Health and safety aspects Books
University of Toronto Press Digital Playgrounds
Book SynopsisDigital Playgrounds explores the key developments, trends, debates, and controversies that have shaped children’s commercial digital play spaces over the past two decades. It argues that children’s online playgrounds, virtual worlds, and connected games are much more than mere sources of fun and diversion they serve as the sites of complex negotiations of power between children, parents, developers, politicians, and other actors with a stake in determining what, how, and where children’s play unfolds. Through an innovative, transdisciplinary framework combining science and technology studies, critical communication studies, and children’s cultural studies, Digital Playgrounds focuses on the contents and contexts of actual technological artefacts as a necessary entry point for understanding the meanings and politics of children’s digital play. The discussion draws on several research studies on a wide range of digital playgTrade Review"In framing the implications of her inquiry around questions of children’s rights, Grimes’ work models the attention that these topics warrant and highlights the urgent stakes of children’s online play. This book charts a history and a theoretical framework that establishes a new and higher bar for children’s media research. It is a foundational text in contemporary children’s media studies and will remain so for the foreseeable future." -- Meredith A. Bak, Rutgers University-Camden * Media Industries Journal *Table of ContentsIntroduction Digitizing Playgrounds and Technologizing Play What This Book Is About Why Looking Back Helps Us Move Forward Building a Children’s Technology Studies Framework Chapter Overview 1. The Importance of Digital Play Conflicting Views of Children’s Play Conflicting Views of Mediated Play Licensed Toys and Media Supersystems Digital Game Controversies and Dichotomies Dangerous Games and Risky Gamers Games for “Good” Girls Bad Game(r)s, Good Game(r)s Moving Forward Looking at “Stuff” and Structures Resituating Children’s Play Conclusion 2. Small Worlds and Walled Gardens A Brief History of Children’s Digital Playgrounds Online Games: Portals, Arcades, and Environments, 2003–2005 Neopets The Virtual World Boom, 2005–2008 Design Trends and Disparities Beyond the Computer Screen Web-Enabled Consoles Connected Games Go Mobile Toys-to-Life and Cross-Platform Games Conclusion 3. Commercializing Play(grounds) Revisiting Supersystems and Structures Texts and Contexts Affordances and Design Limitations Commercializing Gameplay The Velvet Rope Cross-Promotion and Branding Immersive Third-Party Advertising Brand Ambassadors When Stories, Designs, and Commercial Priorities Align Conclusion 4. From Rules of Play to Censorship The Primacy of Rules in Digital Games Design(ed) Rules Written Rules, Rulebooks, and Codes of Conduct Who Follows the Rules Anyway? Why Breaking Rules Is Important Negotiating Encoded Rules Children Bending, but Not Breaking, the Rules Ice Goths and BarbieBoys Flash Mobs and Copycats Playing in the Margins of Manoeuvre Conclusion 5. Safety First, Privacy Later Children’s Data and Privacy The COPPA Rule Revised Reframing Privacy Protections as Safety Mechanisms Privacy Policies “Safety” by Design Safety as a Key Selling Point Freedom of Expression as a Collateral Cost of Safety Secret Spaces and “Unsafe” Places Unsafe and Risky Play Conclusion 6. Playing as Making and Creating Playing and Making Digital Games Children’s Literacy, Agency, and Cultural Rights Terms of Service, Terms of Play Who Owns Children’s Content in Digital Playgrounds? New Creative Opportunities, Same Old Terms User Rights in Minecraft Fandom and Fair Use as Consumer Practice Conclusion 7. The Politics of Children’s Digital Play Where We Are, and How We Got Here The (Four) Problems with Digital Playgrounds Privacy, Secrets, and Selfhood Censorship and Freedom of Expression Ownership, Authorship, and Copyright Commercial Content and Control The Digital Playground as Public Sphere Bibliography
£28.80
Rupa Publications India Pvt Ltd. THE 4-WEEK MEMORY CHALLENGE
Book Synopsis
£10.99
Oxford University Press Mental Health in the Digital Age
Book SynopsisThe Internet and related technologies have reconfigured every aspect of life, including mental health. Although the negative and positive effects of digital technology on mental health have been debated, all too often this has been done with much passion and few or no supporting data. In Mental Health in the Digital Age, Elias Aboujaoude and Vladan Starcevic have edited a book that brings together distinguished experts from around the world to review the evidence relating to this area. The first part of the book addresses threats resulting from the growing reliance on, and misuse of, digital technology; it also looks at how some problematic behaviors and forms of psychopathology have been shaped by this technology. This section reviews problematic Internet and video game use, effects of violent video games on the levels of aggression and of online searches for health-related information on the levels of health anxiety, use of digital technology to harm other people, and promotion of suTrade ReviewMental Health in the Digital Age is an up-to-date reference work that will be of assistance to any clinician seeking to understand online addiction and the potential for the internet to change clinical practice. * Olav Nielssen, Australasian Psychiatry, 23(6), 2015 *In Mental Health in the Digital Age: Grave Dangers, Great Promise, Aboujaoude and Starcevic bring together technoskeptics and technophilics, who outline potential psychological risks and opportunities of using the Internet. Expert discussions on addiction, violence and bullying are followed up with an analysis of online and digital therapies. The plethora of view points presented overcomes the ubiquitous paragon of risky and problematic Internet use by providing a well-balanced and considered picture of digital technology in the context of mental health." - Daria Kuss, PhD MSc MA BA CPsychol, International Gaming Research Unit, Nottingham Trent University, Nottingham, UKThe book provides a timely, state of the art collection of highly-focused reviews of intriguing professional subjects related to mental health in the era of new media. Putting together a broad scope of such themes - from problematic gaming to cyberchondria to Internet violence, to eTherapy - grants readers a great academic resource on pathological and therapeutic perspectives of cyberpsychology. By thoughtful and useful organization, the book chapters guide readers in this relatively new field of research and shed lights on relevant psychological, medical, and sociological phenomena. The blend of theory, research, and practical issues covers important aspects of each subject and offers a comprehensive yet deep understanding of the topics covered. Readers from various disciplines - such as psychology, psychiatry, education, and social work - could highly benefit and get enriched by this volume." - Professor Azy Barak, Dept. of Counseling and Human Development, University of Haifa, IsraelMental Health in the Digital Age is an excellent compendium of useful and up-to-date information about a diverse range of issues in Internet psychology, including gaming addiction, video game aggression, cyberbullying, online therapy, virtual reality, plus much more. A team of distinguished experts have parsed a complex and ever-growing bank of scientific literature, providing detailed, clear, and critical perspectives on key issues and controversies, making this work a highly accessible resource for researchers, educators, clinicians, policymakers, and students. A particular highlight of this text is its strong focus on the many significant challenges facing the field of clinical psychology as the Internet is increasingly intersecting with mental health issues - provided with ethical, practical, and objective statements of how to address these issues effectively in the future." - Dr. Daniel King, School of Psychology, The University of Adelaide, AustraliaAuthoritative and comprehensive, a key strength of this book is its systematic coverage of both the risks and the benefits of technology for mental health. An important addition to the library of any mental health practitioner and an invaluable text for students and researchers seeking a thoughtful review of the field." - Professor Kathy Griffiths, Director, National Institute of Mental Health Research, The Australian National University.The digital age promises much for improving our way of life, health, wellbeing, and connectedness to others. Along with this, it is critical that we ensure the benefits are not outweighed by the emergence of new mental health problems related to the immersion of technology into our daily lives. Mental Health in the Digital Age is an important and novel addition to the field, which explores the neurobiology, psychology and sociology of problematic digital media use and its integration into society. Mental Health in the Digital Age covers the spectrum of mental health problems to mental health solutions, all in one place, and provides readers with access to the range of research evidence across this spectrum in chapters that are easy to digest and comprehensive in their reach. - Frances Kay-Lambkin, Associate Professor, Faculty of Medicine, University of New South Wales, Sydney, Australia; Centre for Translational Neuroscience and Mental Health, University of Newcastle, AustraliaTable of ContentsContents ; Introduction: www (dot) Mental Health by Elias Aboujaoude & Vladan Starcevic ; Section I: Challenges ; Chapter 1. Problematic Internet Use: An Overview by Elias Aboujaoude & Aviv Weinstein ; Chapter 2. An Overview of Problematic Gaming by Mark D. Griffiths, Orsolya Kiraly, Halley M. Pontes & Zsolt Demetrovics ; Chapter 3. Assessment of Problematic Internet Use and Online Video Gaming by Orsolya Kiraly, Katalin Nagygyorgy, Beatrix Koronczai, Mark D. Griffiths & Zsolt Demetrovics ; Chapter 4. Neurobiological Aspects of Problematic Internet and Video Game Use by Sun Mi Kim & Doug Hyun Han ; Chapter 5. Video Game Violence and Offline Aggression by Christopher L. Groves & Craig A. Anderson ; Chapter 6. Cyberchondria: An Old Phenomenon in a New Guise? by Vladan Starcevic & David Berle ; Chapter 7. Cyberbullying: A Mental Health Perspective by Matthew W. Savage, Sarah E. Jones & Robert S. Tokunaga ; Chapter 8. Life vs. Death: The Suicidal Mind, Online by Keith M. Harris ; Section II: Opportunities ; Chapter 9. Psychoeducation and the Internet by Nicola J. Reavley & Anthony F. Jorm ; Chapter 10. Internet-Based Psychotherapy by Gerhard Andersson ; Chapter 11. Software-Based Psychotherapy: The Example of Computerized Cognitive-Behavioral Therapy (cCBT) by Lina Gega & Simon Gilbody ; Chapter 12. Next Frontier: Virtual Reality in Exposure Therapy by Eric Malbos ; Chapter 13. mTherapy: An Overview of Mobile Device-Assisted Psychological Therapy and Prevention of Mental Health Problems by Sylvia Kauer & Sophie C. Reid ; Chapter 14. Electronic Mental Health Records in the United States: Promise and Pitfalls by David J. Peterson & Jeffrey G. Miller
£49.60
InterActions Growing up Healthy in a World of Digital Media
Book SynopsisA guide for age appropriate use of digital media by children and adolescents for the support of parents, schools and other people affected, with particular attention to the developmental phases of childhood.
£9.50
Taylor & Francis Ltd The Routledge Companion to Risk Crisis and
Book SynopsisAware that a single crisis event can devastate their business, managers must be prepared for the worst from an expansive array of threats. The Routledge Companion to Risk, Crisis and Security in Business comprises a professional and scholarly collection of work in this critical field. Risks come in many varieties, and there is a growing concern for organizations to respond to the challenge. Businesses can be severely impacted by natural and man-made disasters including: floods, earthquakes, tsunami, environmental threats, terrorism, supply chain risks, pandemics, and white-collar crime. An organization's resilience is dependent not only on their own system security and infrastructure, but also on the wider infrastructure providing health and safety, utilities, transportation, and communication.Developments in risk security and management knowledge offer a path towards resilience and recovery through effective leadership in crisis situations. The growingTrade Review'The Editor, Professor Kurt Engemann, along with the effort of contributing authors, has created an important resource for scientists, practitioners and students by producing The Routledge Companion to Risk, Crisis and Security in Business. This quality book provides a thorough exploration of numerous significant issues and methods, not commonly covered in textbooks in this vital field.' - Terje Aven, PhD, Professor of Risk Analysis and Risk Management, University of Stavanger, Norway.'This book is a comprehensive and authoritative source of the state-of-the-art in risk, crisis and security, from both a conceptual and a practical perspective. It is a must-read for business leaders, policy analysts, technicians and academics who seek innovative approaches and solutions for this exponentially growing complex field.' - Giampiero E.G. Beroggi, PhD, Professor and Director Center for Business Innovation, University of Applied Sciences in Business Administration Zurich, Switzerland.Table of ContentsPART I, Developing, Implementing and Maintaining Risk Strategies1. Developments in risk security, Kurt J. Engemann, 2. The evolution of risk management thinking in organizations, Phil Kelly, 3. Intuition and decision making for crisis situations, Holmes E. Miller, 4. Business continuity management organizations: the models of implementation, Wei Ning Zechariah Wong and Jianping Shi, 5. Knowledge in high reliability organizations: a review of interrelated perspectives, Krista N. EngemannPART II, Natural and Man-Made Disasters6. A retrospective account of the impacts of the 1960 Valdivia, Chile, earthquake and tsunami and the lack of business continuity planning, Benigno E. Aguirre, 7. What lurks beneath: deep supply chain risks, Yossi Sheffi, 8. Crisis leadership: a leader’s new normal, Robert J. Darling and Stephen Young, 9. Internal investigations of white-collar crime, Petter Gottschalk, 10. Collapse or recovery after white-collar crime, Petter Gottschalk, PART III, Infrastructure Risks11. Business resiliency considerations in the site selection and construction of a new facility, Natalie M. Dengler, 12. Megacities at risk, Cesar Marolla, 13. Self organization and its role in building disaster resilience, Nirmita Mehrotra, 14. Risk-management in the bioeconomy, Jutta Geldermann, 15. SMEs defending their businesses from flood risk: contributing to the theoretical discourse on resilience, Bingurath Ingirige and Gayan WedawattaPART IV, Systems Security for Business Resiliency16. Security awareness in the software arena, Rory V. O’Connor and Ricardo Colomo-Palacios, 17. Information security in an ever-changing threat landscape, Matthew Lagana, 18. Business continuity and e-business: towards an "always-on" e-business, Nijaz Bajgoric, 19. Using location k-anonymity models for protecting location privacy, Eric Di Carlo, Heechang Shin and Haibing LuPART V, Risk in Business Sectors20. Accounting information systems: opportunity and risk, Shoshana Altschuller and Shaya (Isaiah) Altschuller, 21. Transcending beyond finance for managing foreign exchange risk, George A. Zsidisin and Barbara Gaudenzi, 22. Financial risk inherent in oil fracking, Roy Nersesian, 23. Cause-related marketing and disaster management: opportunities from tourism-related initiatives, Giuseppe Aliperti, Francesco Rizzi and Marco Frey, 24. Shared sorrow is half a sorrow: the role of social capital in building resilient supply chains, Mitchell J. van den Adel, Dirk Pieter van Donk and Kirstin Scholten, 25. Risk management and auditing of technology incubators/science parks: innovation enabler to drive capacity of tech ventures, Jarunee Wonglimpiyarat and Mark BillingtonPART VI, Qualitative and Quantitative Risk Modeling26. What’s in a name? Kate Boothroyd, 27. Leading through uncertainty, Cesar Marolla, 28. Safety and economic activity, Eirik B. Abrahamsen, Frank Asche and Roy E. Dahl, 29. The role of decision-making support systems in risk management, Manuel Mora, Gloria Phillips-Wren and Fen Wang, 30. Intelligent rule-based risk modeling for decision making, Ronald R. Yager
£204.25
John Wiley & Sons Inc The Language of Deception
Book SynopsisTable of ContentsIntroduction xi 1 Artificial Social Intelligence 1 2 Social Engineering and Psychological Exploitation 19 3 A History of Technology and Social Engineering 53 4 A History of Language Modeling 83 5 Consciousness, Sentience, and Understanding 127 6 The Imitation Game 151 7 Weaponizing Social Intelligence 175 8 Weaponizing Technical Intelligence 215 9 Multimodal Manipulation 239 10 The Future 257 11 The Quest for Resolution 283 Appendix A: Bot Automation 295 Appendix B: LLM Pretext Engineering 303 Appendix C: CAPTCHA Bypass 317 Appendix D: Context Manipulation Attacks 321 Appendix E: Attack Optimization with Monte Carlo Simulations 333 Appendix F: Autonomous C2 Operations with LLMs 349 Appendix G: Disembodiment Attacks 353 Bibliography 357 Acknowledgments 373 About the Author 375 Index 377
£21.59
Hay House Inc EMFD
Book SynopsisTrade Review“Dr. Mercola’s groundbreaking new book on the health effects of EMFs is both a sobering tale and an effective call to action. Dr. Mercola carefully lays out the history and evidence for the deleterious effects of EMF exposure and gives you real time, concrete steps to take to mitigate the damage for you and your family. As a result of reading this important book, I am redoubling my efforts to protect my family and patients from the harmful effects of EMFs, especially in light of the 5G rollout. This is a fight that involves us all, and Dr. Mercola’s book can help to light the way in this important struggle.” — Thomas Cowan, M.D., author of Human Heart, Cosmic Heart; Vaccines, Autoimmunity, and the Changing Nature of Childhood Illness; and Cancer and the New Biology of Water“Ten years ago, my declining health improved overnight after one simple change to my electrical exposures. If I had known about the health effects of wireless and electrical exposures fifteen years ago, it would have saved over a decade of deep personal pain and suffering. Please read this book and share what you have learned to protect yourself and the ones you love.” — Peter Sullivan, founder of Clear Light Ventures“Want to know how EMFs impact your health? This book gives a masterful account of why our lives and our planet are becoming EMF*D up and what we can do about it. Readable and balanced, it’s a must-read for anyone truly interested in safeguarding their health.” — Lloyd Burrell, author of EMF Practical Guide and founder of ElectricSense.com“5G technology holds the promise for faster connections, greater bandwidth, low latency, a massive internet-of-things, and smart cities. What’s not to like about that? Dr. Mercola has written an easy-to-read and comprehensive book explaining what we know about the potential adverse biological effects of a massive increase in our exposure to EMFs if/when 5G becomes widely available. Even if you don’t use the technology, you can’t opt out because it will be everywhere. This book is the go-to place if you want to become informed about the dangers of EMFs.” — Stephanie Seneff, Ph.D., senior research scientist, MIT Computer Science and Artificial Intelligence Laboratory“Dr. Joseph Mercola’s latest book—EMF*D—introduces the reader to the concept that electronic and wireless technology emits frequencies in the form of dirty electricity and microwave radiation that can harm and are harming our health. This books comes at an interesting time when governments around the world are racing to roll out 5G, 5th generation, wireless technology, without any testing of thebiological and health effects of long-term exposure. As we are increasingly exposed to more radiation via smart meters, smart appliances, Wi-Fi in schools, and now 5G small cell antennas placed on lamp posts every 100 meters or so, a growing number of people are asking, ‘Why the rush to 5G?’ and ‘Do we really need this technology?’ It is no longer enough for us to eat organic, drink purified water, inhale fresh air, exercise, and get plenty of sleep to stay healthy. We must also minimize our exposure to the harmful effects of electromagnetic pollution. Learn how to reduce your exposure and how to repair EMF-related damage by reading Dr. Mercola’s book, EMF*D. You won’t be disappointed!” — Dr. Magda Havas, B.Sc., Ph.D., Professor Emerita, Trent University, Canada“Dr. Joseph Mercola has written the definitive book on electromagnetic fields, with a particular emphasis on how they affect our health. This is an invaluable resource with many practical solutions, especially for those who are EMF-sensitive. For those who don’t yet know about EMFs or who refuse to take them seriously, it will be harder to ignore them after reading this book. Everyone needs to know about the dangers of EMFs. This comprehensive manual will help accomplish that.” — Oram Miller, certified building biology environmental consultant and electromagnetic radiation specialist
£15.29
Bloomsbury Academic Healthy Technology Use
Book SynopsisBernadette H. Schell is a well-published professor in the human-computer interaction domain. She is a professor emerita in the Faculty of Management at Laurentian University and an adjunct professor in the Graduate Faculty of Business and IT at Ontario Tech University, both in Ontario, Canada.
£38.00
Nova Science Publishers Inc A Closer Look at Safety and Security
Book SynopsisThis compilation details the challenges in the development of computer systems more complexed by AI/IoT using examples based on systems thinking, as well as introduces how these technologies can aid in safety and security. The authors carry out a study to establish the safety and security challenges preventing parents from enrolling their young children in schools, with the intention of recommending strategies to address these challenges. This study is guided by the ecological systems theory which explains how factors within the environment influence children's development and education. The concluding section focuses on the system dynamics paradigm which seems to be a suitable modeling method to describe social engineering situations. Opportunities for future research are also discussed.Table of ContentsPreface; CC-Case: Safety & Security Engineering Methodology for AI/IoT; Safety and Security Challenges Preventing Parents from Enrolling Children in Early Years School in Difficult Circumstances; Safety, Security, and Social Engineering: Thoughts, Challenges and a Concept of Quantitative Risk Assessment; Index.
£67.99
Nova Science Publishers Inc Sedentary Behavior: Physiology, Health Risks &
Book SynopsisSedentary behaviours include activities at the lowest spectrum of energy expenditure such as lying down, sitting, watching television, using the computer and other media and screen-based past times. A habitual sedentary lifestyle has been associated with different health problems. This important book gathers current research from across the globe in the study and prevalence of physical inactivity, and evaluates the numerous health risks associated with sedentary behaviour. Some topics discussed herein include how a sedentary lifestyle can impact cognitive ability adversely; sedentary behaviours and cardiovascular risk factors for children and adolescents; childhood obesity prevention and management; exercise training; and the effects of sedentary behaviour on mood and insulin sensitivity.
£113.24
Infosechelp LLC Your Safety and Privacy Online: The CIA and NSA
Book Synopsis
£9.50
Business Science Reference Developing Safer Online Environments for
Book SynopsisAs the digital world assumes an ever-increasing role in the daily lives of the public, opportunities to engage in crimes increase as well. The prevention of cyber aggression is an ongoing challenge due to its multifaceted nature and the difficulties in realizing effective interventions. The consequences of cyber aggression can range from emotional and psychological distress to death by suicide or homicide. Enduring prevention programs need to be defined and take into consideration that the digital revolution changes the way and the meaning of interpersonal relationships.Developing Safer Online Environments for Children: Tools and Policies for Combatting Cyber Aggression explores the effects of cyberbullying and cyberstalking on children and examines solutions that can identify and prevent online harassment through both policy and legislation reform and technological tools. Highlighting a range of topics such as cyberbullying, fake profile identification, and victimization, this publication is an ideal reference source for policymakers, educators, principals, school counsellors, therapists, government officials, politicians, lawmakers, academicians, administrators, and researchers.
£178.50
Monash University Publishing Disconnect: Why We Get Pushed to Extremes Online
Book Synopsis
£17.99
Springer Nature Switzerland AG Introduction to Deep Learning for Healthcare
Book SynopsisThis textbook presents deep learning models and their healthcare applications. It focuses on rich health data and deep learning models that can effectively model health data. Healthcare data: Among all healthcare technologies, electronic health records (EHRs) had vast adoption and a significant impact on healthcare delivery in recent years. One crucial benefit of EHRs is to capture all the patient encounters with rich multi-modality data. Healthcare data include both structured and unstructured information. Structured data include various medical codes for diagnoses and procedures, lab results, and medication information. Unstructured data contain 1) clinical notes as text, 2) medical imaging data such as X-rays, echocardiogram, and magnetic resonance imaging (MRI), and 3) time-series data such as the electrocardiogram (ECG) and electroencephalogram (EEG). Beyond the data collected during clinical visits, patient self-generated/reported data start to grow thanks to wearable sensors’ increasing use. The authors present deep learning case studies on all data described.Deep learning models: Neural network models are a class of machine learning methods with a long history. Deep learning models are neural networks of many layers, which can extract multiple levels of features from raw data. Deep learning applied to healthcare is a natural and promising direction with many initial successes. The authors cover deep neural networks, convolutional neural networks, recurrent neural networks, embedding methods, autoencoders, attention models, graph neural networks, memory networks, and generative models. It’s presented with concrete healthcare case studies such as clinical predictive modeling, readmission prediction, phenotyping, x-ray classification, ECG diagnosis, sleep monitoring, automatic diagnosis coding from clinical notes, automatic deidentification, medication recommendation, drug discovery (drug property prediction and molecule generation), and clinical trial matching.This textbook targets graduate-level students focused on deep learning methods and their healthcare applications. It can be used for the concepts of deep learning and its applications as well. Researchers working in this field will also find this book to be extremely useful and valuable for their research.Table of ContentsContentsI IntroductionI.1 Who should read this book?I.2 Book organizationII Health DataII.1 The growth of EHR AdoptionII.2 Health DataII.2.1 Life cycle of health dataII.2.2 Structured Health DataII.2.3 Unstructured clinical notesII.2.4 Continuous signalsII.2.5 Medical Imaging DataII.2.6 Biomedical data for in silico drug Discovery II.3 Health Data StandardsIII Machine Learning BasicsIII.1 Supervised LearningIII.1.1 Logistic RegressionIII.1.2 Softmax RegressionIII.1.3 Gradient DescentIII.1.4 Stochastic and Minibatch Gradient DescentIII.2 Unsupervised LearningIII.2.1 Principal component analysisIII.2.2 t-distributed stochastic neighbor embedding (t-SNE)III.2.3 ClusteringIII.3 Assessing Model PerformanceIII.3.1 Evaluation Metrics for Regression TasksIII.3.2 Evaluation Metrics for Classification TasksIII.3.3 Evaluation Metrics for Clustering TasksIII.3.4 Evaluation StrategyIII.4 Modeling ExerciseIII.5 Hands-On Practice34 CONTENTSIVDeep Neural Networks (DNN)IV.1 A Single neuronIV.1.1 Activation functionIV.1.2 Loss FunctionIV.1.3 Train a single neuronIV.2 Multilayer Neural NetworkIV.2.1 Network RepresentationIV.2.2 Train a Multilayer Neural NetworkIV.2.3 Summary of the Backpropagation AlgorithmIV.2.4 Parameters and Hyper-parametersIV.3 Readmission Prediction from EHR Data with DNNIV.4 DNN for Drug Property PredictionV EmbeddingV.1 OverviewV.2 Word2VecV.2.1 Idea and Formulation of Word2VecV.2.2 Healthcare application of Word2VecV.3 Med2Vec: two-level embedding for EHRV.3.1 Med2Vec MethodV.4 MiME: Embed Internal StructureV.4.1 Notations of MIMEV.4.2 Description of MIMEV.4.3 Experiment results of MIMEVI Convolutional Neural Networks (CNN)VI.1 CNN intuitionVI.2 Architecture of CNNVI.2.1 Convolution layer - 1DVI.2.2 Convolution layer - 2DVI.2.3 Pooling LayerVI.2.4 Fully Connected LayerVI.3 Backpropagation Algorithm in CNN*VI.3.1 Forward and Backward Computation for 1-D DataVI.3.2 Forward Computation and Backpropagation for 2-D ConvolutionLayer . VI.3.3 Special CNN ArchitectureVI.4 Healthcare Applications VI.5 Automated surveillance of cranial images for acute neurologic eventsVI.6 Detection of Lymph Node Metastases from Pathology ImagesVI.7 Cardiologist-level arrhythmia detection and classification in ambulatoryECGCONTENTS 5VIIRecurrent Neural Networks (RNN)VII.1Basic Concepts and NotationsVII.2Backpropagation Through Time (BPTT) algorithmVII.2.1Forward PassVII.2.2 Backward PassVII.3RNN VariantsVII.3.1 Long Short-Term Memory (LSTM)VII.3.2 Gated Recurrent Unit (GRU)VII.3.3 Bidirectional RNNVII.3.4 Encoder-Decoder Sequence-to-Sequence ModelsVII.4Case Study: Early detection of heart failureVII.5Case Study: Sequential clinical event predictionVII.6Case Study: De-identification of Clinical NotesVII.7Case Study: Automatic Detection of Heart Disease from electrocardiography(ECG) DataVIIAIutoencoders (AE)VIII.1OverviewVIII.2AutoencodersVIII.3Sparse AutoencodersVIII.4Stacked AutoencodersVIII.5Denoising AutoencodersVIII.6Case Study: “Deep Patient” via stacked denoising autoencodersVIII.7Case Study: Learning from Noisy, Sparse, and Irregular ClinicaldataIX Attention ModelsIX.1 OverviewIX.2 Attention MechanismIX.2.1 Attention based on Encoder-Decoder RNN ModelsIX.2.2 Case Study: Attention Model over Longitudinal EHRIX.2.3 Case Study: Attention model over a Medical OntologyIX.2.4 Case Study: ICD Classification from Clinical NotesX Memory NetworksX.1 Original Memory NetworksX.2 End-to-end Memory NetworksX.3 Case Study: Medication RecommendationX.4 EEG-RelNet: Memory Derived from DataX.5 Incorporate Memory from Unstructured Knowledge BaseXIGraph Neural NetworksXI.1 OverviewXI.2 Graph Convolutional NetworksXI.2.1 Basic Setting of GCNXI.2.2 Spatial Convolution on Graphs6 CONTENTSXI.2.3 Spectral Convolution on GraphsXI.2.4 Approximate Graph ConvolutionXI.2.5 Neighborhood AggregationXI.3 Neural Fingerprinting: Drug Molecule Embedding with GCNXI.4 Decagon: Modeling Polypharmacy Side Effects with GCNXI.5 Case Study: Multiview Drug-drug Interaction PredictionXIIGenerative ModelsXII.1Generative adversarial networks (GAN)XII.1.1 The GAN FrameworkXII.1.2 The Cost Function of DiscriminatorXII.1.3 The Cost Function of GeneratorXII.2Variational Autoencoders (VAE)XII.2.1 Latent Variable ModelsXII.2.2Objective FormulationXII.2.3Objective ApproximationXII.2.4 Reparameterization TrickXII.3Case Study: Generating Patient RecordsXII.4Case Study: Small Molecule Generation for Drug DiscoveryXII CIonclusionXIII.1Model SetupXIII.2Model TrainingXIII.3Testing and Performance EvaluationXIII.4Result VisualizationXIII.5Case StudiesXIVAppendixXIV.1Regularization*XIV.1.1Vanishing or Exploding Gradient ProblemXIV.1.2DropoutXIV.1.3Batch normalizationXIV.2Stochastic Gradient Descent and Minibatch gradient descent*XIV.3Advanced optimization*XIV.3.1MomentumXIV.3.2Adagrad, Adadelta, and RMSpropXIV.3.3Adam
£49.49
Springer Nature Switzerland AG Functional Safety and Proof of Compliance
Book SynopsisThis book aims to facilitate and improve development work related to all documents and information required by functional safety standards. Proof of Compliance (PoC) is important for the assessor and certification bodies when called up to confirm that the manufacturer has developed a software system according to the required safety standards. While PoC documents add functionality to the product neither for the developer nor for the customer, they do add confidence and trust to the product and ease certification, and as such are important for the product’s value. In spite of this added value, the documentation needed for PoC is often developed late in the project and in a haphazard manner. This book aims at developers, assessors, certification bodies, and purchasers of safety instrumented systems and informs the reader about the most important PoC documents. A typical PoC documentation encompasses 50 to 200 documents, several of which are named in the safety standards (e.g., 82 documents in IEC 61508:2010 series, 101 documents in EN 5012X series and 106 work products in ISO 26262:2018 series). These documents also include further references, typically one to twenty of them, and the total number of pages developed by the manufacturer varies between 2000 and 10000 pages. The book provides guidance and examples what to include in the relevant plans and documents.Table of Contents1. The Introduction.- 2. Agile Practices.- 3. POC in Agile Development and for SMEs.- 4. Generic Documents.- 5. Plans and Functional safety Management.- 6. Safety Analysis Methods Applied to Software.- 7. Safety and Risk Documents.- 8. Software Documents.- 9. Test, Analysis and V&V.
£52.24
Springer Nature Switzerland AG Health Informatics on FHIR: How HL7's API is
Book SynopsisThis extensively revised textbook describes and defines the US healthcare delivery system, its many systemic challenges and the prior efforts to develop and deploy informatics tools to help overcome these problems. Now that electronic health record systems are widely deployed, the HL7 Fast Healthcare Interoperability standard is being rapidly accepted as the means to access and share the data stored in those systems and analytics is increasing being used to gain new knowledge from that aggregated clinical data, this book goes on to discuss health informatics from an historical perspective, its current state and likely future state. It then turns to some of the important and evolving areas of informatics including electronic healt\h records, clinical decision support,. population and public health, mHealth and analytics. Numerous use cases and case studies are employed in all of these discussions to help readers connect the technologies to real world challenges. Health Informatics on FHIR: How HL7's API is Transforming Healthcare is for introductory health informatics courses for health sciences students (e.g., doctors, nurses, PhDs), the current health informatics community, computer science and IT professionals interested in learning about the field and practicing healthcare providers. Though this textbook covers an important new technology, it is accessible to non-technical readers including healthcare providers, their patients or anyone interested in the use of healthcare data for improved care, public/population health or research. Table of ContentsA Brief History and Overview of Health Informatics.- The US Health care system.- Health Informatics in the Real World.- The Empowered Patient.- Health Information Exchange.- FHIR Applications in Payment.- Data and Interoperability Standards.- Pre-FHIR Interoperability and Decision Support Standards.- FHIR.- SMART on FHIR.- mHealth.- Public and Population Health.- Advanced FHIR Applications.
£44.99
Tapir Academic Press Design Guidelines for a Monitoring Environment
Book Synopsis
£26.55
BPB Publications Infrastructure Automation with Pulumi and
Book Synopsis
£31.34
Springer Verlag, Singapore Communication and Smart Technologies: Proceedings
Book SynopsisThis book features selected papers from the International Conference on Communication and Applied Technologies (ICOMTA 2021), jointly organized by Universidad del Rosario (Bogotá, Colombia); the University of Vigo (Galicia, Spain); the University of Santiago de Compostela-Equipo de Investigaciones Políticas (Galicia, Spain); the University of A Coruña (Galicia, Spain); and the Information and Technology Management Association (ITMA), during September 2021. It covers recent advances in the field of digital communication and processes digital social media, software, big data, data mining, and intelligent systems.Table of Contents
£189.99