2018
Authors
Bueno, MLP; Hommersom, A; Lucas, PJF; Lobo, M; Rodrigues, PP;
Publication
SCALABLE UNCERTAINTY MANAGEMENT (SUM 2018)
Abstract
The current availability of large volumes of health care data makes it a promising data source to new views on disease interaction. Most of the times, patients have multiple diseases instead of a single one (also known as multimorbidity), but the small size of most clinical research data makes it hard to impossible to investigate this issue. In this paper, we propose a latent-based approach to expand patient evolution in temporal electronic health records, which can be uninformative due to its very general events. We introduce the notion of clusters of hidden states allowing for an expanded understanding of the multiple dynamics that underlie events in such data. Clusters are defined as part of hidden Markov models learned from such data, where the number of hidden states is not known beforehand. We evaluate the proposed approach based on a large dataset from Dutch practices of patients that had events on comorbidities related to atherosclerosis. The discovered clusters are further correlated to medical-oriented outcomes in order to show the usefulness of the proposed method.
2018
Authors
Garbajosa, J; Wang, X; Aguiar, A;
Publication
XP
Abstract
2018
Authors
Cunha, CR; Gomes, JP; Morais, EP;
Publication
INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE THROUGH VISION 2020, 2018, VOLS I -XI
Abstract
The security of systems and networks is a multidisciplinary challenge of increasingly importance which has stimulated the development of multiple solutions for an effective response to the requirements that are needed. In pursuing this demand much of the focus of security proposals has focused on ensuring mechanisms that prevent organizations from being attacked from outside their perimeter. However, the evolution of the tasks carried out by the internal organizations collaborators, which demand an increasing degree of use of computational resources and privileged access to multiple sources of information, emerge an increasing concern in the monitoring of the behaviours of the users. In addition to this problem, there is often an ill-defined borderline confusion over what internal workers should be able to do with the resources they have in organizations. The mix between strictly professional use and personal use can be problematic in organization's security context. Define organizations security policies, understand user' behaviours, act effectively over security incidents and promote users' organizational security culture, by a pedagogical approach seems to us to be a necessary advance in security frameworks nowadays. This paper presents a reflection on the aspects of internal security of Local Area Networks and proposes a conceptual security framework, which aims to contribute to an effective control and understanding of LANs user' behaviour, to a real-time response to unwanted occurrences but, especially, to a pedagogical approach to help the development of users' security culture.
2018
Authors
Silva, Inês Peixoto; Pereira, Beatriz; Teixeira, Aurora;
Publication
Abstract
O movimento é primordial para o desenvolvimento multilateral da criança e através dos jogos e brincadeiras contribui para a melhora das relações interpessoais. Já sua ausência pode limitar o desenvolvimento motor e influenciar em características da personalidade, cognição e emoções. O jogo constitui-se como a essência e razão da infância que através do seu universo imaginário pode melhorar sua percepção corporal, linguagem, autoeficácia, autoestima e autoconfiança. A autoconfiança é uma característica essencial da vida, já que se trata da capacidade de se ver bem-sucedido. Assim, o indivíduo confiante tem uma atitude positiva, desafia-se e assume riscos. O objetivo do estudo foi identificar a presença de capacidades empreendedoras, nomeadamente a autoconfiança em crianças do 1 ciclo do ensino Básico. Participaram no estudo 18 alunos (9 sexo feminino e 9 do sexo masculino) e 19 alunos (9 do sexo feminino e 10 do sexo masculino) do 3 ano de escolaridade de uma escola da área urbana de Braga, com idades entre 6 e 9 anos. Foi utilizado como instrumento um jogo construído e organizado, dividido em equipas que deveriam escolher entre 3 percursos constituídos por barreiras colocadas em diferentes alturas. Ao concluir o percurso foi atribuído pontuações de acordo com a dificuldade, sendo para o mais fácil 1 e 2 pontos, médio 2 e 3 pontos e mais difícil 3 e 4 pontos. Ao término do jogo a pontuação foi contada em voz alta pelo mediador para definir a equipe vencedora. Foram utilizadas análises descritivas para os comportamentos observados e atribuída as seguintes classificações: i) sim, verifica-se o comportamento; ii) Não, verifica-se comportamento oposto e iii) Não observado, não se verifica o comportamento. Os resultados em relação a subcategoria: I - Não se intimida mesmo havendo a possibilidade de ser confrontado com opiniões diferentes, foi constatado que a maioria das crianças apresentavam comportamentos, sejam eles positivos ou negativos. As meninas parecem ficar menos incomodadas com a possibilidade de serem confrontadas pelos colegas, relativamente a idade tanto as crianças de 6/7 quanto as de 8/9 apresentaram comportamentos positivos, sendo no mais novos onde mais comportamentos não observados ocorreram. Para a subcategoria II- Tem uma atitude positiva e confiante, foram observados resultados similares, sendo que a maioria das crianças apresentaram comportamento positivo, para ambos os géneros e referente a idade um pequeno destaque para os alunos mais velhos. Desta forma, a autoconfiança foi observada em contexto do jogo pois os comportamento foram maioritariamente positivos. para além de essencial na componente social e emocional, a autoconfiança é também uma características essenciais do perfil empreendedor.
2018
Authors
Buhrman, H; Koucký, M; Loff, B; Speelman, F;
Publication
Theory Comput. Syst.
Abstract
Catalytic computation, defined by Buhrman, Cleve, Koucký, Loff and Speelman (STOC 2014), is a space-bounded computation where in addition to our working memory we have an exponentially larger auxiliary memory which is full; the auxiliary memory may be used throughout the computation, but it must be restored to its initial content by the end of the computation. Motivated by the surprising power of this model, we set out to study the non-deterministic version of catalytic computation. We establish that non-deterministic catalytic log-space is contained in ZPP, which is the same bound known for its deterministic counterpart, and we prove that non-deterministic catalytic space is closed under complement (under a standard derandomization assumption). Furthermore, we establish hierarchy theorems for non-deterministic and deterministic catalytic computation. © Harry Buhrman, Michal Koucký, Bruno Loff, and Florian Speelman; licensed under Creative Commons License CC-BY.
2018
Authors
Choupina, HMP; Rocha, AP; Fernandes, JM; Vollmar, C; Noachtar, S; Cunha, JPS;
Publication
Studies in Health Technology and Informatics
Abstract
Epilepsy diagnosis is typically performed through 2Dvideo-EEG monitoring, relying on the viewer's subjective interpretation of the patient's movements of interest. Several attempts at quantifying seizure movements have been performed in the past using 2D marker-based approaches, which have several drawbacks for the clinical routine (e.g. occlusions, lack of precision, and discomfort for the patient). These drawbacks are overcome with a 3D markerless approach. Recently, we published the development of a single-bed 3Dvideo-EEG system using a single RGB-D camera (Kinect v1). In this contribution, we describe how we expanded the previous single-bed system to a multi-bed departmental one that has been managing 6.61 Terabytes per day since March 2016. Our unique dataset collected so far includes 2.13 Terabytes of multimedia data, corresponding to 278 3Dvideo-EEG seizures from 111 patients. To the best of the authors' knowledge, this system is unique and has the potential of being spread to multiple EMUs around the world for the benefit of a greater number of patients. © 2018 European Federation for Medical Informatics (EFMI) and IOS Press.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.