941 resultados para Biodosimetry errors
Resumo:
We have previously reported a preliminary taxonomy of patient error. However, approaches to managing patients' contribution to error have received little attention in the literature. This paper aims to assess how patients and primary care professionals perceive the relative importance of different patient errors as a threat to patient safety. It also attempts to suggest what these groups believe may be done to reduce the errors, and how. It addresses these aims through original research that extends the nominal group analysis used to generate the error taxonomy. Interviews were conducted with 11 purposively selected groups of patients and primary care professionals in Auckland, New Zealand, during late 2007. The total number of participants was 83, including 64 patients. Each group ranked the importance of possible patient errors identified through the nominal group exercise. Approaches to managing the most important errors were then discussed. There was considerable variation among the groups in the importance rankings of the errors. Our general inductive analysis of participants' suggestions revealed the content of four inter-related actions to manage patient error: Grow relationships; Enable patients and professionals to recognise and manage patient error; be Responsive to their shared capacity for change; and Motivate them to act together for patient safety. Cultivation of this GERM of safe care was suggested to benefit from 'individualised community care'. In this approach, primary care professionals individualise, in community spaces, population health messages about patient safety events. This approach may help to reduce patient error and the tension between personal and population health-care.
Resumo:
Reliability of the performance of biometric identity verification systems remains a significant challenge. Individual biometric samples of the same person (identity class) are not identical at each presentation and performance degradation arises from intra-class variability and inter-class similarity. These limitations lead to false accepts and false rejects that are dependent. It is therefore difficult to reduce the rate of one type of error without increasing the other. The focus of this dissertation is to investigate a method based on classifier fusion techniques to better control the trade-off between the verification errors using text-dependent speaker verification as the test platform. A sequential classifier fusion architecture that integrates multi-instance and multisample fusion schemes is proposed. This fusion method enables a controlled trade-off between false alarms and false rejects. For statistically independent classifier decisions, analytical expressions for each type of verification error are derived using base classifier performances. As this assumption may not be always valid, these expressions are modified to incorporate the correlation between statistically dependent decisions from clients and impostors. The architecture is empirically evaluated by applying the proposed architecture for text dependent speaker verification using the Hidden Markov Model based digit dependent speaker models in each stage with multiple attempts for each digit utterance. The trade-off between the verification errors is controlled using the parameters, number of decision stages (instances) and the number of attempts at each decision stage (samples), fine-tuned on evaluation/tune set. The statistical validation of the derived expressions for error estimates is evaluated on test data. The performance of the sequential method is further demonstrated to depend on the order of the combination of digits (instances) and the nature of repetitive attempts (samples). The false rejection and false acceptance rates for proposed fusion are estimated using the base classifier performances, the variance in correlation between classifier decisions and the sequence of classifiers with favourable dependence selected using the 'Sequential Error Ratio' criteria. The error rates are better estimated by incorporating user-dependent (such as speaker-dependent thresholds and speaker-specific digit combinations) and class-dependent (such as clientimpostor dependent favourable combinations and class-error based threshold estimation) information. The proposed architecture is desirable in most of the speaker verification applications such as remote authentication, telephone and internet shopping applications. The tuning of parameters - the number of instances and samples - serve both the security and user convenience requirements of speaker-specific verification. The architecture investigated here is applicable to verification using other biometric modalities such as handwriting, fingerprints and key strokes.
Resumo:
Every year a number of pedestrians are struck by trains resulting in death and serious injury. While much research has been conducted on train-vehicle collisions, very little is currently known about the aetiology of train-pedestrian collisions. To date, scant research has been undertaken to investigate the demographics of rule breakers, the frequency of deliberate violation versus error making and the influence of the classic deterrence approach on subsequent behaviours. Aim This study aimed to to identify pedestrians’ self-reported reasons for engaging in violations at crossing, the frequency and nature of rule breaking and whether the threat of sanctions influence such events. Method A questionnaire was administered to 511 participants of all ages. Results Analysis revealed that pedestrians (particularly younger groups) were more likely to commit deliberate violations rather than make crossing errors e.g., mistakes. The most frequent reasons given for deliberate violations were participants were running late and did not want to miss their train or participants believed that the gate was taking too long to open so may be malfunctioning. In regards to classical deterrence, an examination of the perceived threat of being apprehended and fined for a crossing violation revealed participants reported the highest mean scores for swiftness of punishment, which suggests they were generally aware that they would receive an “on the spot” fine. However, the overall mean scores for certainty and severity of sanctions (for violating the rules) indicate that the participants did not perceive the certainty and severity of sanctions as very high. This paper will further discuss the research findings in regards to the development of interventions designed to improve pedestrian crossing safety.
Resumo:
Purpose To design and manufacture lenses to correct peripheral refraction along the horizontal meridian and to determine whether these resulted in noticeable improvements in visual performance. Method Subjective refraction of a low myope was determined on the basis of best peripheral detection acuity along the horizontal visual field out to ±30° for both horizontal and vertical gratings. Subjective refraction was compared to objective refractions using a COAS-HD aberrometer. Special lenses were made to correct peripheral refraction, based on designs optimized with and without smoothing across a 3 mm diameter square aperture. Grating detection was retested with these lenses. Contrast thresholds of 1.25’ spots were determined across the field for the conditions of best correction, on-axis correction, and the special lenses. Results The participant had high relative peripheral hyperopia, particularly in the temporal visual field (maximum 2.9 D). There were differences > 0.5D between subjective and objective refractions at a few field angles. On-axis correction reduced peripheral detection acuity and increased peripheral contrast threshold in the peripheral visual field, relative to the best correction, by up to 0.4 and 0.5 log units, respectively. The special lenses restored most of the peripheral vision, although not all at angles to ±10°, and with the lens optimized with aperture-smoothing possibly giving better vision than the lens optimized without aperture-smoothing at some angles. Conclusion It is possible to design and manufacture lenses to give near optimum peripheral visual performance to at least ±30° along one visual field meridian. The benefit of such lenses is likely to be manifest only if a subject has a considerable relative peripheral refraction, for example of the order of 2 D.
Resumo:
Texture information in the iris image is not uniform in discriminatory information content for biometric identity verification. The bits in an iris code obtained from the image differ in their consistency from one sample to another for the same identity. In this work, errors in bit strings are systematically analysed in order to investigate the effect of light-induced and drug-induced pupil dilation and constriction on the consistency of iris texture information. The statistics of bit errors are computed for client and impostor distributions as functions of radius and angle. Under normal conditions, a V-shaped radial trend of decreasing bit errors towards the central region of the iris is obtained for client matching, and it is observed that the distribution of errors as a function of angle is uniform. When iris images are affected by pupil dilation or constriction the radial distribution of bit errors is altered. A decreasing trend from the pupil outwards is observed for constriction, whereas a more uniform trend is observed for dilation. The main increase in bit errors occurs closer to the pupil in both cases.
Resumo:
The term “Human error” can simply be defined as an error which made by a human. In fact, Human error is an explanation of malfunctions, unintended consequents from operating a system. There are many factors that cause a person to have an error due to the unwanted error of human. The aim of this paper is to investigate the relationship of human error as one of the factors to computer related abuses. The paper beings by computer-relating to human errors and followed by mechanism mitigate these errors through social and technical perspectives. We present the 25 techniques of computer crime prevention, as a heuristic device that assists. A last section discussing the ways of improving the adoption of security, and conclusion.
Resumo:
A Monte Carlo model of an Elekta iViewGT amorphous silicon electronic portal imaging device (a-Si EPID) has been validated for pre-treatment verification of clinical IMRT treatment plans. The simulations involved the use of the BEAMnrc and DOSXYZnrc Monte Carlo codes to predict the response of the iViewGT a-Si EPID model. The predicted EPID images were compared to the measured images obtained from the experiment. The measured EPID images were obtained by delivering a photon beam from an Elekta Synergy linac to the Elekta iViewGT a-Si EPID. The a-Si EPID was used with no additional build-up material. Frame averaged EPID images were acquired and processed using in-house software. The agreement between the predicted and measured images was analyzed using the gamma analysis technique with acceptance criteria of 3% / 3 mm. The results show that the predicted EPID images for four clinical IMRT treatment plans have a good agreement with the measured EPID signal. Three prostate IMRT plans were found to have an average gamma pass rate of more than 95.0 % and a spinal IMRT plan has the average gamma pass rate of 94.3 %. During the period of performing this work a routine MLC calibration was performed and one of the IMRT treatments re-measured with the EPID. A change in the gamma pass rate for one field was observed. This was the motivation for a series of experiments to investigate the sensitivity of the method by introducing delivery errors, MLC position and dosimetric overshoot, into the simulated EPID images. The method was found to be sensitive to 1 mm leaf position errors and 10% overshoot errors.
Resumo:
Bounds on the expectation and variance of errors at the output of a multilayer feedforward neural network with perturbed weights and inputs are derived. It is assumed that errors in weights and inputs to the network are statistically independent and small. The bounds obtained are applicable to both digital and analogue network implementations and are shown to be of practical value.
Resumo:
It is important that we understand the factors and conditions that shape driver behaviour – those conditions within the road transport system that contribute to driver error and the situations where driver non-compliance to road regulations is likely. This report presents the findings derived from a program of research investigating the nature of errors made by drivers, involving a literature review and an on-road study. The review indicates that, despite significant investigation, the role of different error types in road traffic crashes remains unclear, as does the role of the wider road transport system failures in driver error causation.
Resumo:
PURPOSE To determine the prevalence of refractive errors in Shiraz schoolchildren by age and gender. METHODS For this cross-sectional study, random cluster sampling was carried out from students of the 2008-2009 academic year. After the initial interview, ophthalmic examinations including tests of visual acuity, non-cycloplegic and cycloplegic refraction and binocular vision were performed. Myopia was defined as a spherical equivalent < or =-0.50 dioptre (D), hyperopia as > or =+2.0 D, and astigmatism as a cylinder refraction > or =0.75 D. All values for school grade and gender were directly standardized based on the total student population in the 2008-2009 school year. RESULTS A total of 2130 students were sampled, of which 1872 participated in the study (response rate = 87.88%). The prevalence of uncorrected, best-corrected, presenting and spectacle corrected visual acuity of 6/12 or worse in the better eye was 6.46%, 0%, 1.49% and 0.9%, respectively. The prevalence rates of myopia, hyperopia and astigmatism were 4.35% (95% confidence interval [CI]: 2.89-5.82%), 5.04% (95% CI: 3.50-6.58%), and 11.27% (95% CI: 9.81-12.74%), respectively. Anisometropia was detected in 2.58% of schoolchildren. The prevalence of hyperopia significantly decreased with age (P = 0.021). CONCLUSIONS Compared with other reported rates, the prevalence of myopia in the schoolchildren of Shiraz is similar to that in most places excluding East Asian countries, and that of hyperopia is in the mid range.
Resumo:
Purpose: To determine the prevalence and risk factors of refractive errors among schoolchildren in Shiraz, Iran. Methods: In a cross-sectional study, using random cluster sampling, 3065 Shiraz schoolchildren were selected in this study. The participants totaled 2683; 1872 elementary and middle school and 811 high school students. For the primary and middle schoolchildren, cycloplegic refraction and for the high school students, non-cycloplegic autorefraction was measured. Myopia, defined as spherical equivalent (SE) refraction -0.50 diopter (D) or worse, hyperopia as SE +2.00D and +0.50D or more for cycloplegic and noncycloplegic refractions respectively, and astigmatism as cylinder -0.75D or worse. Results: The prevalence of refractive errors in elementary and middle school students was: myopia 4.35 % (95% confidence interval (CI), 2.89 -5.81), hyperopia 5.04 % (95%CI, 3.49 -6.58) and astigmatism 11.79 % (95%CI, 10.21 -13.38). For high school students, these rates were 22.4 % (95%CI, 18.44 -26.36), 10.52 % (95%CI, 6.75 -14.29) and 20.99% (95%CI, 16.55 -25.44), respectively.The prevalence of myopia increased with age in primary and middle school students (OR=1.15, 95% CI, 0.98 to1.33, p=0.073). Conclusions: The result of this study indicated a relatively low prevalence of refractive errors among schoolchildren in Shiraz according to the protocol by "Refractive Error Study in Children" (RESC) in other investigations.
Resumo:
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
Resumo:
Precise satellite orbit and clocks are essential for providing high accuracy real-time PPP (Precise Point Positioning) service. However, by treating the predicted orbits as fixed, the orbital errors may be partially assimilated by the estimated satellite clock and hence impact the positioning solutions. This paper presents the impact analysis of errors in radial and tangential orbital components on the estimation of satellite clocks and PPP through theoretical study and experimental evaluation. The relationship between the compensation of the orbital errors by the satellite clocks and the satellite-station geometry is discussed in details. Based on the satellite clocks estimated with regional station networks of different sizes (∼100, ∼300, ∼500 and ∼700 km in radius), results indicated that the orbital errors compensated by the satellite clock estimates reduce as the size of the network increases. An interesting regional PPP mode based on the broadcast ephemeris and the corresponding estimated satellite clocks is proposed and evaluated through the numerical study. The impact of orbital errors in the broadcast ephemeris has shown to be negligible for PPP users in a regional network of a radius of ∼300 km, with positioning RMS of about 1.4, 1.4 and 3.7 cm for east, north and up component in the post-mission kinematic mode, comparable with 1.3, 1.3 and 3.6 cm using the precise orbits and the corresponding estimated clocks. Compared with the DGPS and RTK positioning, only the estimated satellite clocks are needed to be disseminated to PPP users for this approach. It can significantly alleviate the communication burdens and therefore can be beneficial to the real time applications.
Resumo:
Background Previously studies showed that inverse dynamics based on motion analysis and force-plate is inaccurate compared to direct measurements for individuals with transfemoral amputation (TFA). Indeed, direct measurements can appropriately take into account the absorption at the prosthetic foot and the resistance at the prosthetic knee. [1-3] However, these studies involved only a passive prosthetic knee. Aim The objective of the present study was to investigate if different types of prosthetic feet and knees can exhibit different levels of error in the knee joint forces and moments. Method Three trials of walking at self-selected speed were analysed for 9 TFAs (7 males and 2 females, 47±9 years old, 1.76±0.1 m 79±17 kg) with a motion analysis system (Qualisys, Goteborg, Sweden), force plates (Kitsler, Winterthur, Switzerland) and a multi-axial transducer (JR3, Woodland, USA) mounted above the prosthetic knee [1-17]. TFAs were all fitted with an osseointegrated implant system. The prostheses included different type of foot (N=5) and knee (N=3) components. The root mean square errors (RMSE) between direct measurements and the knee joint forces and moments estimated by inverse dynamics were computed for stance and swing phases of gait and expressed as a percentage of the measured amplitudes. A one-way Kruskal-Wallis ANOVA was performed (Statgraphics, Levallois-Perret, France) to analyse the effects of the prosthetic components on the RMSEs. Cross-effects and post-hoc tests were not analysed in this study. Results A significant effect (*) was found for the type of prosthetic foot on anterior-posterior force during swing (p=0.016), lateral-medial force during stance (p=0.009), adduction-abduction moment during stance (p=0.038), internal-external rotation moment during stance (p=0.014) and during swing (p=0.006), and flexion-extension moment during stance (p = 0.035). A significant effect (#) was found for the type of prosthetic knee on anterior-posterior force during swing (p=0.018) and adduction-abduction moment during stance (p=0.035). Discussion & Conclusion The RMSEs were larger during swing than during stance. It is because the errors on accelerations (as derived from motion analysis) become substantial with respect to the external loads. Thus, inverse dynamics during swing should be analysed with caution because the mean RMSEs are close to 50%. Conversely, there were fewer effects of the prosthetic components on RMSE during swing than during stance and, accordingly, fewer effects due to knees than feet. Thus, inverse dynamics during stance should be used with caution for comparison of different prosthetic components.
Resumo:
A 'pseudo-Bayesian' interpretation of standard errors yields a natural induced smoothing of statistical estimating functions. When applied to rank estimation, the lack of smoothness which prevents standard error estimation is remedied. Efficiency and robustness are preserved, while the smoothed estimation has excellent computational properties. In particular, convergence of the iterative equation for standard error is fast, and standard error calculation becomes asymptotically a one-step procedure. This property also extends to covariance matrix calculation for rank estimates in multi-parameter problems. Examples, and some simple explanations, are given.