Category Archives: Biomedical Engineering

Biomedical Engineering

Peer review, fraud, and “Media Science”

There’s a great article on spiked science covering the recent stem cell fraud and why peer review ultimately succeeds in keeping research honest.  The scientific tenet that for research to be valid, it must be reproducible by others is pivotal in this.

spiked-science | Article | Peer review and ‘media science’

As we have seen, peer review will not necessarily detect if someone deliberately sets out to falsify data. There is often no way of knowing this until the paper is published and others in the scientific community have the opportunity to scrutinise the work. However, if Hwang Woo-Suk’s paper hadn’t been peer reviewed, and he had gone directly to the media with his ‘results’, it would have taken far longer than six months for the fraud to be discovered and rectified.

ICDs, wandless telemetry, and encryption

Here’s something nobody has ever been able to tell me:

Do wandless ICDs (implantable cardioverter-defibrillators) employ any kind of encryption?

As far as I can tell, the answer is no.

Let me give you a little background. At the last Heart Rhythm Scientific Sessions (2005, in New Orleans) most of the big ICD companies were showing off their wonderful new “wandless telemetry” systems. Historically, ICDs have been programmed (after implantation) and interrogated with some variety of inductive communication. This was done by placing a “wand” over the part of the patient’s body where the device was implanted and then initiating communication. It has a short range, around a few inches. Device companies have begun to use radio-frequency (RF) communication instead, which has a longer range, something on the order of feet or meters.

This is a big problem.

Not one person I’ve asked (admittedly, sales people for the most part) has been able to tell me if the new RF (a.k.a wandless) telemetry communication is encrypted. I did some patent searching at uspto.gov, and found that no patents have been granted on anything like this yet. However, Medtronic did apply for a patent in September 2005. As the patent application says in its background, “With the advent of long range telemetry of messages, and the associated increase in communication range, the risk that a message can be compromised is increased. For example, a replay attack can be launched in which a message, or a piece of a message, can be captured and then maliciously used at a later time.”

So it does appear that someone is thinking about this. Most people don’t really think about or understand encryption, even technically-inclined people like medical device engineers.

Do you know anything about this? Do you know someone who might?

Helping the body fight cancer

There’s a nice overview (with links to abstracts) on Biosingularity about this discovery:

Biosingularity » Blog Archive » Newly discovered killer cell fights cancer

A mouse immune cell that plays dual roles as both assassin and messenger, normally the job of two separate cells, has been discovered by an international team of researchers. The discovery has triggered a race among scientists to find a human equivalent of the multitasking cell, which could one day be a target for therapies that seek out and destroy cancer.

“In the same way that intelligence and law enforcement agencies can face deadly threats together instead of separately, this one cell combines the ability to kill foreign pathogens and distribute information about that experience,” says Drew Pardoll, M.D., Ph.D., the Seraph Professor of Oncology at the Johns Hopkins Kimmel Cancer Center.

Implementing and Studying the Conjugate Gradient Method

When I start up a simulation on our cluster, I’m used to seeing this after some information scrolls by:

Solver = Conjugate gradient
preconditioner=block Jacobi with ILU(5) on each block

I knew before that this was some way of solving a big matrix representing the problem at hand, but never knew how it was done. (Un)luckily, my midterm project in one of my classes this semester is to implement and play around with the conjugate gradient method. We were given a little introduction to the method of steepest descent, then sent on our merry ways to the Mardi Gras and subsequent break.

I was terrified.

I started reading the course notes that we’re using for the class, but they used a bunch of terminology I’ve never heard of before. They were extremely concise. Attempts at understanding the information on MathWorld and other sites ended in confusion. And then, I came upon this title on google:

An Introduction to the Conjugate Gradient Method Without the Agonizing Pain

With the agonizing pain still acutely in my mind, I clicked on the link and gave it a try. It’s excellent! The author, Jonathan Richard Shewchuk, writes with clarity, knowledge that I’m probably not a numerical analysis professor, and a little dry humor here and there. After searching for him on google, I discovered why the name looked so familiar — I used his Triangle software to generate my 2D cross-section of our model of the rabbit ventricles! The CJ paper has pretty much saved me, and perhaps more importantly has shown me just how cool and clever numerical analysis can be.

If you want to learn about the CJ method, you really must read his paper.

These aren’t the transplants you’re looking for…

A former oral surgeon and his pals were stealing organs from cadavers without consent and selling them for transplant. This is another argument in favor of tissue engineering research — the market really wants more transplant tissue.

D.A.: Body parts case like ‘cheap horror movie’ – More Health News – MSNBC.com

Prosecutors said the defendants took organs from people who had not given consent or were too old or too sick to donate. The defendants forged consent forms and altered the death certificates to indicate the victims had been younger and healthier, authorities said.

Prosecutors said the body parts were sold to
tissue suppliers and ultimately used in disk replacements, knee
operations, dental implants and a variety of other surgical procedures
performed by unsuspecting doctors across the United States and in
Canada.