824 research outputs found

    Conversational Sensing

    Full text link
    Recent developments in sensing technologies, mobile devices and context-aware user interfaces have made it possible to represent information fusion and situational awareness as a conversational process among actors - human and machine agents - at or near the tactical edges of a network. Motivated by use cases in the domain of security, policing and emergency response, this paper presents an approach to information collection, fusion and sense-making based on the use of natural language (NL) and controlled natural language (CNL) to support richer forms of human-machine interaction. The approach uses a conversational protocol to facilitate a flow of collaborative messages from NL to CNL and back again in support of interactions such as: turning eyewitness reports from human observers into actionable information (from both trained and untrained sources); fusing information from humans and physical sensors (with associated quality metadata); and assisting human analysts to make the best use of available sensing assets in an area of interest (governed by management and security policies). CNL is used as a common formal knowledge representation for both machine and human agents to support reasoning, semantic information fusion and generation of rationale for inferences, in ways that remain transparent to human users. Examples are provided of various alternative styles for user feedback, including NL, CNL and graphical feedback. A pilot experiment with human subjects shows that a prototype conversational agent is able to gather usable CNL information from untrained human subjects

    What's in a name? Cultural observations on nationally named hacking groups

    Get PDF
    Culture's role in cognition has long been established, but understanding national culture's role in cyber events currently remains an understudied research area. Michael Minkov observed that culture influences thought; even when people think they are in control, cultural biases are actually controlling their thoughts. Cultural values endure, and because they do, these cultural values leave artifacts can be revealed in thought patterns. This philosophy serves as a foundation for further work in progress on name choices by hackers. In this study, we examined 10 years' worth of Zone-H archives where hacker names that identified with national identities were analysed using Hofstede's cultural framework to determine whether culture may play a role in hacker name and name choices. The findings revealed cultural preferences in several of the six cultural dimensions. In addition, trending the results showed significant findings in two cultural dimensions: (1) masculinity versus femininity and (2) uncertainty avoidance. The results suggest that assumptions about the anonymous nature of the Internet influencing behaviours may not be universally applicable, and that culture should also be considered when evaluating cyber actor behaviours

    A cultural exploration of the social media manipulators

    Get PDF
    The widespread use of Internet social media sites for the production and dissemination of propaganda continues to grow and gather attention. Social media sites spread information faster and wider than those institutions and methods historically limited to state-affiliated organizations. There are several characteristics that are unique to virtual space and make the production and dissemination of propaganda different; they include the Internet’s global reach, the recipient’s apparent trust placed in information source as well as the information sources, and the low cost of participation. Thus, the use of social media as a method to spread misleading information exploits trust relationships between the reader and the source. Although propaganda is a weapon with a long history in war, in the 21st century, the delivery and distribution of propaganda through the trusted channel of social media is markedly different than what was historically observed. We investigated the relationships among state-affiliated actors who use social media to produce and distribute propaganda along with their national cultural values. Prior research inferred a link between culture and social media usage (Hofstede et al., 2010; Sample & Karamanian 2014). Specifically, Hofstede et al. (2010) contended that cultures that are more masculine use the Internet for information seeking, whereas more feminine-oriented cultures use social media sites for sharing information, seeking to build better “trusting” relationships. We sought to explore whether masculine countries would leverage the trust relationships that are present with social media users to further the reach of state-affiliated propaganda. We built upon Bradshaw & Howard’s (2017) study on propaganda purveyors, which examined preferred social media deployment techniques across 29 different countries. Using previously published methods, we examined associations with culture using Hofestede’s scale. Since masculine countries have previously been associated with information-seeking behaviors, we sought to explore the potential that more masculine cultural values are associated with greater information-shaping and -distributing behaviors compared with more feminine cultural values. The results showed a strong difference in distributions, countries that deployed fake news via social media tended to have more masculine cultural values. Moderate differences were observed in other cultural values, purveyors of social media propaganda exhibited more authoritarianism and uncertainty avoidance. These findings suggest that specific cultural values associate with the distrubtion of fake news, indicating that culturally aware responses may be more effective when responding to these events

    SHERLOCK: Experimental evaluation of a conversational agent for mobile information tasks

    Get PDF
    Abstract—Controlled Natural Language (CNL) has great potential to support human-machine interaction (HMI) because it provides an information representation that is both human readable and machine processable.We investigated the effectiveness of a CNL-based conversational interface for HMI in a behavioural experiment called Simple Human Experiment Regarding Locally Observed Collective Knowledge (SHERLOCK). In SHERLOCK, individuals acted in groups to discover and report information to the machine using natural language (NL), which the machine then processed into CNL. The machine fused responses from different users to form a common operating picture, a dashboard showing the level of agreement for distinct information. To obtain information to add to this dashboard, users explored the real world in a simulated crowd-sourced sensing scenario. This scenario represented a simplified, controlled analogue for tactical intelligence (i.e., direct intelligence of the environment), which is key for rapidly planning military, law enforcement, and emergency operations. Overall, despite close to zero training, 74% of the users inputted NL that was machine interpretable and addressed the assigned tasks. An experimental manipulation aimed to increase user-machine interaction, however, did not improve performance as hypothesised. Nevertheless, results indicate the conversational interface may be effective in assisting humans with collection and fusion of information in a crowd-sourcing context

    Patient-Specific Injury Metrics Predict Early Biomarker Response in Multiply Injured Patients

    Get PDF
    poster abstractIntroduction: It is important to identify multiply injured patients (MIPs) that can tolerate high-magnitude procedures and those at risk for complications. Determining how injury leads to immunologic dysfunction could identify MIPs at risk for complications. We explored a new precision medicine approach in which we determined how patientspecific injury metrics corresponded to changes in cytokines in a prospective cohort of MIPs. Methods: This was a prospective observational cohort of 40 MIPs, 18-55 yo, admitted to surgical ICU having had full axial CTs done at admission. Mechanical tissue damage was quantified by calculating volumetric measures of injuries from CT scans into the Tissue Damage Volume score (TDV). Ischemic tissue damage was calculated by calculation of all abnormal Shock Volumes (SV) (heart rate/systolic blood pressure > 0.9) in the first 24hr after injury. TIMS was calculated by combining mechanical and ischemic tissue damage: TIMS = TDV+5*SV. Linear regression was performed between TIMS and 21 cytokines including interleukin (IL)-6; IL-8; IL-10; IL-1RA; IL-2RA; MCP-1 drawn at 0hr, 8hr, and 24hr after injury. Linear regression was also performed between the cytokines, Injury Severity Score (ISS) and minimum pH (day 1). Results: Mean and median ISS was 29 (range 9 – 66). Minimum pH demonstrated best correspondence to cytokine levels measured 0hr and 8hr after injury. TIMS demonstrated the best correspondence to cytokine levels 24hr after injury. ISS demonstrated minimal predictive value of cytokines at any timepoint. Discussion: A precision medicine approach using a patient-specific quantity of injury predicted trauma-associated changes in circulating cytokines at 0hr, 8 hr, and 24 hr after surgery. This corresponds favorably with timing of orthopaedic surgical decisions regarding staged fracture interventions. While clinical significance of these findings is unknown, computational data analyses of temporal cytokine changes have been shown to be predictive of adverse outcomes after injury

    SHOCK VOLUME: A PRECISION MEDICINE BASED INDEX THAT PREDICTS TRANSFUSION REQUIREMENTS AND ORGAN DYSFUNCTION IN MULTIPLY INJURED PATIENTS

    Get PDF
    poster abstractIntroduction: Multiply injured patients (MIPs) in hemorrhagic shock develop oxygen debt, which causes organ dysfunction and can lead to death. Clinicians monitor hypoperfusion by interpreting progression of traditional hemodynamic measures along with serum markers of hypoperfusion, which reflect current hemodynamic and metabolic status. However, these indices are sampled at discrete time points and poorly reflect cumulative hypoperfusion. Shock Volume (SV) is a novel, non-invasive, patient-specific index developed to quantify cumulative hypoperfusion. SV integrates the time and magnitude of shock index (Heart Rate/Systolic Blood Pressure) values above 0.9 (known threshold of hypoperfusion) using serial individual vital sign data. SV can be monitored in real time to assess ongoing hypoperfusion. The goal of this study was to determine how SV corresponded to transfusion requirements and organ dysfunction. Methods: SV was measured in six hour increments for 48 hours after injury in a retrospective cohort of 74 MIPs (18-65; Injury Severity Score > 18). SV was compared to base deficit (BD) in predicting mass transfusions (MT) and critical administration transfusions (CATs). Presence of multiple organ failure (MOF) was determined using the Denver Organ Failure assessment score, while Sequential Organ Failure Assessment scores were used to determine magnitude of organ dysfunction. Results: Patients who had accumulated 40 units of SV within six hours of injury and 100 units of SV within twelve hours of injury were at high risk for requiring MT or multiple CATs. SV measurements were equally sensitive and specific as compared to BD values in predicting transfusions. SV measurements at six hours after injury stratified patients at risk for MOF and corresponded to the magnitude of organ failure. Conclusions: SV is a patient-specific index that can be quantified in real-time in critically injured patients. SV is a non-invasive surrogate for cumulative hypoperfusion and predicts high volume transfusions and organ dysfunction

    THE PATIENT-SPECIFIC INJURY SCORE: PRECISION MEDICINE IN TRAUMA PATIENTS PREDICTS ORGAN DYSFUNCTION AND OUTCOMES

    Get PDF
    poster abstractIntroduction: Current injury scoring systems in polytraumatized patients are limited at predicting patient outcomes. We present a novel method that quantifies mechanical tissue damage and cumulative hypoperfusion using a precision medicine approach. We hypothesized that a Patient-Specific Injury score formulated from individualized injury indices would stratify patient risk for developing organ dysfunction after injury. We compared correspondence between PSI and the Injury Severity Score with outcomes of organ dysfunction and MOF. Methods: Fifty Multiply-injured-patients (MIPs) were studied. Tissue Damage Volume scores were measured from admission pan-axial CT scans using purpose-designed post-processing software to quantify volumetric magnitude and distribution of injuries. Ischemic injury was quantified using Shock Volumes. SV is a time-magnitude integration of shock index. Values above 0.9 were measured in the 24-hours after injury. Metabolic response was quantified by subtracting the lowest first 24 hr pH from 7.40. PSI combines these indices into the formula: PSI=[0.2TDV+SV]*MR. Correspondence coefficients from regression modeling between PSI and organ dysfunction, measured by the Marshall Multiple Organ Dysfunction score averaged from days 2-5 post-injury, were compared to similar regression models of ISS vs. day 2-5 MOD-scores. We compared PSI and ISS in patients that did or did not develop MOF. Results: PSI demonstrated better correlation to organ dysfunction (r2=0.576) in comparison to ISS (r2=0.393) using the MOD-score on days 2-5. Mean PSI increased 3.4x(58.5vs.17.0;p<0.02) and ISS scores increased 1.4x(39.0vs.28.0;p=0.10) in patients that developed MOF versus those that did not. Conclusions: This study shows that a precision medicine approach that integrates patient-specific indices of mechanical tissue damage, ischemic tissue injury, and metabolic response better corresponds to phenotypic changes including organ dysfunction and MOF compared to ISS in MIPs. The PSI-score can be calculated within 24 hours of injury, making it useful for stratifying risk and predicting the magnitude of organ dysfunction to anticipate

    Coalitions of things: supporting ISR tasks via Internet of Things approaches

    Get PDF
    In the wake of rapid maturing of Internet of Things (IoT) approaches and technologies in the commercial sector, the IoT is increasingly seen as a key ‘disruptive’ technology in military environments. Future operational environments are expected to be characterized by a lower proportion of human participants and a higher proportion of autonomous and semi-autonomous devices. This view is reflected in both US ‘third offset’ and UK ‘information age’ thinking and is likely to have a profound effect on how multinational coalition operations are conducted in the future. Much of the initial consideration of IoT adoption in the military domain has rightly focused on security concerns, reflecting similar cautions in the early era of electronic commerce. As IoT approaches mature, this initial technical focus is likely to shift to considerations of interactivity and policy. In this paper, rather than considering the broader range of IoT applications in the military context, we focus on roles for IoT concepts and devices in future intelligence, surveillance and reconnaissance (ISR) tasks, drawing on experience in sensor-mission resourcing and human-computer collaboration (HCC) for ISR. We highlight the importance of low training overheads in the adoption of IoT approaches, and the need to balance proactivity and interactivity (push vs pull modes). As with sensing systems over the last decade, we emphasize that, to be valuable in ISR tasks, IoT devices will need a degree of mission-awareness in addition to an ability to self-manage their limited resources (power, memory, bandwidth, computation, etc). In coalition operations, the management and potential sharing of IoT devices and systems among partners (e.g., in cross-coalition tactical-edge ISR teams) becomes a key issue due heterogeneous factors such as language, policy, procedure and doctrine. Finally, we briefly outline a platform that we have developed in order to experiment with human-IoT teaming on ISR tasks, in both physical and virtual settings

    Direct Spectrophotometric Determination of Cefuroxime Axetil in Pure Form and Pharmaceutical Dosage Forms.

    Get PDF
    A simple, direct and cost-effective spectrophotometric method for determination of cefuroxime axetil (CRXA) &nbsp;in pure and tablet dosage forms was applied. This method is based on formation of ion-pair complex ([CRXA]:[BTB]) between CRXA and bromothymol blue (BTB) in chloroform. Beer’s law in the optimum experimental conditions using [CRXA]:[BTB] complex is valid within a concentration range of 2.00-50.00 ?M (1.021–25.524 ?g.mL-1). The developed method is applied for the determination of CRXA in pure and its commercial tablets without any interference from excipients with average assay of 96.8 to 101.6% and the results are in good agreement with those obtained by the HPLC reference method. Associated drugs (sulbactam and linesolid) with cefuroxime axetil are considered to be interfere, while metronidazole can be considered as non-interfere
    corecore