Computer-based diagnosis of illness in historical persons.
نویسنده
چکیده
Retrospective diagnosis of illness in historical figures is a popular but somewhat unreliable pastime due to the lack of detailed information and reliable reports about clinical features and disease progression. Modern computer-based diagnostic programmes have been used to supplement historical documents and accounts, offering new and more objective approaches to the retrospective investigations of the medical conditions of historical persons. In the case of King George III, modern technology has been used to strengthen the findings of previous reports rejecting the popular diagnosis of variegate porphyria in the King, his grandson Augustus d'Esté and his antecedent King James VI and I. Alternative diagnoses based on these programmes are indicated. The Operational Criteria in Studies of Psychotic Illness (OPCRIT) programme and the Young mania scale have been applied to the features described for George III and suggest a diagnosis of bipolar disorder. The neuro-diagnostic programme SimulConsult was applied to Augustus d'Esté and suggests a diagnosis of neuromyelitis optica rather than acute porphyria with secondarily multiple sclerosis, as proposed by others. James VI and I's complex medical history and the clinical features of his behavioural traits were also subjected to SimulConsult analysis; acute porphyria was rejected and the unexpected diagnosis of attenuated (mild) Lesch-Nyhan disease offered. A brief review of these approaches along with full reference listings to the methodology including validation are provided. Textual analysis of the written and verbal outputs of historical figures indicate possible future developments in the diagnosis of medical disorders in historical figures.
منابع مشابه
A Novel Method for Selecting the Supplier Based on Association Rule Mining
One of important problems in supply chains management is supplier selection. In a company, there are massive data from various departments so that extracting knowledge from the company’s data is too complicated. Many researchers have solved this problem by some methods like fuzzy set theory, goal programming, multi objective programming, the liner programming, mixed integer programming, analyti...
متن کاملCMDTS: The Causality-based Medical Diagnosis and Treatment System
Our medical world is replete with clinical data but this data is rarely automatically exploited for bringing more health to our society. Many researches have been conducted in Medical Data Mining, but almost all of them have focused on diagnosing the diseases not treating the patients. In this paper we propose the Causality-based Medical Diagnosis and Treatment System, which can be used to diag...
متن کاملCMDTS: The Causality-based Medical Diagnosis and Treatment System
Our medical world is replete with clinical data but this data is rarely automatically exploited for bringing more health to our society. Many researches have been conducted in Medical Data Mining, but almost all of them have focused on diagnosing the diseases not treating the patients. In this paper we propose the Causality-based Medical Diagnosis and Treatment System, which can be used to diag...
متن کاملDiagnosis of diabetes by using a data mining method based on native data
Background & Aim: Detecting the abnormal performance of diabetes and subsequently getting proper treatment can reduce the mortality associated with the disease. Also, timely diagnosis will result in irreversible complications for the patient. The aim of this study was to determine the status of diabetes mellitus using data mining techniques. Methods: This is an analytical study and its databas...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- The journal of the Royal College of Physicians of Edinburgh
دوره 43 4 شماره
صفحات -
تاریخ انتشار 2013