354 research outputs found

    Real-time human ambulation, activity, and physiological monitoring:taxonomy of issues, techniques, applications, challenges and limitations

    Get PDF
    Automated methods of real-time, unobtrusive, human ambulation, activity, and wellness monitoring and data analysis using various algorithmic techniques have been subjects of intense research. The general aim is to devise effective means of addressing the demands of assisted living, rehabilitation, and clinical observation and assessment through sensor-based monitoring. The research studies have resulted in a large amount of literature. This paper presents a holistic articulation of the research studies and offers comprehensive insights along four main axes: distribution of existing studies; monitoring device framework and sensor types; data collection, processing and analysis; and applications, limitations and challenges. The aim is to present a systematic and most complete study of literature in the area in order to identify research gaps and prioritize future research directions

    Evaluating the effects of bilingual traffic signs on driver performance and safety

    Get PDF
    Variable Message Signs (VMS) can provide immediate and relevant information to road users and bilingual VMS can provide great flexibility in countries where a significant proportion of the population speak an alternative language to the majority. The study reported here evaluates the effect of various bilingual VMS configurations on driver behaviour and safety. The aim of the study was to determine whether or not the visual distraction associated with bilingual VMS signs of different configurations (length, complexity) impacted on driving performance. A driving simulator was used to allow full control over the scenarios, road environment and sign configuration and both longitudinal and lateral driver performance was assessed. Drivers were able to read one and two-line monolingual signs and two-line bilingual signs without disruption to their driving behaviour. However, drivers significantly reduced their speed in order to read four-line monolingual and four-line bilingual signs, accompanied by an increase in headway to the vehicle in front. This implies that drivers are possibly reading the irrelevant text on the bilingual sign and various methods for reducing this effect are discussed

    Doctor of Philosophy

    Get PDF
    dissertationManual annotation of clinical texts is often used as a method of generating reference standards that provide data for training and evaluation of Natural Language Processing (NLP) systems. Manually annotating clinical texts is time consuming, expensive, and requires considerable cognitive effort on the part of human reviewers. Furthermore, reference standards must be generated in ways that produce consistent and reliable data but must also be valid in order to adequately evaluate the performance of those systems. The amount of labeled data necessary varies depending on the level of analysis, the complexity of the clinical use case, and the methods that will be used to develop automated machine systems for information extraction and classification. Evaluating methods that potentially reduce cost, manual human workload, introduce task efficiencies, and reduce the amount of labeled data necessary to train NLP tools for specific clinical use cases are active areas of research inquiry in the clinical NLP domain. This dissertation integrates a mixed methods approach using methodologies from cognitive science and artificial intelligence with manual annotation of clinical texts. Aim 1 of this dissertation identifies factors that affect manual annotation of clinical texts. These factors are further explored by evaluating approaches that may introduce efficiencies into manual review tasks applied to two different NLP development areas - semantic annotation of clinical concepts and identification of information representing Protected Health Information (PHI) as defined by HIPAA. Both experiments integrate iv different priming mechanisms using noninteractive and machine-assisted methods. The main hypothesis for this research is that integrating pre-annotation or other machineassisted methods within manual annotation workflows will improve efficiency of manual annotation tasks without diminishing the quality of generated reference standards

    Automatism and art practice

    Get PDF
    Merged with duplicate record 10026.1/2209 on 28.02.2017 by CS (TIS)The research project is to develop an understanding of the use of automatism in the practice of art derived from an interrelationship between the material process of art and critical text. As these practices converge in their vocabularies of the psychic and the somatic, they formulate a discourse of interpretation. The critical textual inquiry has identified an expanded language of interpretation for automatism within the vocabularies of three particular areas of investigation in, I. Psychoanalysis, 2. Phenomenology and certain currents of thought in Existentialism, and in 3. The theory and criticism of art. I have laid down an account of the field of research and my reading of it through six constituent writers: Freud, Ehrenzweig, Merleau-Ponty, Breton, Bataille and Rosenberg, determined from the artist-practitioner's perspective to be central contributors to an understanding of automatism. Four key terms have recurred in the material which I have identified in the research process as phenomena of automatist art practice; trauma, repetition, excess and gesture. As thinking continues in a contextualisation of art and critical theory they have provided further links to the theoretical language of current psychoanalysis and criticism by writers including: Agamben, Barthes, Foster, Krauss, Lacan and Lyotard. The focus of the practical inquiry rests upon an exploration of the communion between the unconscious mind and the body in automatism, derived from a studio practice with emphasis on a modelling and casting process. It is developed through the four key terms used as bridges in a critical exchange between the material practice and textual theory including original automatic writing. The theorising function of the art practice has been to initiate the four phases of the process of automatism as phenomena to be re-theorised through the four key terms as they are exemplified by a reflexive studio practice of automatist methodology in action. The body of art presented for examination selects works in series completed from 1996 -2006, in the following materials: bronze, paint, plaster, laser print and wax

    Risk Assessment Framework for Evaluation of Cybersecurity Threats and Vulnerabilities in Medical Devices

    Get PDF
    Medical devices are vulnerable to cybersecurity exploitation and, while they can provide improvements to clinical care, they can put healthcare organizations and their patients at risk of adverse impacts. Evidence has shown that the proliferation of devices on medical networks present cybersecurity challenges for healthcare organizations due to their lack of built-in cybersecurity controls and the inability for organizations to implement security controls on them. The negative impacts of cybersecurity exploitation in healthcare can include the loss of patient confidentiality, risk to patient safety, negative financial consequences for the organization, and loss of business reputation. Assessing the risk of vulnerabilities and threats to medical devices can inform healthcare organizations toward prioritization of resources to reduce risk most effectively. In this research, we build upon a database-driven approach to risk assessment that is based on the elements of threat, vulnerability, asset, and control (TVA-C). We contribute a novel framework for the cybersecurity risk assessment of medical devices. Using a series of papers, we answer questions related to the risk assessment of networked medical devices. We first conducted a case study empirical analysis that determined the scope of security vulnerabilities in a typical computerized medical environment. We then created a cybersecurity risk framework to identify threats and vulnerabilities to medical devices and produce a quantified risk assessment. These results supported actionable decision making at managerial and operational levels of a typical healthcare organization. Finally, we applied the framework using a data set of medical devices received from a partnering healthcare organization. We compare the assessment results of our framework to a commercial risk assessment vulnerability management system used to analyze the same assets. The study also compares our framework results to the NIST Common Vulnerability Scoring System (CVSS) scores related to identified vulnerabilities reported through the Common Vulnerability and Exposure (CVE) program. As a result of these studies, we recognize several contributions to the area of healthcare cybersecurity. To begin with, we provide the first comprehensive vulnerability assessment of a robotic surgical environment, using a da Vinci surgical robot along with its supporting computing assets. This assessment supports the assertion that networked computer environments are at risk of being compromised in healthcare facilities. Next, our framework, known as MedDevRisk, provides a novel method for risk quantification. In addition, our assessment approach uniquely considers the assets that are of value to a medical organization, going beyond the medical device itself. Finally, our incorporation of risk scenarios into the framework represents a novel approach to medical device risk assessment, which was synthesized from other well-known standards. To our knowledge, our research is the first to apply a quantified assessment framework to the problem area of healthcare cybersecurity and medical networked devices. We would conclude that a reduction in the uncertainty about the riskiness of the cybersecurity status of medical devices can be achieved using this framework

    Proceedings of the 14th Annual Software Engineering Workshop

    Get PDF
    Several software related topics are presented. Topics covered include studies and experiment at the Software Engineering Laboratory at the Goddard Space Flight Center, predicting project success from the Software Project Management Process, software environments, testing in a reuse environment, domain directed reuse, and classification tree analysis using the Amadeus measurement and empirical analysis

    Authorization schema for electronic health-care records: for Uganda

    Get PDF
    This thesis discusses how to design an authorization schema focused on ensuring each patient's data privacy within a hospital information system
    • …
    corecore