14,369 research outputs found

    A New Artificial Intelligence-Based Hierarchical K-Means Clustering Technique to Detect Addictive Twitter Activity

    Get PDF
    To stop the COVID-19 epidemic from spreading among their populations, several countries have implemented lockdowns. Students are being forced to stay at home during these lockdowns, which is causing them to use mobile phones, social media, and other digital technologies more frequently than ever. Their poor utilization of these digital tools may be detrimental to their emotional and mental health. In this study, we implement an Artificial Intelligence (AI) approach named Hierarchy-based K-Means Clustering (HKMC) algorithm to group individuals with comparable Twitter consumption habits to detect addictive Twitter activity during the epidemic. The effectiveness of the suggested HKMC is evaluated in terms of accuracy, precision, recall, and f1-score in respect to the association between students’ mental health and mobile phone dependency. Additionally, this study offers a comparative examination of both the suggested and existing procedures

    Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography

    Get PDF
    Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is key management. Thus, this paper presents the development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework. The results of the system evaluation showed significant improvements in terms of time efficiency of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the likelihood of imposters gaining successful access to the keys protecting patients protected health information. This result also justifies the feasibility of implementing fuzzy key binding scheme in real applications, especially fuzzy vault which demonstrated a better performance during key reconstruction

    Digital Pharmacovigilance: the medwatcher system for monitoring adverse events through automated processing of internet social media and crowdsourcing

    Full text link
    Thesis (Ph.D.)--Boston UniversityHalf of Americans take a prescription drug, medical devices are in broad use, and population coverage for many vaccines is over 90%. Nearly all medical products carry risk of adverse events (AEs), sometimes severe. However, pre- approval trials use small populations and exclude participants by specific criteria, making them insufficient to determine the risks of a product as used in the population. Existing post-marketing reporting systems are critical, but suffer from underreporting. Meanwhile, recent years have seen an explosion in adoption of Internet services and smartphones. MedWatcher is a new system that harnesses emerging technologies for pharmacovigilance in the general population. MedWatcher consists of two components, a text-processing module, MedWatcher Social, and a crowdsourcing module, MedWatcher Personal. With the natural language processing component, we acquire public data from the Internet, apply classification algorithms, and extract AE signals. With the crowdsourcing application, we provide software allowing consumers to submit AE reports directly. Our MedWatcher Social algorithm for identifying symptoms performs with 77% precision and 88% recall on a sample of Twitter posts. Our machine learning algorithm for identifying AE-related posts performs with 68% precision and 89% recall on a labeled Twitter corpus. For zolpidem tartrate, certolizumab pegol, and dimethyl fumarate, we compared AE profiles from Twitter with reports from the FDA spontaneous reporting system. We find some concordance (Spearman's rho= 0.85, 0.77, 0.82, respectively, for symptoms at MedDRA System Organ Class level). Where the sources differ, milder effects are overrepresented in Twitter. We also compared post-marketing profiles with trial results and found little concordance. MedWatcher Personal saw substantial user adoption, receiving 550 AE reports in a one-year period, including over 400 for one device, Essure. We categorized 400 Essure reports by symptom, compared them to 129 reports from the FDA spontaneous reporting system, and found high concordance (rho = 0.65) using MedDRA Preferred Term granularity. We also compared Essure Twitter posts with MedWatcher and FDA reports, and found rho= 0.25 and 0.31 respectively. MedWatcher represents a novel pharmacoepidemiology surveillance informatics system; our analysis is the first to compare AEs across social media, direct reporting, FDA spontaneous reports, and pre-approval trials

    Include 2011 : The role of inclusive design in making social innovation happen.

    Get PDF
    Include is the biennial conference held at the RCA and hosted by the Helen Hamlyn Centre for Design. The event is directed by Jo-Anne Bichard and attracts an international delegation

    Automatic Generation of Personalized Recommendations in eCoaching

    Get PDF
    Denne avhandlingen omhandler eCoaching for personlig livsstilsstøtte i sanntid ved bruk av informasjons- og kommunikasjonsteknologi. Utfordringen er å designe, utvikle og teknisk evaluere en prototyp av en intelligent eCoach som automatisk genererer personlige og evidensbaserte anbefalinger til en bedre livsstil. Den utviklede løsningen er fokusert på forbedring av fysisk aktivitet. Prototypen bruker bærbare medisinske aktivitetssensorer. De innsamlede data blir semantisk representert og kunstig intelligente algoritmer genererer automatisk meningsfulle, personlige og kontekstbaserte anbefalinger for mindre stillesittende tid. Oppgaven bruker den veletablerte designvitenskapelige forskningsmetodikken for å utvikle teoretiske grunnlag og praktiske implementeringer. Samlet sett fokuserer denne forskningen på teknologisk verifisering snarere enn klinisk evaluering.publishedVersio

    An Assessment of Hospice Patients’ Experience from Cancer Care Services in the United States Hospitals: A Mixed-Method Study

    Get PDF
    This mixed methods research (MMR) addressed management\u27s failure to give high-quality hospice care in healthcare facilities within the United States. Failure to provide high-quality care leads to issues with quality control and customer satisfaction. The researcher used an MMR design to perform a systematic survey of 96 participants in select U.S.-based hospice services management facilities. The medical records from the Research Institution organization were used to choose the participants. The total population was 1,300 from which 96 participants were randomly chosen. This study\u27s first phase included surveying participants utilizing questions from a Likert scale that yielded quantitative responses. The second phase applied a methodical procedure employing open-ended questions to pull thoughtful answers from the participants. Doctors, nurses, hospice leadership, patients with cancer in hospice care (inpatient and outpatient) and veterans were interviewed. Doctors, nurses, leadership, patients, and veterans played a role in this study that focused on Maslow\u27s leadership management theory. The significant issue was addressed by interviewing 25 veterans, 11 leadership management positions (doctors, nurses, leadership), and 60 cancer patient participants at their end of life. Several themes were discovered, which permitted the researcher to suggest potential implementation strategies to be adopted by leadership management in hospice care. The over-arching theme examined in Section 2 and Section 3 of this study formed a basis for further research on the existing literature gaps and for leadership management to use this study to implement best practice in hospice care organizations. Addressing these issues in hospice care may require using ideas mentioned in the recommendations of Section 3. Recommendations concerned implementing strategies to improve patient quality of care, to address staff burnout and employee well-being, to increase motivation and improve communication, and to consider the patient\u27s financial well-being before and after their end of life. The research findings help shed light on the quality of care, leadership involvement, and patient-centered issues for individuals with cancer and their families in the last days of life. Keywords: Burnout, Communication, Financial, End of Life, Leadership, Management, Motivation, and Quality of Lif

    mHealth: opportunities and challenges for diabetes intervention research

    Get PDF
    Background: Traditionally, health intervention evaluations provide long-term evidence of efficacy and safety via validated protocols, following a positivist paradigm, or approach, to research. However, modern mobile health (mHealth) technologies develop too quickly and outside of medical regulation, making it challenging for health research to keep pace. Objective: This thesis explored and tested how research can incorporate mHealth approaches and resources to evaluate mHealth interventions comprehensively, which follows the pragmatism paradigm. The works described herein were part of a larger project that designed, developed, and tested a data-sharing system between patients and their healthcare providers (HCPs) during diabetes consultations. Methods: The pragmatism paradigm underpins the mixed-methods, multi-phase design approach to exploring this overall objective. The following methods were performed using a sequential exploratory strategy. First, co-design workshops invited individuals with diabetes and HCPs to design an mHealth data-sharing system. Next, a scoping literature review identified research practices for evaluating mHealth interventions to-date. Then, app usage-logs, collected from a previous longitudinal study, were analyzed to explore how much additional information they could provide about patients’ self-management. Finally, a mixed-method study was designed to test the feasibility of combining both traditional and mHealth approaches and resources to evaluate an intervention. Results: Using the pragmatist paradigm as a scaffolding, these works provide evidence of how research can provide more comprehensive knowledge about mHealth interventions for diabetes care and self-management. Nine individuals with diabetes and six HCPs participated in the co-design workshops. Feedback included how a data-sharing system should work between patients and providers. The literature review identified how both traditional and mHealth-based approaches (n=15 methods, n=21 measures) were used together to evaluate mHealth interventions. Usage-log analysis revealed that changes in Glycosylated haemoglobin (HbA1c) differed between groups organized by usage patterns and duration of use of mHealth. The mixed-method study demonstrated how to collect comprehensive and complementary information when combining traditional and mHealth-centered approaches and resources. Conclusion: Traditional positivist approaches and resources are not adequate, on their own, to comprehensively understand the impact of mHealth interventions. The presented studies demonstrate that it is both feasible and prudent to combine traditional research with mHealth approaches, such as analyzing usage-logs, arranging co-design workshops, and other patient-centered methods in a pragmatist approach to produce comprehensive evidence of mHealth’s impacts on both patients and HCPs

    User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments

    Get PDF
    Our modern society is increasingly relying on the collection, processing, and sharing of digital information. There are two fundamental trends: (1) Enabled by the rapid developments in sensor, wireless, and networking technologies, communication and networking are becoming more and more pervasive and ad hoc. (2) Driven by the explosive growth of hardware and software capabilities, computation power is becoming a public utility and information is often stored in centralized servers which facilitate ubiquitous access and sharing. Many emerging platforms and systems hinge on both dimensions, such as E-healthcare and Smart Grid. However, the majority information handled by these critical systems is usually sensitive and of high value, while various security breaches could compromise the social welfare of these systems. Thus there is an urgent need to develop security and privacy mechanisms to protect the authenticity, integrity and confidentiality of the collected data, and to control the disclosure of private information. In achieving that, two unique challenges arise: (1) There lacks centralized trusted parties in pervasive networking; (2) The remote data servers tend not to be trusted by system users in handling their data. They make existing security solutions developed for traditional networked information systems unsuitable. To this end, in this dissertation we propose a series of user-centric security and privacy mechanisms that resolve these challenging issues in untrusted network and computing environments, spanning wireless body area networks (WBAN), mobile social networks (MSN), and cloud computing. The main contributions of this dissertation are fourfold. First, we propose a secure ad hoc trust initialization protocol for WBAN, without relying on any pre-established security context among nodes, while defending against a powerful wireless attacker that may or may not compromise sensor nodes. The protocol is highly usable for a human user. Second, we present novel schemes for sharing sensitive information among distributed mobile hosts in MSN which preserves user privacy, where the users neither need to fully trust each other nor rely on any central trusted party. Third, to realize owner-controlled sharing of sensitive data stored on untrusted servers, we put forward a data access control framework using Multi-Authority Attribute-Based Encryption (ABE), that supports scalable fine-grained access and on-demand user revocation, and is free of key-escrow. Finally, we propose mechanisms for authorized keyword search over encrypted data on untrusted servers, with efficient multi-dimensional range, subset and equality query capabilities, and with enhanced search privacy. The common characteristic of our contributions is they minimize the extent of trust that users must place in the corresponding network or computing environments, in a way that is user-centric, i.e., favoring individual owners/users

    Services and Policies for Care at Home

    Get PDF
    It is argued that various factors including the increasingly ageing population will require more care services to be delivered to users in their own homes. Desirable characteristics of such services are outlined. The Open Services Gateway initiative has been adopted as a widely accepted framework that is particularly suitable for developing home care services. Service discovery in this context is enhanced through ontologies that achieve greater flexibility and precision in service description. A service ontology stack allows common concepts to be extended for new services. The architecture of a policy system for home care is explained. This is used for flexible creation and control of new services. The core policy language and its extension for home care are introduced, and illustrated through typical examples. Future extensions of the approach are discussed
    • …
    corecore