Healthcare (Basel)
December 2022
Patient misidentification is a preventable issue that contributes to medical errors. When patients are confused with each other, they can be given the wrong medication or unneeded surgeries. Unconscious, juvenile, and mentally impaired patients represent particular areas of concern, due to their potential inability to confirm their identity or the possibility that they may inadvertently respond to an incorrect patient name (in the case of juveniles and the mentally impaired).
View Article and Find Full Text PDFAmericans are pervasively exposed to social media, news, and online content. Some of this content is designed to be deliberately deceptive and manipulative. However, it is interspersed amongst other content from friends and family, advertising, and legitimate news.
View Article and Find Full Text PDFDue to the recent COVID-19 outbreak, makeshift (MS) hospitals have become an important feature in healthcare systems worldwide. Healthcare personnel (HCP) need to be able to navigate quickly, effectively, and safely to help patients, while still maintaining their own well-being. In this study, a pathfinding algorithm to help HCP navigate through a hospital safely and effectively is developed and verified.
View Article and Find Full Text PDFThis paper considers the use of a post metadata-based approach to identifying intentionally deceptive online content. It presents the use of an inherently explainable artificial intelligence technique, which utilizes machine learning to train an expert system, for this purpose. It considers the role of three factors (textual context, speaker background, and emotion) in fake news detection analysis and evaluates the efficacy of using key factors, but not the inherently subjective processing of post text itself, to identify deceptive online content.
View Article and Find Full Text PDFA method is proposed for generating application domain agnostic data for training and evaluating machine learning systems. The proposed method randomly generates an expert system network based upon user specified parameters. This expert system serves as a generic model of an unspecified phenomena.
View Article and Find Full Text PDFCybersecurity is within the realm of emergency management, as cyber-attacks can generate both virtual and real world issues that emergency responders may be called upon to deal with. However, it has a skillset and other characteristics that are distinct from the types of emergency management that most practitioners commonly-and are prepared-to deal with. This paper compares the two disciplines, discusses areas where cybersecurity professionals and researchers can learn from the emergency management discipline and proposes new research directions within the emergency management domain.
View Article and Find Full Text PDFFacial and other human recognition techniques are being used for a growing number of applications, ranging from device security to surveillance video identification to forensics. Data sets are required to test recognitions algorithms. This data set facilitates the evaluation of the impact of multiple factors on algorithm performance.
View Article and Find Full Text PDFThis data set is comprised of correlated audio and lip movement data in multiple videos of multiple subjects reading the same text. It was collected to facilitate the development and validation of algorithms used to train and test a compound biometric system that consists of lip-motion and voice recognition. The data set is a collection of videos of volunteers reciting a fixed script that is intended to be used to train software to recognize voice and lip-motion patterns.
View Article and Find Full Text PDF