Proceedings of the Australasian Computer Science Week Multiconference最新文献

筛选
英文 中文
Health Consumer Usage Patterns in Management of CVD using Data Mining Techniques 使用数据挖掘技术管理心血管疾病的健康消费者使用模式
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290732
Devipriyaa Nagappan, J. Warren, Patricia J. Riddle
{"title":"Health Consumer Usage Patterns in Management of CVD using Data Mining Techniques","authors":"Devipriyaa Nagappan, J. Warren, Patricia J. Riddle","doi":"10.1145/3290688.3290732","DOIUrl":"https://doi.org/10.1145/3290688.3290732","url":null,"abstract":"The Healthcare system is exposed to the increasing impact of chronic diseases including cardiovascular diseases; it is of much importance to analyze and understand the health trajectories for efficient planning and fair allotment of resources. This work proposes an approach based on mining clinical data to support the exploration of health trajectories related to cardiovascular diseases. As the health data are highly confidential, we aimed to conduct our experiments using a large, synthetic, longitudinal dataset, constituted to represent the CVD risk factors distribution and temporal sequence of events related to heart failure hospitalization and readmission. This research work analyses and represents the temporal events or states of the patient's trajectory with the aim of understanding the patient's journey in the management of the chronic condition and its complications by using data mining techniques. This study focuses on developing an efficient algorithm to find cohesive clusters for handling the temporal events. Clustering health trajectories have been carried out by proposing an improved version of the Ant-based clustering algorithm. Insights from this study can potentially result in evidence that these approaches are useful in understanding and analyzing patient's health trajectories for better management of the chronic condition and its progression.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BYOD in Hospitals-Security Issues and Mitigation Strategies 医院BYOD的安全问题和缓解策略
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290729
T. Wani, Antonette Mendoza, K. Gray
{"title":"BYOD in Hospitals-Security Issues and Mitigation Strategies","authors":"T. Wani, Antonette Mendoza, K. Gray","doi":"10.1145/3290688.3290729","DOIUrl":"https://doi.org/10.1145/3290688.3290729","url":null,"abstract":"The demand for using personal devices in hospitals (BYOD) has increased rapidly over the years. However, BYOD also means that healthcare organisations are at great risk of leaking sensitive information assets like Personal Health Information (PHI) of patients, given that personal devices are outside the control of hospital IT management and may lack important security measures. Hence, the aim of this research is to develop a mitigation strategy which can cater to such security issues. A comprehensive literature review was conducted to identify BYOD security issues and mitigation solutions. This was followed by using two existing security frameworks, the BYOD security framework and People Policy Technology (PPT) model to shape a stepwise mitigation strategy. Technical, managerial and social issues were identified which include unsecure user behaviour by hospital employees, lack of security awareness, usability issues, legal requirements and lost devices. The mitigation strategy elucidates that while information and communication technologies allow better enforcement of security measures; policies and training provide the desired guidance to influence positive user behaviour among employees. The paper also discusses the need for a balance between usability and security in the success of BYOD in hospitals and hence provides systematic guidelines to curb BYOD security risks in hospitals.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records 雇主赞助的个人健康记录的整体健康和福祉数据模型
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290727
M. Fernando, C. Fidge, T. Sahama
{"title":"An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records","authors":"M. Fernando, C. Fidge, T. Sahama","doi":"10.1145/3290688.3290727","DOIUrl":"https://doi.org/10.1145/3290688.3290727","url":null,"abstract":"With the need for employee-directed health management in organisations, employers have started to utilise personal health records' (PHRs) potential to shift health management responsibility to employees. Whilst the overall well-being of employees in organisations has become the trend in wellness activities at work, existing literature has paid less attention to identifying proper data organisation and management in employer-sponsored personal health records (ESPHRs) for overall health and well-being management of employees. We conducted three focus group discussions with 26 participants comprised of employees and employers to identify information concerns in occupational health and well-being management. We found that health and well-being data can be organised into six main domains when considering the overall health and wellbeing of employees. Consequently, a survey was conducted among 360 respondents to identify employees' and employers' perception of the usefulness of having overall health and well-being information in ESPHRs. We found that both parties accept the importance of all health and well-being information domains in ESPHRs. However, employees believe there is more usefulness in having physical health and healthy behaviour information in ESPHRs, while employers see the importance of work environment, emotional health, basic access and life evaluation information as more useful to have in ESPHRs. Information concerns identified through a thematic analysis were then used to develop an overall health and well-being data model for ESPHRs. These findings suggest that a new data organisation in ESPHRs when profiling employee health and well-being data has a high chance of achieving effective ESPHR system use in organisations.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web Service based Intelligent Search on Legal Documents 基于Web服务的法律文件智能检索
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290710
Haojie Huang, R. Wong
{"title":"Web Service based Intelligent Search on Legal Documents","authors":"Haojie Huang, R. Wong","doi":"10.1145/3290688.3290710","DOIUrl":"https://doi.org/10.1145/3290688.3290710","url":null,"abstract":"Web services such as RESTful APIs provide high flexibility for knowledge base systems in different domains. To apply it to the legal aspect, we can obtain much data of the case law efficiently enabling us to relate one case to another easily and even to compare the details of a plenty of the case laws simultaneously. Having said that, to ensure the performance of the web services and the accuracy of the data sourcing from them is onerous in the consideration of the backend system for the web services and relevant search engine. In this paper, we introduce a web service for the legal knowledge, LegalKB, enhancing a concept search, and implement a method, WMD ranking method, to speed up the data search through the enhanced system queries. On top of this, we propose a method to automate the optimisation of the system parameters to ensure that the system queries run in the most optimal manner - integration of multiple machine learning methods into our web service to facilitate third-party applications to interface with our web service enlarging the knowledge base to a great extent.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116978058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Thermal comfort and physical activity in an office setting 办公室环境中的热舒适和身体活动
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290733
Y. V. Kasteren, S. Champion, L. Perimal-Lewis
{"title":"Thermal comfort and physical activity in an office setting","authors":"Y. V. Kasteren, S. Champion, L. Perimal-Lewis","doi":"10.1145/3290688.3290733","DOIUrl":"https://doi.org/10.1145/3290688.3290733","url":null,"abstract":"Growing awareness of the health risks associated with sedentary behaviour have raised concerns about the health and safety of office workers who spend as much as 77% of their work hours sedentary and often for prolonged periods. In this research we look at the association between building heating, ventilation and air conditioning (HVAC), and physical activity at work measured using ambient temperature. Two months of Fitbit 1-min step count and heartrate data from 15 office-based workers was used along with desk-based USB temperature loggers capturing 15-minute temperature data over the collection period. Preliminary results identify a strongly significant correlation between one-minute interval step count, temperature and heartrate data were found (P > 0.000). Further research on the relationship between physical activity and thermal activity is warranted, using data from building management systems to capture data not only temperature but other measures of thermal comfort such as humidity and air flow.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Adaptive and Autonomous LoRa Gateway for Throughput Optimisation 一种用于吞吐量优化的自适应自治LoRa网关
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290702
Jiaming James Chen, Vicky Liu, W. Caelli
{"title":"An Adaptive and Autonomous LoRa Gateway for Throughput Optimisation","authors":"Jiaming James Chen, Vicky Liu, W. Caelli","doi":"10.1145/3290688.3290702","DOIUrl":"https://doi.org/10.1145/3290688.3290702","url":null,"abstract":"The purpose of this study is twofold. First, this study proposes a cost-effective LoRa gateway to improve bandwidth utilisation to achieve optimal network throughput for LoRa networks from a hardware design perspective. Secondly, this study creates a design for adaptive and autonomous algorithm to allocate bandwidth while meeting dynamic throughput demands from a network management perspective. This study conducted actual experiments to evaluate the network throughput capacity of a LoRa gateway based on the SemTech™ SX1301 transceiver chipset (SX1301 gateway). This study also addresses the limitations of the SX1301 gateway by proposing a gateway to improve bandwidth utilisation to increase network throughput. Knowing different packet sizes have an impact on network throughput, this study also set up a series of actual experiments related to the network throughput of the proposed gateway with 40 test combinations based on four different packet sizes and ten configurable bandwidth options. These test results were gathered and analysed to establish the throughput threshold for four different packet size ranges, and then to design an adaptive and autonomous algorithm for dynamic bandwidth allocation without human intervention. Based on the theoretical throughput capacity, the proposed gateway has an average improvement of throughput capacity of 57.73%, compared to the SX1301 gateway. The significance of the proposed adaptive algorithm is its capability for monitoring of the network usage constantly and then allocating the bandwidth on demand in an autonomous, agile and scalable fashion.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126197014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the Australasian Computer Science Week Multiconference 澳大利亚计算机科学周会议录
{"title":"Proceedings of the Australasian Computer Science Week Multiconference","authors":"","doi":"10.1145/3290688","DOIUrl":"https://doi.org/10.1145/3290688","url":null,"abstract":"","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123490670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures 我能相信我看到的数据吗?:医生对物联网健康架构中医疗数据的关注
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290731
Fariha Tasmin Jaigirdar, C. Rudolph, Chris Bain
{"title":"Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures","authors":"Fariha Tasmin Jaigirdar, C. Rudolph, Chris Bain","doi":"10.1145/3290688.3290731","DOIUrl":"https://doi.org/10.1145/3290688.3290731","url":null,"abstract":"With the increasing advancement of Internet of Things (IoT) enabled systems, smart medical devices open numerous opportunities for the healthcare sector. The success of using such devices in the healthcare industry depends strongly on secured and reliable medical data transmission. Physicians diagnose that data and prescribe medicines and/or give guidelines/instructions/treatment plans for the patients. Therefore, a physician is always concerned about the medical data trustworthiness, because if it is not guaranteed, a savior can become an involuntary foe! This paper analyses two different scenarios to understand the real-life consequences in IoT-based healthcare (IoT-Health) application. Appropriate sequence diagrams for both scenarios show data movement as a basis for determining necessary security requirements in each layer of IoT-Health. We analyse the individual entities of the overall system and develop a system-wide view of trust in IoT-Health. The security analysis pinpoints the research gap in end-to-end trust and indicates the necessity to treat the whole IoT-Health system as an integrated entity. This study highlights the importance of integrated cross-layer security solutions that can deal with the heterogeneous security architectures of IoT healthcare system and finally identifies a possible solution for the open question raised in the security analysis with appropriate future research directions.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131318426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Challenging AI: Evaluating the Effect of MCTS-Driven Dynamic Difficulty Adjustment on Player Enjoyment 挑战性AI:评估mcts驱动的动态难度调整对玩家乐趣的影响
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290748
Simon Demediuk, M. Tamassia, Xiaodong Li, W. Raffe
{"title":"Challenging AI: Evaluating the Effect of MCTS-Driven Dynamic Difficulty Adjustment on Player Enjoyment","authors":"Simon Demediuk, M. Tamassia, Xiaodong Li, W. Raffe","doi":"10.1145/3290688.3290748","DOIUrl":"https://doi.org/10.1145/3290688.3290748","url":null,"abstract":"Providing a challenging Artificial Intelligent opponent is an important aspect of making video games enjoyable and immersive. A game that is too easy, or conversely too hard may frustrate or bore players. Dynamic Difficulty Adjustment is a method that aims at improving the traditional methods of difficulty selection, by providing an opponent that tailors the challenge it presents to players such that it is at an optimal level for them. This research presents a player evaluation of three different Dynamic Difficulty Adjustment approaches using Monte Carlo Tree Search and measures their impact on player enjoyment, realism and perceived level of difficulty. In particular, it investigates the effect that different win/loss ratios, employed by Dynamic Difficulty Adjustment, have on player enjoyment.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116208561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Development and exploration of polymedication network from Pharmaceutical and Medicare Benefits Scheme data 基于药品和医疗保险福利计划数据的多药网络开发与探索
Proceedings of the Australasian Computer Science Week Multiconference Pub Date : 2019-01-29 DOI: 10.1145/3290688.3290738
Arif Khan, Uma Srinivasan, M. S. Uddin
{"title":"Development and exploration of polymedication network from Pharmaceutical and Medicare Benefits Scheme data","authors":"Arif Khan, Uma Srinivasan, M. S. Uddin","doi":"10.1145/3290688.3290738","DOIUrl":"https://doi.org/10.1145/3290688.3290738","url":null,"abstract":"Polypharmacy or concurrent intake of multiple medications is often associated with negative health outcomes and adverse drug reactions. Routinely collected administrative health data can be a potential and inexpensive alternative to study large population to understand this polypharmacy phenomenon and associated risk. However, synthesizing medication intakes from pharmaceutical records of administrative data can be challenging. In this study, we proposed a graph or network-based approach to understand polypharmacy utilizing the 10% Pharmaceutical and Medicare Benefits Scheme sample data in Australian healthcare context. We proposed methods to identify drug regimens from discrete information of drug dispenses. A polymedication network is then generated from the regimens. We also explored potential relationship among patients' age, medical and pharmaceutical costs and several categories of polymedication regimens. The result showed complex relationships among various drugs and signified the multimorbidity nature of the targeted treatments. Especially the long-term polymedication regimens are found to be focused on treating chronic conditions like cardiovascular diseases, diabetes, asthma, COPD and acid reflux, consistent with the Australian population's disease burden. The methods and networked approach presented in this study can act as a basis for further pharmacovigilance and identifying adverse drug reactions.","PeriodicalId":297760,"journal":{"name":"Proceedings of the Australasian Computer Science Week Multiconference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信