features.

At the University of Texas Southwestern Medical Center, Dogan uses two imaging technologies to track functional changes in breast cancer patients.

The first one is that every time the patient undergoes a cycle of chemotherapy, she takes pictures of the patient and injects microbubbles to observe the subtle pressure changes around the cancer cells. Ultrasound waves can detect changes in bubble pressure, which gather around cancer cells; growing cancer cells have more blood vessels to support their expansion than other tissues.

In another study, Dogan tested photoacoustic imaging, which converts light into sound signals. Shining laser light on breast tissue causes cells to oscillate, which creates sound waves that can be captured and analyzed. Photoacoustic imaging technology can be used to determine the oxygen content of cancer cells. When growing, cancer cells require more oxygen than ordinary cells. By analyzing the changes in sound, you can know which parts of the cancer cells are growing and which parts are not.

By analyzing images of cancer cells, we can tell which parts are most likely to metastasize to the lymph nodes. Clinicians can’t tell you which parts of the cancer cells will spread to the lymph nodes. With photoacoustic technology, we can Detecting signs of cancer cell spread early, before such signs show up on scans, without the need for invasive biopsies to detect spread.”

Discover abnormalities that humans cannot see

Dreyer said that when we have enough data and images, algorithms can discover distortions that humans cannot. His team is developing an algorithm that can measure biomarkers in the body and plot changes in them to tell someone he or she may be at risk for a stroke, a fracture or a heart attack.

Dreyer believes that this technology is the "Holy Grail" of medical imaging. Although it is not yet mature, it can bring changes to AI medical care.

As more and more AI models become available, eventually AI imaging can help patients at home. One day, we may be able to obtain ultrasound imaging information through a smartphone app.

Dreyer said: "The real change that AI will bring to health care is that it can provide a variety of solutions to people before they become sick, so that people can stay healthy."

The above is the detailed content of From early cancer screening to disease tracking, how is AI changing medical imaging?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

How to set the Debian Apache log level How to set the Debian Apache log level Apr 13, 2025 am 08:33 AM

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

How Debian OpenSSL prevents man-in-the-middle attacks How Debian OpenSSL prevents man-in-the-middle attacks Apr 13, 2025 am 10:30 AM

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

Debian mail server SSL certificate installation method Debian mail server SSL certificate installation method Apr 13, 2025 am 11:39 AM

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

How debian readdir integrates with other tools How debian readdir integrates with other tools Apr 13, 2025 am 09:42 AM

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

How to do Debian Hadoop log management How to do Debian Hadoop log management Apr 13, 2025 am 10:45 AM

Managing Hadoop logs on Debian, you can follow the following steps and best practices: Log Aggregation Enable log aggregation: Set yarn.log-aggregation-enable to true in the yarn-site.xml file to enable log aggregation. Configure log retention policy: Set yarn.log-aggregation.retain-seconds to define the retention time of the log, such as 172800 seconds (2 days). Specify log storage path: via yarn.n

See all articles