Objective: To evaluate the clinical value of combining one-view mammography (cranio-caudal, CC) with the complementary view tomosynthesis (mediolateral-oblique, MLO) in comparison to standard two-view mammography (MX) in terms of both lesion detection and characterization.
Methods: A free-response receiver operating characteristic (FROC) experiment was conducted independently by six breast radiologists, obtaining data from 463 breasts of 250 patients. Differences in mean lesion detection fraction (LDF) and mean lesion characterization fraction (LCF) were analysed by analysis of variance (ANOVA) to compare clinical performance of the combination of techniques to standard two-view digital mammography.
Objective: To determine the performance of combined single-view mediolateral oblique (MLO) digital breast tomosynthesis (DBT) plus single-view cranio-caudal (CC) mammography (MX) compared with that of standard two-view digital mammography.
Methods: A multi-reader multi-case (MRMC) receiver-operating characteristic (ROC) study was conducted, involving six breast radiologists. Two hundred fifty patients underwent bilateral MX and DBT imaging.
Purpose: Violence in the workplace is a specific risk for healthcare workers. Radiologists, especially when involved in emergency services, share that risk. Very few studies in the literature have researched this topic.
View Article and Find Full Text PDFThe present contribution, presented as an Editorial, addresses the issue of patient safety in Radiology: this topic, of great current National and Regional interest, has stimulated a strong focus on accidents and mistakes in medicine, together with the diffusion of procedures for Risk Management in all health facilities. The possible sources of incidents in the radiological process are exposed, due to human errors and to system errors connected both to the organization and to the dissemination of Information Technology in the Radiological world. It also describes the most common methods and tools for risk analysis in health systems, together with some application examples presented in Part II.
View Article and Find Full Text PDF