Mogensen P.H.,Alexandra Institute |
Wollsen S.,Region of Southern Denmark
Studies in Health Technology and Informatics | Year: 2017
The paper presents the case of developing, adapting, and implementing an electronic prehospital patient records system in Scandinavia. The system is now fully implemented and it is used by all stakeholders within the prehospital domain. The paper focuses on the participatory design process of adapting the technical solution specified in the call for tender with the complex organizational context of actors with very diverse tasks and objectives and situated in five different regions each with their special geographical and demographical challenges. The paper concludes by discussing a range of lessons learned when using PD within a commercial project (where the starting point is a fixed contract and requirements specification), with a very diverse set of stakeholders (users, customers, and indirect users), and in a very complex domain encompassing a range of highly specialized competencies. © 2017 The authors and IOS Press. All rights reserved.
Alapetite A.,Alexandra Institute |
Hansen J.P.,Technical University of Denmark
2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016 | Year: 2016
This paper focuses on digital aids for sight impairment and motor disabilities. We propose an Internet of Things (IoT) platform for discovering nearby items, getting their status, and interacting with them by e.g. voice commands or gaze gestures. The technology is based on Bluetooth Low Energy, which is included in consumer electronics such as smartphones without requiring additional hardware. The paper presents a prototype platform illustrated by concepts of use. © 2016 IEEE.
Mogensen P.H.,Aabogade |
Wollsen S.,Alexandra Institute
ACM International Conference Proceeding Series | Year: 2014
The main contribution of this paper is its attempt at formulating principles and insights pertaining to Participatory Design in realisation, and doing so within a large-scale, complex, and commercial context. It explores the concepts of Communities of Practice, Legitimate Peripheral Learning, and Boundary Objects both to unfold the activities in the project and to be used forward-looking as means to foster constructive workshops in settings with very heterogeneous groups. Furthermore, it emphasises the mutual learning taking place among and between the various practices, and provides concrete examples of ways to handle that the project is part of a larger and continuously changing context. Copyright is held by the owner/author(s).
Neerbek J.,University of Aarhus |
Neerbek J.,Alexandra Institute |
Assent I.,University of Aarhus |
Dolog P.,University of Aalborg
Proceedings - International Conference on Data Engineering | Year: 2017
Leak of sensitive information from unstructured text documents is a costly problem both for government and for industrial institutions. Traditional approaches for data leak prevention are commonly based on the hypothesis that sensitive information is reflected in the presence of distinct sensitive words. However, for complex sensitive information, this hypothesis may not hold. Our TABOO system detects complex sensitive information in text documents by learning the semantic and syntactic structure of text documents. Our approach is based on natural language processing methods for paraphrase detection, and uses recursive neural networks to assign sensitivity scores to the semantic components of the sentence structure. The demonstration of TABOO focuses on interactive detection of sensitive information with the TABOO system. Users may work with real documents, alter documents or prepare free text, and subject it to information detection. TABOO allows users to work with our TABOO engine or with traditional approaches, and to compare results. Users may verify that single words can change sensitivity according to context, thereby giving hands-on experience with complex cases of sensitive information. © 2017 IEEE.
Andersen E.S.,Aarhus University Hospital |
Noe K.O.,University of Aarhus |
Noe K.O.,Alexandra Institute |
Sorensen T.S.,University of Aarhus |
And 6 more authors.
Radiotherapy and Oncology | Year: 2013
Background and purpose: Variations in organ position, shape, and volume cause uncertainties in dose assessment for brachytherapy (BT) in cervix cancer. The purpose of this study was to evaluate uncertainties associated with bladder dose accumulation based on DVH parameter addition (previously called "the worst case assumption") in fractionated BT. Materials and methods: Forty-seven patients treated for locally advanced cervical cancer were included. All patients received EBRT combined with two individually planned 3D image-guided adaptive BT fractions. D2cm 3 and D0.1 cm 3were estimated by DVH parameter addition and compared to dose accumulations based on an in-house developed biomechanical deformable image registration (DIR) algorithm. Results: DIR-based DVH analysis was possible in 42/47 patients. DVH parameter addition resulted in mean dose deviations relative to DIR of 0.4 ± 0.3 Gyαβ3 (1.5 ± 1.8%) and 1.9 ± 1.6 Gyαβ3 (5.2 ± 4.2%) for D2cm 3 and D0.1cm 3 respectively. Dose deviations greater than 5% occurred in 2% and 38% of the patients for D2 cm 3 and D0.1cm 3 respectively. Visual inspection of the dose distributions showed that hotspots were located in the same region of the bladder during both BT fractions for the majority of patients. Conclusion: DVH parameter addition provides a good estimate for D2cm 3 whereas D0.1cm 3 is less robust to this approximation. © 2013 Elsevier Ireland Ltd. All rights reserved.
Dalgaard L.G.,Alexandra Institute |
Gronvall E.,University of Aarhus |
Verdezoto N.,University of Aarhus
Proceedings of the 2013 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, PervasiveHealth 2013 | Year: 2013
Several projects have shown that self-management of medication in private homes can be challenging. Many projects focused on specific illness-related approaches (e.g. diabetes) or practical issues such as how to handle medication while travelling. However, designing for everyday medication management involves more than just specific illness-related strategies and should take into account the broad set of activities conforming people's everyday life. This study investigates how older adults manage their medication in everyday life. To inform the design of pervasive healthcare medication management systems (PHMMS), the study calls for attention to medication-specific particularities that account for: according to need medication, the heterogeneous care network, the substitute medication, the medication informational order, the shared responsibility and the adjustment of medication intake. These medication particularities can enhance the individual's medication overview and support the understanding of medication intake in everyday life. The study also presents five design principles for future design of PHMMS. © 2013 ICST.
Verdezoto N.,University of Aarhus |
Olsen J.W.,Alexandra Institute
IHI'12 - Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium | Year: 2012
Several technologies have been developed to support people's medication management, including pillboxes, specialized software applications, reminders and paper-based medication lists. Several of these technologies were discovered in older adults' homes during user studies carried out with the main purpose to help them to manage their medications and recall challenges. We confirm that a considerable number of older adults integrate their medication treatments into their daily life routines, and that the lack of knowledge, caregiver's support, medicine outside the home, forgetting medication intake, complexity of medication regimen were equally important challenges. One of the major findings was the issue related to substitutions, as older adults get confused due to the volatile information that they receive regarding their medications. We define basic requirements in order to address these issues towards the design of a personalized medication management system. We further describe our initial stage in a participatory design process as part of the ongoing Lev Vel Consortium. Copyright © 2012 ACM.
Dalgaard L.G.,Alexandra Institute |
Gronvall E.,University of Aarhus |
Verdezoto N.,University of Aarhus
Proceedings - 2013 IEEE International Conference on Healthcare Informatics, ICHI 2013 | Year: 2013
Healthcare activities in private home settings that are not supervised by a healthcare professional can challenge older adults. To support such unsupervised care activities, an increasingly number of reminders and monitoring systems are designed. However, most of these systems target a specific treatment or a specific condition. In this paper, we discuss experiences from designing the tablet-based application MediFrame. MediFrame is a personal medication management system to support older adults in non-clinical settings such as the home. The paper describes the user-centered design process and the resulting tablet application. We show how MediFrame can be used to support adherence in medical treatments through fieldwork informed use scenarios. Based on early qualitative feedback, we also discuss lessons learned and how designers can support a holistic medication experience for an older adult's everyday life. © 2013 IEEE.
Jakobsen T.P.,Alexandra Institute |
Makkes M.X.,TU Eindhoven |
Nielsen J.D.,Alexandra Institute
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010
We present an efficient implementation of the Orlandi protocol which is the first implementation of a protocol for multiparty computation on arithmetic circuits, which is secure against up to n-1 static, active adversaries. An efficient implementation of an actively secure self-trust protocol enables a number of multiparty computation where one or more of the parties only trust himself. Examples includes auctions, negotiations, and online gaming. The efficiency of the implementation is largely obtained through an efficient implementation of the Paillier cryptosystem, also described in this paper. © 2010 Springer-Verlag Berlin Heidelberg.
Neerbek J.,Alexandra Institute
ACM International Conference Proceeding Series | Year: 2012
Frequent itemset mining finds frequently occurring itemsets in transactional data. This is applied to diverse problems such as decision support, selective marketing, financial forecast and medical diagnosis. The cloud, computation as an utility service, allows us to crunch large mining problems. There are a number of algorithms for doing frequent itemset mining, but none are out-of-the-box suited for the cloud, requiring large data structures to be synchronized across the network. One of the best algorithms for doing frequent itemset mining is the known FP-growth (Frequent Patterns growth). We develop a cloud-enabled algorithmic variant for frequent itemset mining that scales with very little communication and computational overhead and even, with only one worker node, is faster than FP-growth. We develop the concept of a postfix path and show how this allows us to lower the communicational cost and leads to adjustable work sizes. This concept provides a very exible algorithmic solution that can be applied to a wide variety of different problem sizes and setups. Copyright 2012 ACM.