Search results
1 – 10 of over 1000In the International Classification of Functioning, Disability and Health (ICF) 2001, the World Health Organization (WHO) defines disability as: ‘an umbrella term for impairments…
Abstract
In the International Classification of Functioning, Disability and Health (ICF) 2001, the World Health Organization (WHO) defines disability as: ‘an umbrella term for impairments, activity limitations and participation restrictions. It denotes the negative aspects of the interaction between an individual (with a health condition) and that individual's contextual factors (environmental and personal factors)’, with environmental factors including assistance from other people, from equipment and from formal sources. WHO previously defined disability, in the context of health experience, as “any restriction or lack (resulting from impairment) of ability to perform an action in the manner or within the range considered normal for a human being” (World Health Organization, 1980, p. 28).
Lawrence Rosen, Leonard D. Savitz and Michael Lalli
A report of research on a large, city‐wide US sample of black and white youths using official police records of juvenile delinquency status to predict adult criminality as…
Abstract
A report of research on a large, city‐wide US sample of black and white youths using official police records of juvenile delinquency status to predict adult criminality as revealed by FBI records of an adult arrest. Eight predictive criteria and six operationalised definitions of delinquency were related to three types of adult arrest record. Certain predictive criteria were found to be “best” for certain adult outcomes while others were “best” for different outcomes.
Details
Keywords
John Maleyeff, Laura B. Newell and Frank C. Kaminsky
A practical model based on basic probability theory is developed to evaluate the operational and financial performance of mammography systems. The model is intended to be used by…
Abstract
A practical model based on basic probability theory is developed to evaluate the operational and financial performance of mammography systems. The model is intended to be used by decision makers to evaluate overall sensitivity, overall specificity, positive and negative predictive values, and expected cost. As an illustration, computer aided detection (CAD) systems that support a radiologist's diagnosis are compared with standard mammography to determine conditions that would support their use. The model's input parameters include the operational performance of mammography (with and without CAD), the age of the patient, the cost of administering the mammogram and the expected costs associated with false positive and false negative outcomes. Sensitivity analyses are presented that show the CAD system projecting financial benefit over ranges of uncertainty associated with each model parameter.
Details
Keywords
Kent McFadzien and Lawrence W. Sherman
The purpose of this paper is to demonstrate a “maintenance pathway” for ensuring a low false negative rate in closing investigations unlikely to lead to a clearance (detection).
Abstract
Purpose
The purpose of this paper is to demonstrate a “maintenance pathway” for ensuring a low false negative rate in closing investigations unlikely to lead to a clearance (detection).
Design/methodology/approach
A randomised controlled experiment testing solvability factors for non-domestic cases of minor violence.
Findings
A random selection of 788 cases, of which 428 would have been screened out, were sent forward for full investigation. The number of cases actually detected was 22. A total of 19 of these were from the 360 recommended for allocation. This represents an improvement of accuracy over the original tests of the model three years earlier.
Research limitations/implications
This study shows how the safety of an investigative triage tool can be checked on a continuous basis for accuracy in predicting the cases unlikely to be solved if referred for full investigations.
Practical implications
This safety check pathway means that many more cases can be closed after preliminary investigations, thus saving substantial time for working on cases more likely to yield a detection if sufficient time is put into the cases.
Social implications
More offenders may be caught and brought to justice by using triage with a safety backstop for accurate forecasting.
Originality/value
This is the first published study of a maintenance pathway based on a random selection of cases that would otherwise not have been investigated. If widely applied, it could yield far greater time for police to pursue high-harm, serious violence.
Details
Keywords
Zhang Xiaosong, Chen Ting, Chen Dapeng and Liu Zhi
The purpose of this paper is to propose a self‐immune automated signature generation (SISG) for polymorphic worms which is able to work well, even while being attacked by any…
Abstract
Purpose
The purpose of this paper is to propose a self‐immune automated signature generation (SISG) for polymorphic worms which is able to work well, even while being attacked by any types of malicious adversary and produces global‐suited signatures other than local‐suited signatures for its distributed architecture. Through experimentations, the method is thereafter evaluated.
Design/methodology/approach
The ideal worm signature exist in each copy of the corresponding worm, but never in other worm categories and normal network traffic. SISG compares each worm copy and extract the same components, then produces the worm signature from the components which must achieve low‐false positive and low‐false negative. SISG is immune from the most attacks by filtering the harmful noise made by malicious adversaries before signature generation.
Findings
NOP sled, worm body and descriptor are not good to be signature because they can be confused intricately by polymorphic engines. Protocol frames may not suit to be signature for the anti‐automated signature generation attacks. Exploit bytes is the essential part of an ideal worm signature and it can be extracted by SISG exactly.
Originality/value
The paper proposes a SISG for polymorphic worms which is able to work well even while being attacked by any types of malicious adversary and produces global‐suited signatures other than local‐suited signatures for its distributed architecture.
Details
Keywords
This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify…
Abstract
This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify fraud events as the outliers of the reconstruction error of a trained autoencoder (AE). The trained AE shows fitness and robustness on the normal transactions and heterogeneous behavior on fraud activities. The cost of false-positive normal transactions is controlled, and the loss of false-negative frauds can be evaluated by the thresholds from the percentiles of reconstruction error of trained AE on normal transactions. To align the risk assessment of the economic and financial situation, the risk manager can adjust the threshold to meet the risk control requirements. Using the 95th percentile as the threshold, the rate of wrongly detecting normal transactions is controlled at 5% and the true positive rate is 86%. For the 99th percentile threshold, the well-controlled false positive rate is around 1% and 83% for the truly detecting fraud activities. The performance of a false positive rate and the true positive rate is competitive with other supervised learning algorithms.
Details
Keywords
Mariana Vieira dos Santos Kraemer, Priscila Pereira Machado, Nathalie Kliemann, David Alejandro González Chica and Rossana Pacheco da Costa Proença
The purpose of this paper is to relate average serving size intake by the Brazilian population and declared serving size, the presence of trans fat and household measure…
Abstract
Purpose
The purpose of this paper is to relate average serving size intake by the Brazilian population and declared serving size, the presence of trans fat and household measure fractioning declared on labels of processed, and ultra-processed food products.
Design/methodology/approach
Cross-sectional study that analyzed the food labelling of all processed and ultra-processed food products sold in a supermarket in southern Brazil.
Findings
A total of 1,071 processed and ultra-processed food products were analyzed. In 88 per cent of food groups, the average serving size consumed was larger than what was declared on labels. Consumed serving size was up to 9.2 times larger than the declared ones in food products with trans fat among their ingredients list and in false negatives and up to 9.9 times larger in foods with fractioned household measure (p<0.001). The Brazilian population consumes, on average, larger serving sizes than those declared on labels, which may represent a significant intake of trans fats without the consumers’ noticing.
Originality/value
This study has been performed with the use of a national database on food consumption, as well as the information from a large number of processed and ultra-processed food labels marketed in Brazil. This study is also proven to be important and novel, contributing with information as to the manner in which nutrition labelling has been presented to Brazilian consumers, discussing its possible consequences for food choices, intake, and the guarantee of consumer rights.
Details
Keywords
Paula Johnson, David J.W. Evans and Zulaikha Khan
The purpose of this paper is to evaluate whether an example of Seclusion Room Contactless Monitoring Technology (VitalGuardTM) is able to accurately detect the presence of life in…
Abstract
Purpose
The purpose of this paper is to evaluate whether an example of Seclusion Room Contactless Monitoring Technology (VitalGuardTM) is able to accurately detect the presence of life in a ward seclusion room ensuring patient wellbeing, without interference from background “living noise” (e.g. voices) or “electronic noise” (e.g. other systems).
Design/methodology/approach
The authors assessed the system’s ability to monitor movement caused by human respiration through its ability to discriminate false positives (i.e. presence of an inanimate object ± movement or noise, in the absence of a person in the seclusion room) and false negatives (i.e. failure to detect a human presence) in a ward setting.
Findings
The system displayed 100 per cent validity in terms of determining false positives (six conditions, each n=5) and the system did not alarm under either of the two false negative conditions tested (each n=5).
Research limitations/implications
These findings demonstrate that this example of technology is able to monitor movement caused by human respiration and can accurately and reliably detect the presence of life in seclusion rooms, in the ward setting, without interference from background noise (living and electronic). This was a small evaluation study and further research on its effectiveness in practice would be beneficial in both the intellectual disability forensic setting and other settings of segregation and isolation.
Originality/value
This study suggests that the use of technology in a seclusion room setting can be used as a reliable tool to enhance patient observations and assist in the delivery of care in a safe and unobtrusive manner.
Details
Keywords
Sea Matilda Bez and Henry Chesbrough
A successful business model creates a heuristic logic that connects technical potential with the realization of economic value. But this logic constrains the subsequent search for…
Abstract
A successful business model creates a heuristic logic that connects technical potential with the realization of economic value. But this logic constrains the subsequent search for new, alternative models for other technologies later on. This logic gives rise to two behaviors that affect the implementation of Open Innovation inside organizations. The well-known Not-Invented-Here syndrome constrains the use of Outside-in Open Innovation, while a new syndrome we identify, the Fear of Looking Foolish, constrains the use of Inside-out Open Innovation. We focus particularly on the latter behavioral constraint in this chapter and present three mini-cases that demonstrate the constraints in action. We then sketch possible managerial solutions to overcome these behaviors.
Details
Keywords
Pengyue Guo, Tianyun Shi, Zhen Ma and Jing Wang
The paper aims to solve the problem of personnel intrusion identification within the limits of high-speed railways. It adopts the fusion method of millimeter wave radar and camera…
Abstract
Purpose
The paper aims to solve the problem of personnel intrusion identification within the limits of high-speed railways. It adopts the fusion method of millimeter wave radar and camera to improve the accuracy of object recognition in dark and harsh weather conditions.
Design/methodology/approach
This paper adopts the fusion strategy of radar and camera linkage to achieve focus amplification of long-distance targets and solves the problem of low illumination by laser light filling of the focus point. In order to improve the recognition effect, this paper adopts the YOLOv8 algorithm for multi-scale target recognition. In addition, for the image distortion caused by bad weather, this paper proposes a linkage and tracking fusion strategy to output the correct alarm results.
Findings
Simulated intrusion tests show that the proposed method can effectively detect human intrusion within 0–200 m during the day and night in sunny weather and can achieve more than 80% recognition accuracy for extreme severe weather conditions.
Originality/value
(1) The authors propose a personnel intrusion monitoring scheme based on the fusion of millimeter wave radar and camera, achieving all-weather intrusion monitoring; (2) The authors propose a new multi-level fusion algorithm based on linkage and tracking to achieve intrusion target monitoring under adverse weather conditions; (3) The authors have conducted a large number of innovative simulation experiments to verify the effectiveness of the method proposed in this article.
Details