This document discusses a study using an assistive technology called GUIDE to help a man with acquired brain injury complete morning tasks independently. In a single-subject experimental design, the man's performance improved with GUIDE prompts in both inpatient and home settings, requiring fewer caregiver prompts. GUIDE emulates caregiver support through conversation and could help facilitate discharge for rehabilitation patients needing assistance with daily living activity sequences.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
IA 7: IA? IxD? UX! is an uncooked
collection of definitions, categorizations, outlines, and visualizations concerning
⁄ Information architecture IA,
⁄ Interaction design IxD, and
⁄ User experience UX design.
This deck is an updated version of IA 3: IA Concepts. It’s main purpose is to sear the partially dry substances into my own memory.
Download is disabled due to the copyrighted material within the presentation.
Credits: Alan Dix, Ben Shneiderman, Christina Wodtke, Dan Brown, Don Norman, Erin Malone, George Olsen, Jan Borchers, Jesse James Garrett, Jess McMullin, Olga Howard, Peter Morville, Theo Mandel, Todd Warfel
Image credits: flickr.com/library_of_virginia, /liewcf, /nypl
Usable security it isn't secure if people can't use it mwux 2 jun2012Darren Kall
This is one of a pair of talks. This one encourages the UX community to get involved in security products and security aspects. It outlines how UX skills can help make security more secure by making it more usable. It challenges the UX community to adopt "security thinking" because it stretches the traditional boundaries of UX focus. Security products and security issues do not get enough attention from user experience. Yet user experience is at the root cause of many, if not most, security issues. The weakest link in security is not technology but the gap between technology and people. The developer, IT implementer, administrator, and end-user each create vulnerabilities if the system wasn’t designed to be usable for each of them. Technology, policies, management and metrics all improve with a user-centric approach that merges development, security implementation and monitoring with usability. It isn't secure if people can't use it. ™
Towards a Smart Control Room for Crisis Response Using Visual Perception of U...Joris IJsselmuiden
Due to ever increasing challenges and complexity, there is a high demand for new human-machine interaction approaches in crisis response scenarios. We aim at building a smart crisis response control room, in which vision-based perception of users will be used to facilitate innovative user interfaces and to support teamwork. Our control room is equipped with several cameras and has a videowall as the main interaction device. Using real-time computer vision, we can track and identify the users in the room, and estimate their head orientations and pointing gestures. In the near future, the room will also be equiped with speech recognition. In order to build a useful smart control room for crisis response, we are currently focusing on situation modeling for such rooms and we are investigating the target crisis response scenarios.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
IA 7: IA? IxD? UX! is an uncooked
collection of definitions, categorizations, outlines, and visualizations concerning
⁄ Information architecture IA,
⁄ Interaction design IxD, and
⁄ User experience UX design.
This deck is an updated version of IA 3: IA Concepts. It’s main purpose is to sear the partially dry substances into my own memory.
Download is disabled due to the copyrighted material within the presentation.
Credits: Alan Dix, Ben Shneiderman, Christina Wodtke, Dan Brown, Don Norman, Erin Malone, George Olsen, Jan Borchers, Jesse James Garrett, Jess McMullin, Olga Howard, Peter Morville, Theo Mandel, Todd Warfel
Image credits: flickr.com/library_of_virginia, /liewcf, /nypl
Usable security it isn't secure if people can't use it mwux 2 jun2012Darren Kall
This is one of a pair of talks. This one encourages the UX community to get involved in security products and security aspects. It outlines how UX skills can help make security more secure by making it more usable. It challenges the UX community to adopt "security thinking" because it stretches the traditional boundaries of UX focus. Security products and security issues do not get enough attention from user experience. Yet user experience is at the root cause of many, if not most, security issues. The weakest link in security is not technology but the gap between technology and people. The developer, IT implementer, administrator, and end-user each create vulnerabilities if the system wasn’t designed to be usable for each of them. Technology, policies, management and metrics all improve with a user-centric approach that merges development, security implementation and monitoring with usability. It isn't secure if people can't use it. ™
Towards a Smart Control Room for Crisis Response Using Visual Perception of U...Joris IJsselmuiden
Due to ever increasing challenges and complexity, there is a high demand for new human-machine interaction approaches in crisis response scenarios. We aim at building a smart crisis response control room, in which vision-based perception of users will be used to facilitate innovative user interfaces and to support teamwork. Our control room is equipped with several cameras and has a videowall as the main interaction device. Using real-time computer vision, we can track and identify the users in the room, and estimate their head orientations and pointing gestures. In the near future, the room will also be equiped with speech recognition. In order to build a useful smart control room for crisis response, we are currently focusing on situation modeling for such rooms and we are investigating the target crisis response scenarios.
The webinar organized by Endeavour - The Mobility Company provides insights on Role of User Experience, popularly known as UX in the Mobility Landscape.
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...Darren Kall
This is one of two talks. This one encourages the security community to adopt a user experience approach to the development and deployment of security products. The second encourages the user experience community to focus their skills on usable security issues. Security products and security issues do not get enough attention from user experience. Yet user experience is at the root cause of many, if not most, security issues. The weakest link in security is not technology but the gap between technology and people. The developer, IT implementer, administrator, and end-user each create vulnerabilities if the system wasn’t designed to be usable for each of them. Technology, policies, management and metrics all improve with a user-centric approach that merges development, security implementation and monitoring with usability.
3D context-aware mobile maps for tourism - ENTER2011 PhD WorkshopZornitza Yovcheva
This is the presentation I delivered at ENTER2011 presenting the work I started with at the John Kent Institute in Tourism, Bournemouth University. The proposal I submitted there won the first prize of the PhD Workshop. Even though my ideas have changed since then I really like this presentation as it explains what I was planning to focus on then - three dimensional maps and how we can make them more context aware and adaptive.
The webinar organized by Endeavour - The Mobility Company provides insights on Role of User Experience, popularly known as UX in the Mobility Landscape.
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...Darren Kall
This is one of two talks. This one encourages the security community to adopt a user experience approach to the development and deployment of security products. The second encourages the user experience community to focus their skills on usable security issues. Security products and security issues do not get enough attention from user experience. Yet user experience is at the root cause of many, if not most, security issues. The weakest link in security is not technology but the gap between technology and people. The developer, IT implementer, administrator, and end-user each create vulnerabilities if the system wasn’t designed to be usable for each of them. Technology, policies, management and metrics all improve with a user-centric approach that merges development, security implementation and monitoring with usability.
3D context-aware mobile maps for tourism - ENTER2011 PhD WorkshopZornitza Yovcheva
This is the presentation I delivered at ENTER2011 presenting the work I started with at the John Kent Institute in Tourism, Bournemouth University. The proposal I submitted there won the first prize of the PhD Workshop. Even though my ideas have changed since then I really like this presentation as it explains what I was planning to focus on then - three dimensional maps and how we can make them more context aware and adaptive.
Learning Solutions 2011 #LS2011 presentation on Learner Experience Design. Address what instructional design can learn from Ux (User Experience Design).
Using the HAAT model to select an appropriate ECU for your clientDani Werner
A short presentation on applying the HAAT model to ECU selection with a case study client with a C5 spinal cord injury. This was done as a final presentation as part of my BSc in Occupational Therapy.
Gesture recognition using artificial neural network,a technology for identify...NidhinRaj Saikripa
The presentation contains a technology for identifying any type of body motions commonly originating from hand and face using artificial neural network.This include identifying sign language also.This technology is for speech impaired individuals.
// I have shared an IJCSE standard paper in this topic
Creating intuitive and usable Voice User Interfaces (VUI) involves coordinating a large number of research-based best practices, with the unique needs of each project. This white paper explores various factors that influence VUI design.
Imagine yourself being a intelligent, motivated, and working person in the fiercely competitive
market of information technology, but just one problem You can't use your hands. Or you can't speak.
How do you do your job? How do you stay employed? You can, because of a very good gift from
computer Industry. The Eyegaze, a communication & control system you run with your eyes In humans,
gaze direction and ocular behaviour is probably one of the first distant means of communication
developed. Parents often try to understand what their baby looks at, and they deduce that the object
observed attracts his/her interest. This ability to interact with someone by a transitional object is named
joint attention
The Eyegaze System is a direct-select vision-controlled communication and control system. It was
developed in Fairfax, Virginia, by LC Technologies.
Wrist-Worn Interaction: Design Challenges and OpportunitiesVivian Motti
Poster presented at the Georgia Tech Symposium on Design and Wearable Technologies, on May 9th.
This work focuses on the importance of considering context information while designing the interfaces for wearable computers, especially regarding wrist-worn devices.
Integrating Ayurveda into Parkinson’s Management: A Holistic ApproachAyurveda ForAll
Explore the benefits of combining Ayurveda with conventional Parkinson's treatments. Learn how a holistic approach can manage symptoms, enhance well-being, and balance body energies. Discover the steps to safely integrate Ayurvedic practices into your Parkinson’s care plan, including expert guidance on diet, herbal remedies, and lifestyle modifications.
Here is the updated list of Top Best Ayurvedic medicine for Gas and Indigestion and those are Gas-O-Go Syp for Dyspepsia | Lavizyme Syrup for Acidity | Yumzyme Hepatoprotective Capsules etc
Antimicrobial stewardship to prevent antimicrobial resistanceGovindRankawat1
India is among the nations with the highest burden of bacterial infections.
India is one of the largest consumers of antibiotics worldwide.
India carries one of the largest burdens of drug‑resistant pathogens worldwide.
Highest burden of multidrug‑resistant tuberculosis,
Alarmingly high resistance among Gram‑negative and Gram‑positive bacteria even to newer antimicrobials such as carbapenems.
NDM‑1 ( New Delhi Metallo Beta lactamase 1, an enzyme which inactivates majority of Beta lactam antibiotics including carbapenems) was reported in 2008
These simplified slides by Dr. Sidra Arshad present an overview of the non-respiratory functions of the respiratory tract.
Learning objectives:
1. Enlist the non-respiratory functions of the respiratory tract
2. Briefly explain how these functions are carried out
3. Discuss the significance of dead space
4. Differentiate between minute ventilation and alveolar ventilation
5. Describe the cough and sneeze reflexes
Study Resources:
1. Chapter 39, Guyton and Hall Textbook of Medical Physiology, 14th edition
2. Chapter 34, Ganong’s Review of Medical Physiology, 26th edition
3. Chapter 17, Human Physiology by Lauralee Sherwood, 9th edition
4. Non-respiratory functions of the lungs https://academic.oup.com/bjaed/article/13/3/98/278874
micro teaching on communication m.sc nursing.pdfAnurag Sharma
Microteaching is a unique model of practice teaching. It is a viable instrument for the. desired change in the teaching behavior or the behavior potential which, in specified types of real. classroom situations, tends to facilitate the achievement of specified types of objectives.
Muktapishti is a traditional Ayurvedic preparation made from Shoditha Mukta (Purified Pearl), is believed to help regulate thyroid function and reduce symptoms of hyperthyroidism due to its cooling and balancing properties. Clinical evidence on its efficacy remains limited, necessitating further research to validate its therapeutic benefits.
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists Saeid Safari
Preoperative Management of Patients on GLP-1 Receptor Agonists like Ozempic and Semiglutide
ASA GUIDELINE
NYSORA Guideline
2 Case Reports of Gastric Ultrasound
Knee anatomy and clinical tests 2024.pdfvimalpl1234
This includes all relevant anatomy and clinical tests compiled from standard textbooks, Campbell,netter etc..It is comprehensive and best suited for orthopaedicians and orthopaedic residents.
These lecture slides, by Dr Sidra Arshad, offer a quick overview of the physiological basis of a normal electrocardiogram.
Learning objectives:
1. Define an electrocardiogram (ECG) and electrocardiography
2. Describe how dipoles generated by the heart produce the waveforms of the ECG
3. Describe the components of a normal electrocardiogram of a typical bipolar lead (limb II)
4. Differentiate between intervals and segments
5. Enlist some common indications for obtaining an ECG
6. Describe the flow of current around the heart during the cardiac cycle
7. Discuss the placement and polarity of the leads of electrocardiograph
8. Describe the normal electrocardiograms recorded from the limb leads and explain the physiological basis of the different records that are obtained
9. Define mean electrical vector (axis) of the heart and give the normal range
10. Define the mean QRS vector
11. Describe the axes of leads (hexagonal reference system)
12. Comprehend the vectorial analysis of the normal ECG
13. Determine the mean electrical axis of the ventricular QRS and appreciate the mean axis deviation
14. Explain the concepts of current of injury, J point, and their significance
Study Resources:
1. Chapter 11, Guyton and Hall Textbook of Medical Physiology, 14th edition
2. Chapter 9, Human Physiology - From Cells to Systems, Lauralee Sherwood, 9th edition
3. Chapter 29, Ganong’s Review of Medical Physiology, 26th edition
4. Electrocardiogram, StatPearls - https://www.ncbi.nlm.nih.gov/books/NBK549803/
5. ECG in Medical Practice by ABM Abdullah, 4th edition
6. Chapter 3, Cardiology Explained, https://www.ncbi.nlm.nih.gov/books/NBK2214/
7. ECG Basics, http://www.nataliescasebook.com/tag/e-c-g-basics
share - Lions, tigers, AI and health misinformation, oh my!.pptxTina Purnat
• Pitfalls and pivots needed to use AI effectively in public health
• Evidence-based strategies to address health misinformation effectively
• Building trust with communities online and offline
• Equipping health professionals to address questions, concerns and health misinformation
• Assessing risk and mitigating harm from adverse health narratives in communities, health workforce and health system
louise and lauren paper presentations development of guide assistive technology
1. 24/09/2012
Sequencing difficulties post brain injury
Scaffolding
What is GUIDE?
Lauren O’Neill and Louise McCombe Occupational
Therapists at Graham Anderson House, Glasgow,
Brain Injury Rehabilitation Trust
Single n study as part of a wider randomised
control
Activities of daily living are complex Four categories of behaviour control
sequences impairments
A set of actions that must be performed in a
certain order to achieve a goal state ◦ Energization (motivation / sustaining
activity) localized to SMPFC
Inability to carry out a complex sequence ◦ Emotional regulation (prioritisation /
safely is widespread and disabling for many: inhibition) VMPFC
◦ Learning disability
◦ Task setting (verbal self regulation) LPFC
◦ Mental health problems
◦ Degenerative neurological conditions ◦ Meta cognition (monitoring) Area 10
◦ Stroke
◦ Acquired brain injury
Within rehab units the use of scaffolding
techniques to prompt self-care task are Support staff use a wide range of subtle
common strategies
It facilitates ability to build on skills and Service users are not passive
knowledge
Instructions given are just beyond the level of Service users often request help
what the service user could do without But, service users often also resist help
prompts Maybe service users are less likely to resist
The staff member provides the service user scaffolding from a technology?
with the scaffolding to achieve an end goal
(Olsen and Pratt, 2000)
1
2. 24/09/2012
Assistive Technology for cognition is the use Other media have also used text or auditory
of technology to extend or augment the prompts to overcome prospective memory
mental functions, with particular application difficulties;
meeting the needs of people with cognitive • Voice recorders with a timer function (eg. van
impairment den Broek, Downes, Johnson, Dayus, & Hilton,
2000);
Research includes use of paging system to
• text messaging to mobile phones
provide reminders of everyday tasks (Wilson (Pijnenborg, Withaar, Evans, van den Bosch, &
et al 2001). Brouwer, 2007)
• smartphone reminders (Svoboda & Richards,
2009)
Care-givers provide cognitive support Rehabilitation relevant behaviour in persons
◦ Talking service users through tasks with early stage vascular dementia
◦ Providing prompts and checks O'Neill, B. Moran, K. & Gillespie, A. (2010).
Scaffolding rehabilitation behaviour using a
GUIDE models care giver cognitive support voice-mediated assistive technology for
◦ Prompts user through tasks cognition. Neuropsychological Rehabilitation,
◦ Receives verbal input 18, 1-19.
◦ Simulates naturalistic conversation
◦ Automated, non-judgemental and
emotionally neutral prompter (preferred by
some individuals)
Computer Computer
GUIDE software GUIDE software
Prompt or
User User Question
2
3. 24/09/2012
The only prompting system that uses speech
Speech
recognition
Recognition
◦ It simulates natural conversation
No difficult technology interface
Computer
◦ It is as easy to use as having a conversation
GUIDE software
Builds upon users abilities
o Rather than by-passing their abilities
Prompt or
User Question Technology may aid the transition from
rehabilitation unit to home
Randomised control trial
To develop and test laundry and morning routine
GUIDE protocols for use by people with acquired brain
injury.
Three year research project 2010-2013 Single n experimental design – as part of the
larger randomised control trial
◦ at Brain Injury Rehabilitation Trust’s Graham Anderson
House in Glasgow
◦ funded by Chief Scientist Office of the Scottish Government
62 year old man
Twelve month history after intracerebral
haemorrhage
Severe cognitive impairment - memory
n=1, Inpatient A-B-A-B; At home A-B
Morning Checklist a. sequence performance
score and b. carer prompts
Inpatient = six weeks baseline then three
weeks intervention
Home = one week baseline then two week
intervention (trial)
3
4. 24/09/2012
During the first intervention phase the
Morning Checklist score was significantly
increased in comparison with baseline
This indicates that the number of prompts
given by support staff significantly decreased
in the first intervention phase, where the
participant approached perfect performance
(4.94/5.00).
The use of guide was withdrawn due to Similar pattern of improvement at home
subject error (being turned off ) for 4 days Significant improvement in morning checklist
ratings from baseline and intervention
Within this period the results demonstrate a conditions
greater number of prompts required Guide error rates at home were slightly higher
This may have been an artefact of difference
When the GUIDE was re-introduced the in observers or due to the change of
results indicate an increase in function environment
4
5. 24/09/2012
Inpatient errors: getting up and going
straight back to bed, hesitating during
sequence, not being able to find clothes that
are in the room, and not getting all the
clothes ready to be fully dressed
Home errors: not getting all clothes to be
fully dressed, wearing dirty or mismatched
clothes, forgetting to pick up phone/GPS and
inappropriate clothes for the weather
Guide reduced participant errors to near zero Many service users object to being observed
in the intervention phase and prompted. The use of an automated,
Led to ratings of ‘independent’ on half of non-judgemental and emotionally neutral
intervention trials prompter may be preferable (O’Neill &
Guide can emulate the supportive action of Gillespie, 2008; Lo Presti et al., 2004)
carers in the performance of a complex ADL The technology may aid in the transition from
sequence rehabilitation centre to home
Augmentation of rehabilitation, facilitating This could have huge financial implications
discharge and home support
Increased prompting without increasing staff
costs
If the person can carry out the sequence with Single n experimental design
prompting support, then Guide or a context Participant had interested in technologies
aware prompter may allow that person to be Highly motivated by hope of discharge home
independent Increases in error rates and decreases in
prompt score ratings of independence
occurred on return home and baseline
This could have functional implications in
terms of discharge planning and could Feedback on appearance and performance
perhaps reduce the need for long term carer Perhaps once more settled within his home
support
environment and into an established routine
with support the long term use of GUIDE
could have maximised his function
5
6. 24/09/2012
From a functional perspective the use of the
GUIDE system alongside a rehabilitation
program could maintain sequencing abilities
with complex ADL tasks
It could be implemented as a less intrusive
way of supporting an individual with personal
care routines
This could in turn perhaps have longer term
implications for reducing carer costs
6