Computer Application in Pharmacy
Computer Application in Pharmacy
PHARMACY
UNIT -1
NUMBER SYSTEM –
(11001)2
In the above example, a binary number is given in which the base is 2. In a binary number
system, each digit is called the “bit”. In the above example, there are 5 digits.
Place Value: The value of a digit depends on its position in the number. For example, in
the number 345:
Decimal Point: In addition to integers, the decimal system can represent fractional
numbers using a decimal point. For example, 12.34 means 12 whole units and 34
hundredths (or 34/100).
Position of Digits: Starting from the decimal point, moving to the right, the places
represent tenths, hundredths, thousandths, etc., and moving left of the decimal point
represents tens, hundreds, thousands, etc.
o Total = 432
o Total = 4.56
Thus, the decimal system is essential in everyday life for counting, measurements, and
performing arithmetic operations.
To understand how the octal number system works, let’s take the octal number 345₈ and convert
it into decimal.
The letters A, B, C, D, E, and F represent the decimal values 10, 11, 12, 13, 14, and 15,
respectively.
Base-16: It is a base-16 system, meaning that each digit represents a power of 16.
Place Value: The place values in the hexadecimal system are powers of 16, similar to
how the decimal system uses powers of 10. The place values represent:
Divide the quotient (the result of the division) by 2 again, and record the remainder.
The binary number is the sequence of remainders read from bottom to top.
13 ÷ 2 = 6 remainder 1
6 ÷ 2 = 3 remainder 0
3 ÷ 2 = 1 remainder 1
Starting from the rightmost bit, assign powers of 2 to each bit (starting from 202^020
and increasing by powers of 2 as you move to the left).
Formula:
For a binary number bnbn−1...b1b0b_n b_{n-1} ... b_1 b_0bnbn−1...b1b0, its decimal
equivalent DDD is given by:
D=bn×2n+bn−1×2n−1+...+b1×21+b0×20D = be n \times 2^n + b_{n-1} \times 2^{n-1} + ...
+ b_1 \times 2^1 + b_0 \times 2^0D=b n×2n+bn−1×2n−1+...+b1×21+b0×20
Where:
bn1 b0b_n, b_{n-1}, ..., b_0bnbn−1.b0 are the binary digits (0 or 1), and
o 8+0+2+1=118 + 0 + 2 + 1 = 118+0+2+1=11
o 16+8+0+2+0=2616 + 8 + 0 + 2 + 0 = 2616+8+0+2+0=26
2 → 010
5 → 101
BINARY ADDITION –
Binary Addition is similar to decimal addition but follows the rules of base-2 (binary). In
binary, there are only two digits: 0 and 1. The process of adding binary numbers is
straightforward once you understand how to handle carries.
0 + 0 = 0, with no carry.
0 + 1 = 1, with no carry.
1 + 0 = 1, with no carry.
1 + 1 = 0, with a carry of 1.
Markdown
Copy
1101
+ 1011
-------
Move to the next column (add the carry from the previous step):
o 0 + 1 + 1 (carry) = 0, carry 1
Next column:
o 1 + 0 + 1 (carry) = 0, carry 1
Leftmost column:
o 1 + 1 + 1 (carry) = 1, carry 1
Markdown
Copy
1101
+ 1011
-------
11000
Copy
1011
+ 0110
---------
o 1 + 0 = 1, no carry.
Next column:
Next column:
o 0 + 1 + 1 (carry) = 0, carry 1.
Leftmost column:
o 1 + 0 + 1 (carry) = 0, carry 1.
Markdown
Copy
1011
+ 0110
10001
When subtracting 1 from 0, we need to borrow from the next higher bit, turning the 0
into 2 Binary Subtraction of 1011 and 1101 (with borrowing)
ONE COMPLEMENT-
One's complement is a method of representing signed numbers in binary. It is commonly used in
computer systems for operations involving negative numbers.
To find the one's complement of a binary number, simply invert all the bits:
For example:
o Change 1 to 0, and 0 to 1.
2. Negative Numbers: To represent negative numbers in one's complement, you take the
binary representation of the absolute value and invert all the bits.
o 0101 → 1010.
Positive Zero: In one's complement, positive zero is represented as all 0s (e.g., 0000).
Negative Zero: Negative zero is represented as all 1s (e.g., 1111 in a 4-bit system). This
result in two representations for zero: one positive and one negative. This is often called a
"double-zero" problem in one's complement systems.
Summary:
The one's complement of a binary number is obtained by inverting all the bits (changing
0s to 1s, and 1s to 0s).
This system can represent both positive and negative numbers in binary, but has a
"negative zero" issue
TWO COMPLEMENT –
Two's complement is another method for representing signed binary numbers. It is widely used
in digital systems and computers because it simplifies arithmetic operations, especially addition
and subtraction. Unlike one's complement, which has a "negative zero" problem, two's
complement avoids this issue and is more efficient for computation.
BINARY MULTIPLICATION -
The binary multiplication operation is actually a process of addition and shifting operation. This
process has to be continued until all the multiplier is done, and finally, the addition operation is
made.
Similar to the decimal system, the multiplication of the binary numbers is done by multiplying
the multiplicand with the multiplier. It is noted that the multiplication by zero makes all the bits
zero, and this step may be ignored in the intermediate steps. The multiplication by 1 makes all the
multiplicand value unchanged.
Binary multiplication, like other binary operations is much easier, unlike the decimal
multiplication when you remember the following multiplication rules. The rules of binary
multiplication are:
0×0=0
0×1=0
1×0=0
As per these rules, it very clear, that if the binary multiplication includes 0, then it will result in
zero itself. Hence,
But,
To differentiate the rules for multiplication of binary numbers from other binary operations such
as addition, subtraction and division
BINARY DIVISION –
Binary Division is similar to decimal division, but it operates using binary (base-2) numbers. The
process involves dividing binary numbers, step by step, just like long division in the decimal
system. The key difference is that you're working with only 0 and 1.
Perform division step-by-step, comparing bits and following the same method as in long
division, but with binary numbers (0 or 1).
INFORMATION GATHERING –
1. Requirements Gathering
Approach:
o Surveys or questionnaires.
2. System/Software Analysis
Approach:
Approach:
Outcome: Identifying industry trends, gaps in the market, and opportunities for
differentiation.
Purpose: In the context of, information gathering refers to the process of collecting data
about a system to find vulnerabilities.
Approach:
Purpose: To gather data on system performance, user behaviour, or system logs for
analysis.
Approach:
Approach:
Outcome: Understanding how users interact with the software and identifying areas for
improvement.
REQUIREMENT –
The requirements of an information system refer to the various needs and
specifications that must be met in order to design, develop, and implement a system that
effectively supports the goals of an organization. These requirements can vary depending
on the type of information system, but they typically fall into categories such as
functional, non-functional, and technical requirements.
1. Functional Requirements
Functional requirements describe what the system should do, focusing on specific tasks,
processes, and interactions. They are typically related to business functions or operations
that the system must support. Examples include:
User authentication and authorization: The system should allow users to log in, verify
identity, and define roles (e.g., admin, user, guest).
Data input/output: What types of data the system should accept (e.g., forms, file
uploads), and the format of outputs (e.g., reports, dashboards).
Transaction processing: The system should support activities such as order processing,
inventory management, or financial transactions.
Data storage and retrieval: The system must efficiently store and retrieve large volumes
of data (e.g., customer records, transaction histories).
2. Non-Functional Requirements
Performance: The system must process up to 1,000 transactions per second and respond
to user queries in less than 2 seconds.
Scalability: The system should be able to scale horizontally to handle increasing data or
user load.
Security: The system must follow encryption standards for sensitive data, implement
access control mechanisms, and comply with privacy regulations (e.g., GDPR).
Availability and Reliability: The system should have 99.9% uptime and be able to
recover from failures quickly.
Usability: The system’s interface must be intuitive and easy to navigate, even for non-
technical users.
Compatibility: The system should work across different platforms, operating systems,
and devices (e.g., web, mobile, desktop).
3. Technical Requirements
These requirements focus on the technology stack needed to implement the system,
including hardware, software, and integration considerations. Examples include:
Software platforms: The system should be built on a specific platform (e.g., Windows,
Linux, cloud platforms like AWS or Azure).
Database systems: The system should use a particular database (e.g., MYSQL, Oracle)
or support NOSQL solutions (e.g., MONGODB, Cassandra).
APIs: The system should provide APIs (Application Programming Interfaces) for
integrating with other services or external applications.
4. Data Requirements
Data requirements define the types of data the system will handle, including data sources,
formats, structures, and storage needs. Examples include:
Data structure and organization: How data will be stored, organized, and accessed
(e.g., relational databases, data warehouses).
Data integrity: The system must ensure data is accurate, consistent, and updated in real
time (e.g., validation rules, data synchronization).
Data privacy: Sensitive data must be encrypted and accessible only to authorized
personnel.
Data archiving: The system must archive historical data and provide tools for retrieving
and analyzing it when needed.
5. User Requirements
These requirements describe the needs and expectations of the end-users who will
interact with the system. They are often captured in user stories or use cases. Examples
include:
Role-based access: The system must support different user roles and grant permissions
based on those roles (e.g., , managers, employees).
Interface design: The system should have a user-friendly interface that caters to the
target user group (e.g., employees, customers).
Accessibility: The system should meet accessibility standards (e.g., WCAG) for users
with disabilities.
Support for mobile devices: Users should be able to access the system from or tablets if
needed.
6. Business Requirements
These requirements are driven by the organization's strategic goals and objectives. They
focus on how the information system aligns with business processes and the overall
mission of the organization. Examples include:
Cost-effectiveness: The system should be developed within a budget and deliver a good
return on investment (ROI).
Compliance: The system must comply with industry-specific regulations (e.g., HIPAA,
GDPR, SOX).
Operational efficiency: The system should help streamline workflows and improve
productivity by automating manual tasks.
Some information systems must comply with legal or regulatory standards, depending on
the industry and jurisdiction. Examples include:
Data protection laws: The system must comply with laws such as GDPR (General Data
Protection Regulation) or CCPA (California Consumer Privacy Act).
Auditing and reporting: The system must be capable of generating audit logs and
reports that meet regulatory requirements.
FEASIBILITY ANALYSIS -
Feasibility analysis is the process of evaluating the viability of a proposed project or
system from different perspectives. It helps stakeholders assess whether the project is
worth pursuing before investing significant time, resources, and money. Feasibility
analysis is conducted early in the project lifecycle and can help in determining the
project's potential for success.
o Data stores are typically used to hold data that a system needs to process.
o Represent sources or destinations of data that are external to the system but
interact with it.
o Represent the movement of data between processes, data stores, and external
entities.
o Arrows are labelled to describe the type or content of the data flowing through
the system.
Raw Data: This is the first stage where data is gathered from various sources such as
sensors, human inputs, external databases, or transactions. Data is collected from both
internal and external environments.
Types of Data: This can be structured data (like numbers and text) or unstructured data
(such as images, videos, or audio).
2. Data Processing
4. Data Retrieval
Querying: Users or applications can retrieve the necessary information through queries
or reports. This involves retrieving stored data for decision-making, analysis, or
reporting.
User Interface: This may involve presenting data through dashboards or reports, often
designed with user-friendly interfaces.
5. Analysis
Business Intelligence (BI): Analyzing the data to gain insights using tools like statistical
methods, machine learning, or data visualization techniques.
Decision Support: Data analysis supports business decisions such as forecasting,
performance evaluation, and trend identification.
6. Output
1. Input System:
The input system refers to the process of receiving data or information from external
sources and converting it into a form that can be processed by the system. It is the initial
stage where raw data is gathered for processing.
Input Devices:
o These are physical hardware tools used to enter data into a system. Examples
include:
Keyboard: Used for typing text or commands.
Mouse: Allows interaction with graphical interfaces.
Scanner: Converts physical documents into digital form.
Microphone: Captures audio input.
Cameras: Capture images or video input.
Sensors: Gather environmental or contextual data (e.g., temperature,
motion).
Data Entry Methods:
o Manual Input: Data entered directly by users (e.g., typing on a keyboard).
o Automated Input: Data collected automatically through sensors or devices (e.g.,
barcode scanners, IoT devices).
o Data Import: Data uploaded from external sources or systems (e.g., importing
files, APIs).
Process:
1. Data Capture: Raw data from various sources is captured, such as sensor readings, user
input, or other systems.
2. Data Conversion: Data is converted into a digital format that can be processed. This
could involve conversion from analog signals to digital (e.g., voice recognition or image
processing).
3. Validation: Before entering the system, data may be checked for accuracy, consistency,
and completeness (e.g., checking for valid input ranges).
4. Data Storage: The inputted data is typically stored temporarily in buffers or directly in
databases, ready for processing.
2. Output System:
The output system refers to the process of converting processed data into meaningful
information and delivering it to the user or other systems in a usable format. It is the final
stage of the data flow in an information system.
Output Devices:
o These are hardware tools that display or produce the processed information.
Examples include:
Monitor: Displays information visually (e.g., reports, graphics, or
dashboards).
Printer: Converts digital information into physical format (e.g., paper
printouts).
Speakers: Output audio data, such as notifications or voice responses.
Projector: Displays visuals on a larger surface (e.g., for presentations).
Actuators: Devices that perform an action (e.g., motors or robots that act
based on processed data).
Output Methods:
o Visual Output: Displaying data as text, images, graphs, or charts.
o Audio Output: Delivering information through sound, such as notifications or
voice commands.
o Physical Output: Producing printed documents or other physical representations
of data.
Process:
1. Data Processing: Data that was inputted into the system is processed (analyzed,
calculated, or transformed).
2. Format Conversion: Processed data is converted into a user-friendly format (e.g., charts,
graphs, reports).
3. Presentation: The system presents the information through the appropriate output
device, ensuring the output is understandable to the user or system.
4. Action: In some cases, output might trigger further actions, such as printing a document,
sending an alert, or initiating a task.
Interaction Between Input and Output Systems:
The input and output systems often work together in a feedback loop. For example:
o In Real-Time Systems: Input from sensors is processed and outputs actions are
immediately performed (e.g., adjusting temperature in a smart thermostat based
on user input).
o User Interfaces (UI): The user inputs data through an interface, and the system
immediately shows output (e.g., web forms or mobile apps).
In general, the process life cycle is a structured sequence of phases that helps in
managing a process, project, or system through its entire life, from inception to
termination.
1. Initiation
Purpose: This is the beginning phase of the life cycle where the process or project is
defined.
Activities:
o Identifying the need or problem to be solved.
o Defining the scope, objectives, and goals.
o Assessing the feasibility (whether the process is possible and beneficial).
o Securing necessary approvals or resources.
Outcome: A clear understanding of the purpose of the process or project, along with
initial plans and resources to proceed.
2. Planning
Purpose: Detailed planning occurs to lay out a roadmap for how the process will be
carried out.
Activities:
o Designing the process flow, timeline, and resource allocation.
o Identifying required tools, technologies, and team members.
o Developing a risk management plan to handle potential challenges.
o Setting performance metrics or KPIs (Key Performance Indicators) to track
progress.
Outcome: A comprehensive plan or blueprint for the process, with clear roles,
responsibilities, and timelines defined.
3. Execution (Implementation)
Purpose: The actual work begins, and the process or project is put into action.
Activities:
o Performing the tasks as per the plan.
o Allocating resources and managing the team to complete the activities.
o Ensuring that all components are coordinated and operating efficiently.
o Monitoring progress and adjusting strategies if necessary.
Outcome: The process or project is actively running, with ongoing work and
performance monitoring.
Purpose: This stage ensures that the process is on track and delivers the desired results.
Activities:
o Regularly tracking progress against the plan (using KPIs, reports, or dashboards).
o Identifying and resolving issues, risks, or delays.
o Making adjustments to resources, scope, or timelines to stay on track.
o Ensuring that quality standards and objectives are being met.
Outcome: The process is being closely managed, with adjustments made to ensure it
meets goals, deadlines, and quality standards.
5. Completion (Closure)
Purpose: After the process is completed, evaluating its success and performance can
provide insights for future processes.
Activities:
o Reviewing the outcomes against the original objectives and goals.
o Gathering feedback from stakeholders, team members, and end-users.
o Analyzing what went well and identifying areas for improvement.
o Documenting lessons learned and best practices for future projects.
Outcome: Insights and feedback that will guide future processes, ensuring that
continuous improvement is applied.
In Project Management: The life cycle stages often follow the framework
outlined by methodologies like PMBOK or Agile, which include:
o Initiating
o Planning
o Executing
o Monitoring & Controlling
o Closing
UNIT- 2
WEB TECHNOLOGIES –
HTML –
HTML (Hyper Text Markup Language) is the standard language used to create and
design web pages. It forms the backbone of most websites, providing the structure and
layout that enables browsers to render the content correctly.
HTML uses a system of "markup" to define the structure and organization of content.
Markup consists of elements or tags, which are enclosed in angle brackets (< >). These
tags tell the browser how to display text, images, links, and other content on the page.
XML –
Extensible Markup Language (XML) is a markup language that defines a set of rules for
encoding documents in a format that is both human-readable and machine-readable. The
design goals of XML focus on simplicity, generality, and usability across the Internet. It
is a textual data format with strong support via Unicode for different human languages.
CSS –
CSS (Cascading Style Sheets) is a style sheet language used to describe the presentation
of a document written in HTML or XML. CSS controls the layout, colors, fonts, and
overall visual presentation of web pages. It's a core technology used in web development
alongside HTML and JavaScript to create beautiful, responsive, and well-structured
websites
PROGRAMMING LANGUAGES –
A programming language is a formal language used to communicate instructions to a
computer. It provides a set of syntax and rules to write programs that perform specific
tasks. Programming languages allow developers to write software, applications, websites,
and systems that control computer behavior and functionality.
Programming languages vary in their design, purpose, and level of abstraction. Some are
designed for general-purpose programming, while others are specialized for tasks like
web development, data analysis, or hardware control.
WEB SERVERS –
A web server is a system that stores and delivers web pages to users. It uses the
HTTP/HTTPS protocol to handle requests from browsers and sends back things like
HTML files, images, and videos.
Web Browser This is where you type the URL (e.g., www.example.com). The web
browser sends a request for the page you want to access.
Request Sent via the Internet: The request travels over the Internet to the web
server, asking for specific content like a webpage or an image.
Web Server: The web server is a computer that stores and delivers web pages. It
receives the request from the browser and processes it. The server then prepares the
requested information (like HTML, images, etc.).
Response Sent Back: The web server sends the response (the requested webpage or
content) back through the internet.
Web Browser Displays the Page: The browser receives the response from the web
server and displays the web page to the user.
SERVER PRODUCT –
A server product refers to both hardware and software designed to provide services,
manage resources, or host applications and data. Servers are the backbone of network
systems and data centers, providing critical services such as file hosting, data
management, security, and computing power to users and other devices in a network.
Server products can be categorized into hardware and software solutions, with each
playing a key role in managing data and providing services to clients.
DATABASES –
A database is an organized collection of data that is stored and accessed electronically,
typically from a computer system. Databases are designed to manage large amounts of
data by enabling efficient storage, retrieval, manipulation, and updating of that data. They
play a crucial role in various applications, such as managing business transactions,
organizing records, and supporting websites and apps.
MYSQL –
MYSQL is an open-source relational database management system (RDBMS) that uses
Structured Query Language (SQL) for managing and manipulating data stored in
tables. It is developed, maintained, and supported by Oracle Corporation. MySQL is one
of the most commonly used databases in web development, particularly because it
integrates well with web technologies and is fast, reliable, and easy to use.
Key Features of MYSQL:
Relational Database: Data is stored in tables (or relations), and relationships can
be established between tables using keys (primary and foreign keys).
SQL-Based: You interact with the database using SQL, a standardized query
language to manage data.
Open-Source: MYSQL is free to use under the GNU General Public License, and
there is a large community that contributes to its development.
Cross-Platform: MYSQL can run on various operating systems, such as
Windows, Linux, MAC OS, etc.
Scalable: MYSQL is highly scalable and supports large databases and high-
performance applications.
ACID Compliant: MYSQL supports ACID (Atomicity, Consistency, Isolation,
Durability ) properties, which ensure reliable transactions.
MS ACCESS –
Microsoft Access (MS Access) is a relational database management system
(RDBMS) developed by Microsoft. It provides a user-friendly interface for creating,
managing, and analyzing databases. MS Access combines the relational database
engine with a graphical interface and software development tools, making it ideal for
small-to-medium-sized database applications.
PHARMACOKINETICS –
Pharmacokinetics is the branch of pharmacology that deals with the absorption,
distribution, metabolism, and excretion (ADME) of drugs in the body. It describes how
the body interacts with a drug over time, from the moment the drug enters the body until
it is eliminated. Understanding pharmacokinetics is essential for determining the
appropriate dosages, frequency of administration, and potential side effects of
medications.
Hospital and clinical pharmacy are two specialized branches of pharmacy that focus on
optimizing medication use in healthcare settings. Both areas involve working closely with
healthcare professionals to ensure the safe, effective, and appropriate use of medications
for patients. While they share similar goals of improving patient outcomes, they differ in
their environments, roles, and responsibilities.
Hospital Pharmacy
Hospital pharmacy refers to the practice of pharmacy within a hospital setting, where
pharmacists are responsible for ensuring the safe and effective use of medications for
hospitalized patients.
1. Medication Dispensing:
o Hospital pharmacists are involved in the preparation, labeling, and
dispensing of medications to patients, ensuring accuracy and compliance
with prescriptions.
o Pharmacists check for correct dosages, appropriate drug formulations, and
compatibility with other medications the patient may be taking.
2. Clinical Consultation:
o Hospital pharmacists provide drug-related advice to doctors, nurses, and
other healthcare providers. They assist in drug selection, dosing
adjustments, and potential drug interactions.
o They may be involved in specialized areas, such as oncology, pediatrics,
cardiology, or critical care, offering expertise in complex therapeutic
regimens.
4. Formulary Management:
o Pharmacists participate in the development and management of the
hospital’s formulary, which is a list of approved medications. They ensure
that the drugs on the formulary are safe, effective, and cost-efficient.
o They collaborate with doctors and other stakeholders to make sure the
formulary reflects current clinical practice and patient needs.
5. Patient Education:
o Pharmacists educate patients about their medications, including how to
take them, potential side effects, and the importance of adherence.
o This can be particularly important for patients being discharged from the
hospital, as pharmacists can provide information on medications and help
prevent readmissions due to medication errors.
6. Sterile Compounding:
o Hospital pharmacists are often responsible for preparing intravenous (IV)
medications, including chemotherapy drugs, antibiotics nutrition.
o They must ensure that sterile compounding procedures are followed to
avoid contamination and ensure patient safety.
Clinical Pharmacy
Interdisciplinary Collaboration:
o Clinical pharmacists are part of interdisciplinary healthcare teams that
include doctors, nurses, dietitians, and other professionals. They offer
medication expertise and assist in creating individualized treatment plans.
o This collaboration is especially important in complex cases, such as
patients with multiple, pharmacy, or specialized needs (e.g., pediatric or
geriatric patients).
Patient Safety:
o Clinical pharmacists play a significant role in identifying and preventing
medication errors, adverse drug reactions, and drug interactions.
o They provide oversight in the proper use of high-risk medications, such as
anticoagulants or chemotherapeutic agents, and monitor patients for signs
of toxicity.
Drug Information:
o Clinical pharmacists serve as a reliable source of information on drug
therapy, providing up-to-date knowledge on new medications, therapeutic
guidelines, and drug safety.
ELECTRONIC PRESCRIBING –
Electronic prescribing (e-Prescribing) refers to the use of electronic systems to
create, transmit, and manage prescriptions for medications. It replaces traditional
handwritten prescriptions with a secure and efficient electronic process, benefiting
patients, healthcare providers, and pharmacies by improving the accuracy and
safety of medication prescribing.
DISCHARGE –
An Electronic Discharge System (e-Discharge) is a digital framework used by
healthcare institutions to streamline the discharge process of patients. This system
automates, records, and facilitates the transmission of patient discharge information,
improving efficiency, reducing errors, and enhancing communication between healthcare
providers, patients, and external organizations (such as pharmacies, insurance companies,
and follow-up care providers).
ADHERENCE MONITORING –
Adherence monitoring refers to the process of tracking whether patients follow their
prescribed medication regimens accurately. Medication adherence is critical to achieving
the intended therapeutic outcomes, especially for chronic conditions, mental health
disorders, and infectious diseases such as HIV or tuberculosis. Non-adherence can lead to
treatment failure, disease progression, increased hospitalizations, and higher healthcare
costs.
DIAGNOSTIC SYSTEM –
Diagnostic systems in healthcare refer to the processes, technologies, and tools used by
healthcare providers to identify diseases, conditions, and abnormalities in patients. These
systems play a crucial role in medical practice by helping clinicians make accurate,
timely, and effective decisions about patient care. The evolution of diagnostic systems
has significantly advanced due to the integration of technology, offering more accurate
and efficient ways to diagnose various health conditions.
Diagnostic systems can be broadly classified into different types based on their method of
diagnosis, the technology used, and their application in healthcare:
These systems rely on physical exams, laboratory tests, and patient history to diagnose
diseases.
Patient History and Physical Exam: Often the first step in diagnosing a disease,
where the healthcare provider gathers information about symptoms, lifestyle, and
any previous medical history. It can guide the choice of further diagnostic testing.
Laboratory Diagnostic Systems: These include diagnostic tools that analyze
blood, urine, or other biological samples. Examples include:
o Blood tests for identifying infections, organ function, hormone levels, etc.
o Urinalysis for kidney function, hydration levels, or metabolic
abnormalities.
o Microbiological Cultures to detect infections.
These systems use advanced technology to produce images of the internal structures of
the body for diagnostic purposes.
X-Ray: Often used for detecting bone fractures, infections, and abnormalities in
the chest, lungs, and abdomen.
Computed Tomography (CT): A more advanced imaging method that combines
X-rays to create cross-sectional images of the body, useful for detecting cancer,
internal bleeding, and other serious conditions.
Magnetic Resonance Imaging (MRI): Uses strong magnetic fields and radio
waves to produce detailed images of internal organs and tissues, especially for
brain, spinal cord, and joint conditions.
Ultrasound: Uses sound waves to create images of soft tissues, often used for
prenatal care, abdominal issues, and blood flow problems.
Positron Emission Tomography (PET): Helps identify cancer, heart conditions,
and neurological disorders by observing the metabolic activity of tissues.
AI-based systems use algorithms and machine learning models to analyze medical data
and assist in diagnosis.
These systems enable healthcare professionals to conduct diagnostic tests quickly at the
patient’s location (e.g., in a clinic, at home, or in an emergency room).
Data Collection and Integration: Diagnostic systems often require the collection
of diverse patient data, including symptoms, medical history, test results, and
imaging data. Integrating this data efficiently into a single platform is essential for
making accurate diagnoses.
Data Analysis and Interpretation: The analysis of collected data is the
backbone of the diagnostic system. This may involve:
o Manual Interpretation by healthcare professionals based on their
experience and knowledge.
o Automated Analysis using AI, machine learning algorithms, or software
tools that can interpret complex data and suggest diagnoses.
LAB-DIAGNOSTIC SYSTEM –
Laboratory diagnostic systems refer to the tools, technologies, and methods used in
medical laboratories to analyze biological samples (e.g., blood, urine, tissue) in order to
diagnose diseases, monitor patient conditions, and guide treatment decisions. These
systems are essential for detecting a wide range of health conditions, from infectious
diseases and cancers to metabolic disorders and genetic conditions.
OBJECTIVE OF BIOINFORMATICS –
The aims of bioinformatics are threefold.
1. First, at its simplest bioinformatics organizes data in a way that allows researchers to
access existing information and to submit new entries as they are produced, e.g. the
Protein Data Bank for 3D macromolecular structures. While data- is an essential task, the
information stored in these databases is essentially useless until. Thus, the purpose of
bioinformatics extends much further.
2. The second aim is to develop tools and resources that aid in the analysis of data. For
example, having sequenced a particular protein, it is of interest to compare it with
previously characterized sequences. This needs more than just a simple text-based search
and programs such as FASTA and PSI-BLAST must consider what comprises a
biologically significant match. Development of such resources dictates expertise in
computational theory as well as a thorough understanding of biology.
3. The third aim is to use these tools to the data and interpret the results in a biologically
meaningful manner. Traditionally, biological studies examined individual systems in
detail, and frequently compared with a few that are related. In bioinformatics, we can
now conduct global analyses of all the available data with the aim of uncovering common
principles that apply across many systems and highlight novel features.
BIOINFORMATICS DATBASES –
• Biological data are complex, exception-ridden, vast and incomplete. Therefore, several
databases have been created and interpreted to ensure unambiguous results. A collection
of biological data arranged in computer readable form that enhances the speed of search
and retrieval and convenient to use is called biological database. A good database must
have updated information.
So much, however, is yet only a part of the total effort required to take a vaccine from the
computer to the marketplace. The theoretically derived peptides must be next synthesized
and tested in the laboratory against mouse models to ensure the predicted immune
responses do actually occur. To administer the synthetic peptides, one must determine the
best carrier proteins and take care that the peptides do not fold up in vivo and destroy the
antibody–antigen binding possibility. To enhance the effectiveness of the administered
vaccine, suitable adjuvant can be used. Use of adjuvant is quite common and well
recognized; an adjuvant like AS04 is a part of the Cervix HPV vaccine.
An added advantage of using peptide vaccines over traditional whole protein vaccines is
combining different peptides into one vaccine, called multivalent vaccines, to enable as
wide a coverage as possible so that one or the other will elicit adequate immune response.
The principle is well-known: a 9-valent VLP vaccine is designed against nine types of
human ; a childhood vaccine known as triple antigen is designed against diphtheria,
tetanus, and whooping cough where the of diphtheria and tetanus are used along with
whole killed cells of whooping cough. These are examples from currently used traditional
vaccines; the potential for multivalent vaccines will increase many fold in the peptide
vaccine era.
In spite of the apparently enormous developments to date, the bioinformatics era in
vaccine design can be considered to be at the beginning stages and much more needs to
be done. The entire exercise of determining T-cell and B-cell depends acutely on
accuracy of genomic and proteomic data and that no means guaranteed as yet. For
instance, there are still significantly large number of gene and genomic sequences where
one or more of the constituents remain ambiguous: for example, out of 22 genomes of the
virus, 9 have 1 or more nucleotides, and therefore the associated amino acids, as yet to be
identified with certainty. Since antibodies are extremely specific, and one amino acid
difference can cancel the antibody–antigen binding, errors in the database can make the
entire bioinformatics exercise in vaccine design in vain. Highly reliable data is an
imperative in such bioinformatics search for suitable vaccine targets.
The necessity of more robust techniques that perhaps can provide the best results for
vaccine targets with analyses of fewer sequences than needed with current techniques is
best judged in trying to cope with viral epidemics. Such epidemics strike rapidly, last
over a few months to a year, and then die out either due to mutational changes or enough
people acquiring immunity to act as a deterrent to further spread of the virus. Given that a
fresh epidemic will arise only from a new virus or a new strain of an old virus, gathering
enough genomic data and going through normal dry and wet labs for a fool-proof vaccine
within this time schedule is outside the realms of possibility with current traditional or
bioinformatics techniques. The approach to the SARS epidemic of 2003 was an
exception; the Ebola virus epidemic of 2015 could be controlled by a new vaccine, but
that was because the vaccine had already been designed and was ready for field trials, but
was brought into live use in the face of exigency. In the case of a future epidemic, we will
need much better, rapid-result bioinformatics and wet lab techniques to contain such viral
attacks. The world is not ready for effective handling of epidemics and pandemics yet.
UNIT-5
COMPUTERS AND DATA ANALYSIS IN
PRECLINICAL DEVELPOMENT-
There has been a strong impact of regulations, specifically those that pertain to electronic
document management and electronic signatures, 21 CFR Part 11 published by
the FDA (Food and Drug Administration). This has led to putting a check on the usage of
computers to aid pharmaceutical research and development.
The CDS is used for automating pharmaceutical analysis, mostly those that pertain to
chromatographic data generated from various test like HPLC (High performance liquid
chromatography), GC (Gas Chromatography), IC (Ion exchange chromatography), CE
(capillary Electrophoresis and SFC (Super critical fluid chromatography). So far, the
CDS has been helping in providing accurate and reliable data. However, recently the
regulatory filings have moved from being data-based to information-based. Thus, there is
scope of improvement for this technology to lay more emphasis on data analysis and
signal detection.
The LIMS provides data management capability for all non-chromatographic data that
cannot be handled by the CDS. Another important function of LIMS is automation of
stability studies including sample tracking, distribution, working assignment, result
capturing, data processing, review, approval, report generation and data archiving,
retrieving and sharing.
The TIMS is not used as widely as the LIMS, however, it helps improve efficiency in
managing business-critical text documents. However, the process of manually writing,
reviewing, auditing and publishing text documents is time consuming which is why the
industry is working towards the method of electronic submissions. The truth is that we
are still not there, and electronic submissions may still take a while to be a reality.