The impact of handwriting difficulties on compositional quality in children with developmental coordination disorder
- Prunty, Mellissa, Barnett, Anna, Wilmut, Kate, Plumb, Mandy
- Authors: Prunty, Mellissa , Barnett, Anna , Wilmut, Kate , Plumb, Mandy
- Date: 2016
- Type: Text , Journal article
- Relation: British Journal of Occupational Therapy Vol. 79, no. 10 (2016), p. 591-597
- Full Text:
- Reviewed:
- Description: Introduction There is substantial evidence to support the relationship between transcription skills (handwriting and spelling) and compositional quality. For children with developmental coordination disorder, handwriting can be particularly challenging. While recent research has aimed to investigate their handwriting difficulties in more detail, the impact of transcription on their compositional quality has not previously been examined. The aim of this exploratory study was to examine compositional quality in children with developmental coordination disorder and to ascertain whether their transcription skills influence writing quality. Method Twenty-eight children with developmental coordination disorder participated in the study, with 28 typically developing age and gender matched controls. The children completed the free-writing' task from the detailed assessment of speed of handwriting tool, which was evaluated for compositional quality using the Wechsler objective language dimensions. Results The children with developmental coordination disorder performed significantly below their typically developing peers on five of the six Wechsler objective language dimensions items. They also had a higher percentage of misspelled words. Regression analyses indicated that the number of words produced per minute and the percentage of misspelled words explained 55% of the variance for compositional quality. Conclusion The handwriting difficulties so commonly reported in children with developmental coordination disorder have wider repercussions for the quality of written composition.
- Authors: Prunty, Mellissa , Barnett, Anna , Wilmut, Kate , Plumb, Mandy
- Date: 2016
- Type: Text , Journal article
- Relation: British Journal of Occupational Therapy Vol. 79, no. 10 (2016), p. 591-597
- Full Text:
- Reviewed:
- Description: Introduction There is substantial evidence to support the relationship between transcription skills (handwriting and spelling) and compositional quality. For children with developmental coordination disorder, handwriting can be particularly challenging. While recent research has aimed to investigate their handwriting difficulties in more detail, the impact of transcription on their compositional quality has not previously been examined. The aim of this exploratory study was to examine compositional quality in children with developmental coordination disorder and to ascertain whether their transcription skills influence writing quality. Method Twenty-eight children with developmental coordination disorder participated in the study, with 28 typically developing age and gender matched controls. The children completed the free-writing' task from the detailed assessment of speed of handwriting tool, which was evaluated for compositional quality using the Wechsler objective language dimensions. Results The children with developmental coordination disorder performed significantly below their typically developing peers on five of the six Wechsler objective language dimensions items. They also had a higher percentage of misspelled words. Regression analyses indicated that the number of words produced per minute and the percentage of misspelled words explained 55% of the variance for compositional quality. Conclusion The handwriting difficulties so commonly reported in children with developmental coordination disorder have wider repercussions for the quality of written composition.
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements
- Hassan, Md Rakib, Karmakar, Gour, Kamruzzaman, Joarder, Srinivasan, Bala
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2015
- Type: Text , Journal article
- Relation: Computer Networks Vol. 84, no. (2015), p. 17-31
- Full Text:
- Reviewed:
- Description: In the exclusive-use model of spectrum trading, cognitive radio devices or secondary users can buy spectrum resources from licensed users or primary users for a short or long period of time. Considering such spectrum access, a trading model is introduced where a buyer can select a set of candidate sellers based on their reputation and their offers in fulfilling its requirements, namely, offered signal quality, contract duration, coverage and bandwidth. Similarly, a seller can assess a buyer as a potential trading partner considering the buyer's reliability, which the seller can derive from the buyer's reputation and financial profile. In our scheme, seller reputation or buyer reliability can be either obtained from a reputation brokerage service, if one exists, or calculated using our model. Since in a competitive market, the price of a seller depends on that of other sellers, game theory is used to model the competition among multiple sellers. An optimization technique is used by a buyer to select the best seller(s) and optimize purchase to maximize its utility. This may result in buying from multiple sellers of certain amount of bandwidth from each, depending on price and meeting requirements and budget constraints. Stability of the model is analyzed and performance evaluation shows that it benefits sellers and buyers in terms of profit and throughput, respectively. © 2015 Elsevier B.V. All rights reserved.
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2015
- Type: Text , Journal article
- Relation: Computer Networks Vol. 84, no. (2015), p. 17-31
- Full Text:
- Reviewed:
- Description: In the exclusive-use model of spectrum trading, cognitive radio devices or secondary users can buy spectrum resources from licensed users or primary users for a short or long period of time. Considering such spectrum access, a trading model is introduced where a buyer can select a set of candidate sellers based on their reputation and their offers in fulfilling its requirements, namely, offered signal quality, contract duration, coverage and bandwidth. Similarly, a seller can assess a buyer as a potential trading partner considering the buyer's reliability, which the seller can derive from the buyer's reputation and financial profile. In our scheme, seller reputation or buyer reliability can be either obtained from a reputation brokerage service, if one exists, or calculated using our model. Since in a competitive market, the price of a seller depends on that of other sellers, game theory is used to model the competition among multiple sellers. An optimization technique is used by a buyer to select the best seller(s) and optimize purchase to maximize its utility. This may result in buying from multiple sellers of certain amount of bandwidth from each, depending on price and meeting requirements and budget constraints. Stability of the model is analyzed and performance evaluation shows that it benefits sellers and buyers in terms of profit and throughput, respectively. © 2015 Elsevier B.V. All rights reserved.
DRfit : A Java tool for the analysis of discrete data from multi-well plate assays
- Hofmann, Andreas, Preston, Sarah, Cross, Megan, Herath, Dilrukshi, Simon, Anne, Gasser, Robin
- Authors: Hofmann, Andreas , Preston, Sarah , Cross, Megan , Herath, Dilrukshi , Simon, Anne , Gasser, Robin
- Date: 2019
- Type: Text , Journal article
- Relation: BMC Bioinformatics Vol. 20, no. (2019), p. 1-6
- Full Text:
- Reviewed:
- Description: Background: Analyses of replicates in sets of discrete data, typically acquired in multi-well plate formats, is a recurring task in many contemporary areas in the Life Sciences. The availability of accessible cross-platform data analysis tools for such fundamental tasks in varied projects and environments is an important prerequisite to ensuring a reliable and timely turnaround as well as to provide practical analytical tools for student training. Results: We have developed an easy-to-use, interactive software tool for the analysis of multiple data sets comprising replicates of discrete bivariate data points. For each dataset, the software identifies the replicate data points from a defined matrix layout and calculates their means and standard errors. The averaged values are then automatically fitted using either a linear or a logistic dose response function. Conclusions: DRfit is a practical and convenient tool for the analysis of one or multiple sets of discrete data points acquired as replicates from multi-well plate assays. The design of the graphical user interface and the built-in analysis features make it a flexible and useful tool for a wide range of different assays.
- Authors: Hofmann, Andreas , Preston, Sarah , Cross, Megan , Herath, Dilrukshi , Simon, Anne , Gasser, Robin
- Date: 2019
- Type: Text , Journal article
- Relation: BMC Bioinformatics Vol. 20, no. (2019), p. 1-6
- Full Text:
- Reviewed:
- Description: Background: Analyses of replicates in sets of discrete data, typically acquired in multi-well plate formats, is a recurring task in many contemporary areas in the Life Sciences. The availability of accessible cross-platform data analysis tools for such fundamental tasks in varied projects and environments is an important prerequisite to ensuring a reliable and timely turnaround as well as to provide practical analytical tools for student training. Results: We have developed an easy-to-use, interactive software tool for the analysis of multiple data sets comprising replicates of discrete bivariate data points. For each dataset, the software identifies the replicate data points from a defined matrix layout and calculates their means and standard errors. The averaged values are then automatically fitted using either a linear or a logistic dose response function. Conclusions: DRfit is a practical and convenient tool for the analysis of one or multiple sets of discrete data points acquired as replicates from multi-well plate assays. The design of the graphical user interface and the built-in analysis features make it a flexible and useful tool for a wide range of different assays.
Simplifying and improving ant-based clustering
- Tan, Swee, Ting, Kaiming, Teng, Shyh
- Authors: Tan, Swee , Ting, Kaiming , Teng, Shyh
- Date: 2011
- Type: Text , Conference paper
- Relation: 11th International Conference on Computational Science, ICCS 2011; Singapore, Singapore; 1st-3rd June 2011, published in Procedia Computer Science Vol. 4, p. 46-55
- Full Text:
- Reviewed:
- Description: Ant-based clustering (ABC) is a data clustering approach inspired from cemetery formation activities observed in real ant colonies. Building upon the premise of collective intelligence, such an approach uses multiple ant-like agents and a mixture of heuristics, in order to create systems that are capable of clustering real-world data. Many recently proposed ABC systems have shown competitive results, but these systems are geared towards adding new heuristics, resulting in increasingly complex systems that are harder to understand and improve. In contrast to this direction, we demonstrate that a state-of-the-art ABC system can be systematically evaluated and then simplified. The streamlined model, which we call SABC, differs fundamentally from traditional ABC systems as it does not use the ant-colony and several key components. Yet, our empirical study shows that SABC performs more effectively and effciently than the state-of-the-art ABC system.
- Authors: Tan, Swee , Ting, Kaiming , Teng, Shyh
- Date: 2011
- Type: Text , Conference paper
- Relation: 11th International Conference on Computational Science, ICCS 2011; Singapore, Singapore; 1st-3rd June 2011, published in Procedia Computer Science Vol. 4, p. 46-55
- Full Text:
- Reviewed:
- Description: Ant-based clustering (ABC) is a data clustering approach inspired from cemetery formation activities observed in real ant colonies. Building upon the premise of collective intelligence, such an approach uses multiple ant-like agents and a mixture of heuristics, in order to create systems that are capable of clustering real-world data. Many recently proposed ABC systems have shown competitive results, but these systems are geared towards adding new heuristics, resulting in increasingly complex systems that are harder to understand and improve. In contrast to this direction, we demonstrate that a state-of-the-art ABC system can be systematically evaluated and then simplified. The streamlined model, which we call SABC, differs fundamentally from traditional ABC systems as it does not use the ant-colony and several key components. Yet, our empirical study shows that SABC performs more effectively and effciently than the state-of-the-art ABC system.
A method to improve transparency of electronic election process without identification
- Alamuti, Roghayeh, Barjini, Hassan, Khandelwal, Manoj, Jafarabad, Mohammad
- Authors: Alamuti, Roghayeh , Barjini, Hassan , Khandelwal, Manoj , Jafarabad, Mohammad
- Date: 2015
- Type: Text , Conference proceedings
- Full Text:
- Description: Transparency of bank accounts, nowadays, is an undeniable necessity, but no one denies that definite transparency throughout election process is not realized thus far in the world. This calls for fundamental changes in traditional electronic election methods. The new method must close the way for any complaints by the candidate as to the voting process as the public completely trusts in the voting mechanism. Synchronizing voting and votes counting improves the public's trust in the results of election. The proposed secure room-corridor of electronic voting employs election watchers and reports real time results of election along with observance of confidentiality of the votes. © 2015 The Authors.
- Authors: Alamuti, Roghayeh , Barjini, Hassan , Khandelwal, Manoj , Jafarabad, Mohammad
- Date: 2015
- Type: Text , Conference proceedings
- Full Text:
- Description: Transparency of bank accounts, nowadays, is an undeniable necessity, but no one denies that definite transparency throughout election process is not realized thus far in the world. This calls for fundamental changes in traditional electronic election methods. The new method must close the way for any complaints by the candidate as to the voting process as the public completely trusts in the voting mechanism. Synchronizing voting and votes counting improves the public's trust in the results of election. The proposed secure room-corridor of electronic voting employs election watchers and reports real time results of election along with observance of confidentiality of the votes. © 2015 The Authors.
Discrete state transition algorithm for unconstrained integer optimization problems
- Zhou, Xiaojun, Gao, David, Yang, Chunhua, Gui, Weihua
- Authors: Zhou, Xiaojun , Gao, David , Yang, Chunhua , Gui, Weihua
- Date: 2016
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 173, no. (2016), p. 864-874
- Full Text:
- Reviewed:
- Description: A recently new intelligent optimization algorithm called discrete state transition algorithm is considered in this study, for solving unconstrained integer optimization problems. Firstly, some key elements for discrete state transition algorithm are summarized to guide its well development. Several intelligent operators are designed for local exploitation and global exploration. Then, a dynamic adjustment strategy "risk and restoration in probability" is proposed to capture global solutions with high probability. Finally, numerical experiments are carried out to test the performance of the proposed algorithm compared with other heuristics, and they show that the similar intelligent operators can be applied to ranging from traveling salesman problem, boolean integer programming, to discrete value selection problem, which indicates the adaptability and flexibility of the proposed intelligent elements. (C) 2015 Elsevier B.V. All rights reserved.
- Authors: Zhou, Xiaojun , Gao, David , Yang, Chunhua , Gui, Weihua
- Date: 2016
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 173, no. (2016), p. 864-874
- Full Text:
- Reviewed:
- Description: A recently new intelligent optimization algorithm called discrete state transition algorithm is considered in this study, for solving unconstrained integer optimization problems. Firstly, some key elements for discrete state transition algorithm are summarized to guide its well development. Several intelligent operators are designed for local exploitation and global exploration. Then, a dynamic adjustment strategy "risk and restoration in probability" is proposed to capture global solutions with high probability. Finally, numerical experiments are carried out to test the performance of the proposed algorithm compared with other heuristics, and they show that the similar intelligent operators can be applied to ranging from traveling salesman problem, boolean integer programming, to discrete value selection problem, which indicates the adaptability and flexibility of the proposed intelligent elements. (C) 2015 Elsevier B.V. All rights reserved.
Steering approaches to Pareto-optimal multiobjective reinforcement learning
- Vamplew, Peter, Issabekov, Rustam, Dazeley, Richard, Foale, Cameron, Berry, Adam, Moore, Tim, Creighton, Douglas
- Authors: Vamplew, Peter , Issabekov, Rustam , Dazeley, Richard , Foale, Cameron , Berry, Adam , Moore, Tim , Creighton, Douglas
- Date: 2017
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 263, no. (2017), p. 26-38
- Full Text:
- Reviewed:
- Description: For reinforcement learning tasks with multiple objectives, it may be advantageous to learn stochastic or non-stationary policies. This paper investigates two novel algorithms for learning non-stationary policies which produce Pareto-optimal behaviour (w-steering and Q-steering), by extending prior work based on the concept of geometric steering. Empirical results demonstrate that both new algorithms offer substantial performance improvements over stationary deterministic policies, while Q-steering significantly outperforms w-steering when the agent has no information about recurrent states within the environment. It is further demonstrated that Q-steering can be used interactively by providing a human decision-maker with a visualisation of the Pareto front and allowing them to adjust the agent’s target point during learning. To demonstrate broader applicability, the use of Q-steering in combination with function approximation is also illustrated on a task involving control of local battery storage for a residential solar power system.
- Authors: Vamplew, Peter , Issabekov, Rustam , Dazeley, Richard , Foale, Cameron , Berry, Adam , Moore, Tim , Creighton, Douglas
- Date: 2017
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 263, no. (2017), p. 26-38
- Full Text:
- Reviewed:
- Description: For reinforcement learning tasks with multiple objectives, it may be advantageous to learn stochastic or non-stationary policies. This paper investigates two novel algorithms for learning non-stationary policies which produce Pareto-optimal behaviour (w-steering and Q-steering), by extending prior work based on the concept of geometric steering. Empirical results demonstrate that both new algorithms offer substantial performance improvements over stationary deterministic policies, while Q-steering significantly outperforms w-steering when the agent has no information about recurrent states within the environment. It is further demonstrated that Q-steering can be used interactively by providing a human decision-maker with a visualisation of the Pareto front and allowing them to adjust the agent’s target point during learning. To demonstrate broader applicability, the use of Q-steering in combination with function approximation is also illustrated on a task involving control of local battery storage for a residential solar power system.
Multi-agent systems in ICT enabled smart grid : A status update on technology framework and applications
- Shawon, Mohammad, Muyeen, S., Ghosh, Arindam, Islam, Syed, Baptista, Murilo
- Authors: Shawon, Mohammad , Muyeen, S. , Ghosh, Arindam , Islam, Syed , Baptista, Murilo
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 97959-97973
- Full Text:
- Reviewed:
- Description: Multi-agent-based smart grid applications have gained much attention in recent times. At the same time, information and communication technology (ICT) has become a crucial part of the smart grid infrastructure. The key intention of this work is to present a comprehensive review of the literature and technological frameworks for the application of multi-agent system (MAS) and ICT infrastructure usages in smart grid implementations. In the smart grid, agents are defined as intelligent entities with the ability to take decisions and acting flexibly and autonomously according to their built-in intelligence utilizing previous experiences. Whereas, ICT enables conventional grid turned into the smart grid through data and information exchange. This paper summarizes the multi-agent concept of smart grid highlighting their applications through a detailed and extensive literature survey on the related topics. In addition to the above, a particular focus has been put on the ICT standards, including IEC 61850 incorporating ICT with MAS. Finally, a laboratory framework concepts have been added highlighting the implementation of IEC 61850.
- Authors: Shawon, Mohammad , Muyeen, S. , Ghosh, Arindam , Islam, Syed , Baptista, Murilo
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 97959-97973
- Full Text:
- Reviewed:
- Description: Multi-agent-based smart grid applications have gained much attention in recent times. At the same time, information and communication technology (ICT) has become a crucial part of the smart grid infrastructure. The key intention of this work is to present a comprehensive review of the literature and technological frameworks for the application of multi-agent system (MAS) and ICT infrastructure usages in smart grid implementations. In the smart grid, agents are defined as intelligent entities with the ability to take decisions and acting flexibly and autonomously according to their built-in intelligence utilizing previous experiences. Whereas, ICT enables conventional grid turned into the smart grid through data and information exchange. This paper summarizes the multi-agent concept of smart grid highlighting their applications through a detailed and extensive literature survey on the related topics. In addition to the above, a particular focus has been put on the ICT standards, including IEC 61850 incorporating ICT with MAS. Finally, a laboratory framework concepts have been added highlighting the implementation of IEC 61850.
A multilevel longitudinal study of experiencing virtual presence in adolescence : The role of anxiety and openness to experience in the classroom
- Stavropoulos, Vasileios, Wilson, Peter, Kuss, Daria, Griffiths, Mark, Gentile, Douglas
- Authors: Stavropoulos, Vasileios , Wilson, Peter , Kuss, Daria , Griffiths, Mark , Gentile, Douglas
- Date: 2017
- Type: Text , Journal article
- Relation: Behaviour & Information Technology Vol. 36, no. 5 (2017), p. 524-539
- Full Text:
- Reviewed:
- Description: Presence describes the feeling of reality and immersion that users of virtual/Internet environments have. Importantly, it has been suggested that there are individual and contextual differences regarding susceptibility to presence. These aspects of presence have been linked to both beneficial and disadvantageous uses of the Internet, such as online therapeutic applications and addictive Internet behaviours. In the present study, presence was studied in relation to individual anxiety symptoms and classroom-level openness to experience (OTE) using a normative sample of 648 adolescents aged between 16 and 18 years. Presence was assessed with the Presence II questionnaire, anxiety symptoms with the relevant subscales of the SCL-90-R, and OTE with the Five-Factor Questionnaire. A three-level hierarchical linear model was calculated. Results showed that experiencing presence in virtual environments dropped between the ages of 16 and 18 years. Additionally, although anxiety symptoms were associated with higher presence at 16 years, this association decreased with age. Results also demonstrated that adolescents in classrooms higher on OTE reported reduced level of experiencing presence. The practical and theoretical implications of these findings are discussed.
- Authors: Stavropoulos, Vasileios , Wilson, Peter , Kuss, Daria , Griffiths, Mark , Gentile, Douglas
- Date: 2017
- Type: Text , Journal article
- Relation: Behaviour & Information Technology Vol. 36, no. 5 (2017), p. 524-539
- Full Text:
- Reviewed:
- Description: Presence describes the feeling of reality and immersion that users of virtual/Internet environments have. Importantly, it has been suggested that there are individual and contextual differences regarding susceptibility to presence. These aspects of presence have been linked to both beneficial and disadvantageous uses of the Internet, such as online therapeutic applications and addictive Internet behaviours. In the present study, presence was studied in relation to individual anxiety symptoms and classroom-level openness to experience (OTE) using a normative sample of 648 adolescents aged between 16 and 18 years. Presence was assessed with the Presence II questionnaire, anxiety symptoms with the relevant subscales of the SCL-90-R, and OTE with the Five-Factor Questionnaire. A three-level hierarchical linear model was calculated. Results showed that experiencing presence in virtual environments dropped between the ages of 16 and 18 years. Additionally, although anxiety symptoms were associated with higher presence at 16 years, this association decreased with age. Results also demonstrated that adolescents in classrooms higher on OTE reported reduced level of experiencing presence. The practical and theoretical implications of these findings are discussed.
Collecting health and exposure data in Australian olympic combat sports : Feasibility study utilizing an electronic system
- Bromley, Sally, Drew, Michael, Talpey, Scott, McIntosh, Andrew, Finch, Caroline
- Authors: Bromley, Sally , Drew, Michael , Talpey, Scott , McIntosh, Andrew , Finch, Caroline
- Date: 2018
- Type: Text , Journal article
- Relation: Journal of Medical Internet Research Vol. 20, no. 10 (2018), p. 1-11
- Full Text:
- Reviewed:
- Description: Background: Electronic methods are increasingly being used to manage health-related data among sporting populations. Collection of such data permits the analysis of injury and illness trends, improves early detection of injuries and illnesses, collectively referred to as health problems, and provides evidence to inform prevention strategies. The Athlete Management System (AMS) has been employed across a range of sports to monitor health. Australian combat athletes train across the country without dedicated national medical or sports science teams to monitor and advocate for their health. Employing a Web-based system, such as the AMS, May provide an avenue to increase the visibility of health problems experienced by combat athletes and deliver key information to stakeholders detailing where prevention programs May be targeted. Objective: The objectives of this paper are to (1) report on the feasibility of utilizing the AMS to collect longitudinal injury and illness data of combat sports athletes and (2) describe the type, location, severity, and recurrence of injuries and illnesses that the cohort of athletes experience across a 12-week period. Methods: We invited 26 elite and developing athletes from 4 Olympic combat sports (boxing, judo, taekwondo, and wrestling) to participate in this study. Engagement with the AMS was measured, and collected health problems (injuries or illnesses) were coded using the Orchard Sports Injury Classification System (version 10.1) and International Classification of Primary Care (version 2). Results: Despite >160 contacts, athlete engagement with online tools was poor, with only 13% compliance across the 12-week period. No taekwondo or wrestling athletes were compliant. Despite low overall engagement, a large number of injuries or illness were recorded across 11 athletes who entered data—22 unique injuries, 8 unique illnesses, 30 recurrent injuries, and 2 recurrent illnesses. The most frequent injuries were to the knee in boxing (n=41) and thigh in judo (n=9). In this cohort, judo players experienced more severe, but less frequent, injuries than boxers, yet judo players sustained more illnesses than boxers. In 97.0% (126/130) of cases, athletes in this cohort continued to train irrespective of their health problems. Conclusions: Among athletes who reported injuries, many reported multiple conditions, indicating a need for health monitoring in Australian combat sports. A number of factors May have influenced engagement with the AMS, including access to the internet, the design of the system, coach views on the system, previous experiences with the system, and the existing culture within Australian combat sports. To increase engagement, there May be a requirement for sports staff to provide relevant feedback on data entered into the system. Until the Barriers are addressed, it is not feasible to implement the system in its current form across a larger cohort of combat athletes.
- Authors: Bromley, Sally , Drew, Michael , Talpey, Scott , McIntosh, Andrew , Finch, Caroline
- Date: 2018
- Type: Text , Journal article
- Relation: Journal of Medical Internet Research Vol. 20, no. 10 (2018), p. 1-11
- Full Text:
- Reviewed:
- Description: Background: Electronic methods are increasingly being used to manage health-related data among sporting populations. Collection of such data permits the analysis of injury and illness trends, improves early detection of injuries and illnesses, collectively referred to as health problems, and provides evidence to inform prevention strategies. The Athlete Management System (AMS) has been employed across a range of sports to monitor health. Australian combat athletes train across the country without dedicated national medical or sports science teams to monitor and advocate for their health. Employing a Web-based system, such as the AMS, May provide an avenue to increase the visibility of health problems experienced by combat athletes and deliver key information to stakeholders detailing where prevention programs May be targeted. Objective: The objectives of this paper are to (1) report on the feasibility of utilizing the AMS to collect longitudinal injury and illness data of combat sports athletes and (2) describe the type, location, severity, and recurrence of injuries and illnesses that the cohort of athletes experience across a 12-week period. Methods: We invited 26 elite and developing athletes from 4 Olympic combat sports (boxing, judo, taekwondo, and wrestling) to participate in this study. Engagement with the AMS was measured, and collected health problems (injuries or illnesses) were coded using the Orchard Sports Injury Classification System (version 10.1) and International Classification of Primary Care (version 2). Results: Despite >160 contacts, athlete engagement with online tools was poor, with only 13% compliance across the 12-week period. No taekwondo or wrestling athletes were compliant. Despite low overall engagement, a large number of injuries or illness were recorded across 11 athletes who entered data—22 unique injuries, 8 unique illnesses, 30 recurrent injuries, and 2 recurrent illnesses. The most frequent injuries were to the knee in boxing (n=41) and thigh in judo (n=9). In this cohort, judo players experienced more severe, but less frequent, injuries than boxers, yet judo players sustained more illnesses than boxers. In 97.0% (126/130) of cases, athletes in this cohort continued to train irrespective of their health problems. Conclusions: Among athletes who reported injuries, many reported multiple conditions, indicating a need for health monitoring in Australian combat sports. A number of factors May have influenced engagement with the AMS, including access to the internet, the design of the system, coach views on the system, previous experiences with the system, and the existing culture within Australian combat sports. To increase engagement, there May be a requirement for sports staff to provide relevant feedback on data entered into the system. Until the Barriers are addressed, it is not feasible to implement the system in its current form across a larger cohort of combat athletes.
Non-functional regression : A new challenge for neural networks
- Vamplew, Peter, Dazeley, Richard, Foale, Cameron, Choudhury, Tanveer
- Authors: Vamplew, Peter , Dazeley, Richard , Foale, Cameron , Choudhury, Tanveer
- Date: 2018
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 314, no. (2018), p. 326-335
- Full Text:
- Reviewed:
- Description: This work identifies an important, previously unaddressed issue for regression based on neural networks – learning to accurately approximate problems where the output is not a function of the input (i.e. where the number of outputs required varies across input space). Such non-functional regression problems arise in a number of applications, and can not be adequately handled by existing neural network algorithms. To demonstrate the benefits possible from directly addressing non-functional regression, this paper proposes the first neural algorithm to do so – an extension of the Resource Allocating Network (RAN) which adds additional output neurons to the network structure during training. This new algorithm, called the Resource Allocating Network with Varying Output Cardinality (RANVOC), is demonstrated to be capable of learning to perform non-functional regression, on both artificially constructed data and also on the real-world task of specifying parameter settings for a plasma-spray process. Importantly RANVOC is shown to outperform not just the original RAN algorithm, but also the best possible error rates achievable by any functional form of regression.
- Authors: Vamplew, Peter , Dazeley, Richard , Foale, Cameron , Choudhury, Tanveer
- Date: 2018
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 314, no. (2018), p. 326-335
- Full Text:
- Reviewed:
- Description: This work identifies an important, previously unaddressed issue for regression based on neural networks – learning to accurately approximate problems where the output is not a function of the input (i.e. where the number of outputs required varies across input space). Such non-functional regression problems arise in a number of applications, and can not be adequately handled by existing neural network algorithms. To demonstrate the benefits possible from directly addressing non-functional regression, this paper proposes the first neural algorithm to do so – an extension of the Resource Allocating Network (RAN) which adds additional output neurons to the network structure during training. This new algorithm, called the Resource Allocating Network with Varying Output Cardinality (RANVOC), is demonstrated to be capable of learning to perform non-functional regression, on both artificially constructed data and also on the real-world task of specifying parameter settings for a plasma-spray process. Importantly RANVOC is shown to outperform not just the original RAN algorithm, but also the best possible error rates achievable by any functional form of regression.
Diagnosing transformer winding deformation faults based on the analysis of binary image obtained from FRA signature
- Zhao, Zhongyong, Yao, Chenguo, Tang, Chao, Li, Chengxiang, Yan, Fayou, Islam, Syed
- Authors: Zhao, Zhongyong , Yao, Chenguo , Tang, Chao , Li, Chengxiang , Yan, Fayou , Islam, Syed
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 40463-40474
- Full Text:
- Reviewed:
- Description: Frequency response analysis (FRA) has been widely accepted as a diagnostic tool for power transformer winding deformation faults. Typically, both amplitude-frequency and phase-frequency signatures are obtained by an FRA analyzer. However, most existing FRA analyzers use only the information on amplitude-frequency signature, while phase-frequency information is neglected. It is also found that in some cases, the diagnostic results obtained by FRA amplitude-frequency signatures do not comply with some hard evidence. This paper introduces a winding deformation diagnostic method based on the analysis of binary images obtained from FRA signatures to improve FRA outcomes. The digital image processing technique is used to process the binary image and obtain a diagnostic indicator, to arrive at an outcome for interpreting winding faults with improved accuracy.
- Authors: Zhao, Zhongyong , Yao, Chenguo , Tang, Chao , Li, Chengxiang , Yan, Fayou , Islam, Syed
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 40463-40474
- Full Text:
- Reviewed:
- Description: Frequency response analysis (FRA) has been widely accepted as a diagnostic tool for power transformer winding deformation faults. Typically, both amplitude-frequency and phase-frequency signatures are obtained by an FRA analyzer. However, most existing FRA analyzers use only the information on amplitude-frequency signature, while phase-frequency information is neglected. It is also found that in some cases, the diagnostic results obtained by FRA amplitude-frequency signatures do not comply with some hard evidence. This paper introduces a winding deformation diagnostic method based on the analysis of binary images obtained from FRA signatures to improve FRA outcomes. The digital image processing technique is used to process the binary image and obtain a diagnostic indicator, to arrive at an outcome for interpreting winding faults with improved accuracy.
Data-Driven System Reliability and Failure Behavior Modeling Using FMECA
- Khorshidi, Hadi, Gunawan, Indra, Ibrahim, Yousef
- Authors: Khorshidi, Hadi , Gunawan, Indra , Ibrahim, Yousef
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 12, no. 3 (2016), p. 1253-1260
- Full Text:
- Reviewed:
- Description: System reliability modeling needs a large amount of data to estimate the parameters. In addition, reliability estimation is associated with uncertainty. This paper aims to propose a new method to evaluate the failure behavior and reliability of a large system using failure modes, effects, and criticality analysis (FMECA). Therefore, qualitative data based on the judgment of experts are used when data are not sufficient. The subjective data of failure modes and causes have been aggregated through the system to develop an overall failure index (OFI). This index not only represents the system reliability behavior, but also prioritizes corrective actions based on improvements in system failure. In addition, two optimization models are presented to select optimal actions subject to budget constraint. The associated costs of each corrective action are considered in risk evaluation. Finally, a case study of a manufacturing line is introduced to verify the applicability of the proposed method in industrial environments. The proposed method is compared with conventional FMECA approach. It is shown that the proposed method has a better performance in risk assessment. A sensitivity analysis is provided on the budget amount and the results are discussed. © 2015 IEEE.
- Authors: Khorshidi, Hadi , Gunawan, Indra , Ibrahim, Yousef
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 12, no. 3 (2016), p. 1253-1260
- Full Text:
- Reviewed:
- Description: System reliability modeling needs a large amount of data to estimate the parameters. In addition, reliability estimation is associated with uncertainty. This paper aims to propose a new method to evaluate the failure behavior and reliability of a large system using failure modes, effects, and criticality analysis (FMECA). Therefore, qualitative data based on the judgment of experts are used when data are not sufficient. The subjective data of failure modes and causes have been aggregated through the system to develop an overall failure index (OFI). This index not only represents the system reliability behavior, but also prioritizes corrective actions based on improvements in system failure. In addition, two optimization models are presented to select optimal actions subject to budget constraint. The associated costs of each corrective action are considered in risk evaluation. Finally, a case study of a manufacturing line is introduced to verify the applicability of the proposed method in industrial environments. The proposed method is compared with conventional FMECA approach. It is shown that the proposed method has a better performance in risk assessment. A sensitivity analysis is provided on the budget amount and the results are discussed. © 2015 IEEE.
A new cascaded multilevel inverter topology with galvanic isolation
- Hasan, Mubashwar, Abu-Siada, Ahmed, Islam, Syed, Dahidah, Mohamed
- Authors: Hasan, Mubashwar , Abu-Siada, Ahmed , Islam, Syed , Dahidah, Mohamed
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Transactions on Industry Applications Vol. 54, no. 4 (2018), p. 3463-3472
- Full Text:
- Reviewed:
- Description: IEEE This paper presents a new compact three-phase cascaded multilevel inverter (CMLI) topology with reduced device count and high frequency magnetic link. The proposed topology overcomes the predominant limitation of separate DC power supplies, which CMLI always require. The high frequency magnetic link also provides a galvanic isolation between the input and output sides of the inverter, which is essential for various grid-connected applications. The proposed topology utilizes an asymmetric inverter configuration that consists of cascaded H-bridge cells and a conventional three-phase two-level inverter. A toroidal core is employed for the high frequency magnetic link to ensure compact size and high-power density. Compared with counterpart CMLI topologies available in the literatures, the proposed inverter has the advantage of utilizing the least number of power electronic components without compromising the overall performance, particularly when a high number of output voltage levels is required. The feasibility of the proposed inverter is confirmed through extensive simulation and experimentally validated studies.
- Authors: Hasan, Mubashwar , Abu-Siada, Ahmed , Islam, Syed , Dahidah, Mohamed
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Transactions on Industry Applications Vol. 54, no. 4 (2018), p. 3463-3472
- Full Text:
- Reviewed:
- Description: IEEE This paper presents a new compact three-phase cascaded multilevel inverter (CMLI) topology with reduced device count and high frequency magnetic link. The proposed topology overcomes the predominant limitation of separate DC power supplies, which CMLI always require. The high frequency magnetic link also provides a galvanic isolation between the input and output sides of the inverter, which is essential for various grid-connected applications. The proposed topology utilizes an asymmetric inverter configuration that consists of cascaded H-bridge cells and a conventional three-phase two-level inverter. A toroidal core is employed for the high frequency magnetic link to ensure compact size and high-power density. Compared with counterpart CMLI topologies available in the literatures, the proposed inverter has the advantage of utilizing the least number of power electronic components without compromising the overall performance, particularly when a high number of output voltage levels is required. The feasibility of the proposed inverter is confirmed through extensive simulation and experimentally validated studies.
Continuous patient monitoring with a patient centric agent : A block architecture
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 32700-32726
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including continuous remote patient monitoring (RPM). However, the complexity of RPM architectures, the size of data sets generated and limited power capacity of devices make RPM challenging. In this paper, we propose a tier-based End to End architecture for continuous patient monitoring that has a patient centric agent (PCA) as its center piece. The PCA manages a blockchain component to preserve privacy when data streaming from body area sensors needs to be stored securely. The PCA based architecture includes a lightweight communication protocol to enforce security of data through different segments of a continuous, real time patient monitoring architecture. The architecture includes the insertion of data into a personal blockchain to facilitate data sharing amongst healthcare professionals and integration into electronic health records while ensuring privacy is maintained. The blockchain is customized for RPM with modifications that include having the PCA select a Miner to reduce computational effort, enabling the PCA to manage multiple blockchains for the same patient, and the modification of each block with a prefix tree to minimize energy consumption and incorporate secure transaction payments. Simulation results demonstrate that security and privacy can be enhanced in RPM with the PCA based End to End architecture.
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 32700-32726
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including continuous remote patient monitoring (RPM). However, the complexity of RPM architectures, the size of data sets generated and limited power capacity of devices make RPM challenging. In this paper, we propose a tier-based End to End architecture for continuous patient monitoring that has a patient centric agent (PCA) as its center piece. The PCA manages a blockchain component to preserve privacy when data streaming from body area sensors needs to be stored securely. The PCA based architecture includes a lightweight communication protocol to enforce security of data through different segments of a continuous, real time patient monitoring architecture. The architecture includes the insertion of data into a personal blockchain to facilitate data sharing amongst healthcare professionals and integration into electronic health records while ensuring privacy is maintained. The blockchain is customized for RPM with modifications that include having the PCA select a Miner to reduce computational effort, enabling the PCA to manage multiple blockchains for the same patient, and the modification of each block with a prefix tree to minimize energy consumption and incorporate secure transaction payments. Simulation results demonstrate that security and privacy can be enhanced in RPM with the PCA based End to End architecture.
Adaptive weighted non-parametric background model for efficient video coding
- Chakraborty, Subrata, Paul, Manoranjan, Murshed, Manzur, Ali, Mortuza
- Authors: Chakraborty, Subrata , Paul, Manoranjan , Murshed, Manzur , Ali, Mortuza
- Date: 2017
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 226, no. (2017), p. 35-45
- Full Text:
- Reviewed:
- Description: Dynamic background frame based video coding using mixture of Gaussian (MoG) based background modelling has achieved better rate distortion performance compared to the H.264 standard. However, they suffer from high computation time, low coding efficiency for dynamic videos, and prior knowledge requirement of video content. In this paper, we introduce the application of the non-parametric (NP) background modelling approach for video coding domain. We present a novel background modelling technique, called weighted non-parametric (WNP) which balances the historical trend and the recent value of the pixel intensities adaptively based on the content and characteristics of any particular video. WNP is successfully embedded into the latest HEVC video coding standard for better rate-distortion performance. Moreover, a novel scene adaptive non-parametric (SANP) technique is also developed to handle video sequences with high dynamic background. Being non-parametric, the proposed techniques naturally exhibit superior performance in dynamic background modelling without a priori knowledge of video data distribution.
- Authors: Chakraborty, Subrata , Paul, Manoranjan , Murshed, Manzur , Ali, Mortuza
- Date: 2017
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 226, no. (2017), p. 35-45
- Full Text:
- Reviewed:
- Description: Dynamic background frame based video coding using mixture of Gaussian (MoG) based background modelling has achieved better rate distortion performance compared to the H.264 standard. However, they suffer from high computation time, low coding efficiency for dynamic videos, and prior knowledge requirement of video content. In this paper, we introduce the application of the non-parametric (NP) background modelling approach for video coding domain. We present a novel background modelling technique, called weighted non-parametric (WNP) which balances the historical trend and the recent value of the pixel intensities adaptively based on the content and characteristics of any particular video. WNP is successfully embedded into the latest HEVC video coding standard for better rate-distortion performance. Moreover, a novel scene adaptive non-parametric (SANP) technique is also developed to handle video sequences with high dynamic background. Being non-parametric, the proposed techniques naturally exhibit superior performance in dynamic background modelling without a priori knowledge of video data distribution.
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 11, no. 2 (2016), p. 235-246
- Full Text:
- Reviewed:
- Description: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosenplaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size M × N and with L different color intensities, the number n of required chosen plain-images to break the permutation-only image encryption algorithm is n = logL(MN). The complexity of the proposed attack is O (n · M N) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-theart cryptanalytic methods.
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 11, no. 2 (2016), p. 235-246
- Full Text:
- Reviewed:
- Description: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosenplaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size M × N and with L different color intensities, the number n of required chosen plain-images to break the permutation-only image encryption algorithm is n = logL(MN). The complexity of the proposed attack is O (n · M N) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-theart cryptanalytic methods.
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference paper
- Relation: 14th Annual International Conference on Computational Science, ICCS 2014; Cairns, Australia; 10th-12th June 2014; published in Procedia Computer Science p. 124-133
- Full Text:
- Reviewed:
- Description: WSNs generate huge amount of data in the form of streams and mining useful knowledge from these streams is a challenging task. Existing works generate sensor association rules using occurrence frequency of patterns with binary frequency (either absent or present) or support of a pattern as a criterion. However, considering the binary frequency or support of a pattern may not be a sufficient indicator for finding meaningful patterns from WSN data because it only reflects the number of epochs in the sensor data which contain that pattern. The share measure of sensorsets could discover useful knowledge about numerical values associated with sensor in a sensor database. Therefore, in this paper, we propose a new type of behavioral pattern called share-frequent sensor patterns by considering the non-binary frequency values of sensors in epochs. To discover share-frequent sensor patterns from sensor dataset, we propose a novel parallel technique. In this technique, we develop a novel tree structure, called parallel share-frequent sensor pattern tree (PShrFSP-tree) that is constructed at each local node independently, by capturing the database contents to generate the candidate patterns using a pattern growth technique with a single scan and then merges the locally generated candidate patterns at the final stage to generate global share-frequent sensor patterns. Comprehensive experimental results show that our proposed model is very efficient for mining share-frequent patterns from WSN data in terms of time and scalability.
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference paper
- Relation: 14th Annual International Conference on Computational Science, ICCS 2014; Cairns, Australia; 10th-12th June 2014; published in Procedia Computer Science p. 124-133
- Full Text:
- Reviewed:
- Description: WSNs generate huge amount of data in the form of streams and mining useful knowledge from these streams is a challenging task. Existing works generate sensor association rules using occurrence frequency of patterns with binary frequency (either absent or present) or support of a pattern as a criterion. However, considering the binary frequency or support of a pattern may not be a sufficient indicator for finding meaningful patterns from WSN data because it only reflects the number of epochs in the sensor data which contain that pattern. The share measure of sensorsets could discover useful knowledge about numerical values associated with sensor in a sensor database. Therefore, in this paper, we propose a new type of behavioral pattern called share-frequent sensor patterns by considering the non-binary frequency values of sensors in epochs. To discover share-frequent sensor patterns from sensor dataset, we propose a novel parallel technique. In this technique, we develop a novel tree structure, called parallel share-frequent sensor pattern tree (PShrFSP-tree) that is constructed at each local node independently, by capturing the database contents to generate the candidate patterns using a pattern growth technique with a single scan and then merges the locally generated candidate patterns at the final stage to generate global share-frequent sensor patterns. Comprehensive experimental results show that our proposed model is very efficient for mining share-frequent patterns from WSN data in terms of time and scalability.
The diagnostic validity and reliability of an internet-based clinical assessment program for mental disorders
- Nguyen, David, Klein, Britt, Meyer, Denny, Austin, David, Abbott, Jo-Anne
- Authors: Nguyen, David , Klein, Britt , Meyer, Denny , Austin, David , Abbott, Jo-Anne
- Date: 2015
- Type: Text , Journal article
- Relation: Journal of Medical Internet Research Vol. 17, no. 9 (2015), p.
- Full Text:
- Reviewed:
- Description: Background: Internet-based assessment has the potential to assist with the diagnosis of mental health disorders and overcome the barriers associated with traditional services (eg, cost, stigma, distance). Further to existing online screening programs available, there is an opportunity to deliver more comprehensive and accurate diagnostic tools to supplement the assessment and treatment of mental health disorders. Objective: The aim was to evaluate the diagnostic criterion validity and test-retest reliability of the electronic Psychological Assessment System (e-PASS), an online, self-report, multidisorder, clinical assessment and referral system. Methods: Participants were 616 adults residing in Australia, recruited online, and representing prospective e-PASS users. Following e-PASS completion, 158 participants underwent a telephone-administered structured clinical interview and 39 participants repeated the e-PASS within 25 days of initial completion. Results: With structured clinical interview results serving as the gold standard, diagnostic agreement with the e-PASS varied considerably from fair (eg, generalized anxiety disorder:kappa=.37) to strong (eg, panic disorder:kappa=.62). Although the e-PASS' sensitivity also varied (0.43-0.86) the specificity was generally high (0.68-1.00). The e-PASS sensitivity generally improved when reducing the e-PASS threshold to a subclinical result. Test-retest reliability ranged from moderate (eg, specific phobia:kappa=.54) to substantial (eg, bulimia nervosa:kappa=.87). Conclusions: The e-PASS produces reliable diagnostic results and performs generally well in excluding mental disorders, although at the expense of sensitivity. For screening purposes, the e-PASS subclinical result generally appears better than a clinical result as a diagnostic indicator. Further development and evaluation is needed to support the use of online diagnostic assessment programs for mental disorders.
- Authors: Nguyen, David , Klein, Britt , Meyer, Denny , Austin, David , Abbott, Jo-Anne
- Date: 2015
- Type: Text , Journal article
- Relation: Journal of Medical Internet Research Vol. 17, no. 9 (2015), p.
- Full Text:
- Reviewed:
- Description: Background: Internet-based assessment has the potential to assist with the diagnosis of mental health disorders and overcome the barriers associated with traditional services (eg, cost, stigma, distance). Further to existing online screening programs available, there is an opportunity to deliver more comprehensive and accurate diagnostic tools to supplement the assessment and treatment of mental health disorders. Objective: The aim was to evaluate the diagnostic criterion validity and test-retest reliability of the electronic Psychological Assessment System (e-PASS), an online, self-report, multidisorder, clinical assessment and referral system. Methods: Participants were 616 adults residing in Australia, recruited online, and representing prospective e-PASS users. Following e-PASS completion, 158 participants underwent a telephone-administered structured clinical interview and 39 participants repeated the e-PASS within 25 days of initial completion. Results: With structured clinical interview results serving as the gold standard, diagnostic agreement with the e-PASS varied considerably from fair (eg, generalized anxiety disorder:kappa=.37) to strong (eg, panic disorder:kappa=.62). Although the e-PASS' sensitivity also varied (0.43-0.86) the specificity was generally high (0.68-1.00). The e-PASS sensitivity generally improved when reducing the e-PASS threshold to a subclinical result. Test-retest reliability ranged from moderate (eg, specific phobia:kappa=.54) to substantial (eg, bulimia nervosa:kappa=.87). Conclusions: The e-PASS produces reliable diagnostic results and performs generally well in excluding mental disorders, although at the expense of sensitivity. For screening purposes, the e-PASS subclinical result generally appears better than a clinical result as a diagnostic indicator. Further development and evaluation is needed to support the use of online diagnostic assessment programs for mental disorders.
Comorbidity structure of psychological disorders in the online e-PASS data as predictors of psychosocial adjustment measures: psychological distress, adequate social support, self-confidence, quality of life, and suicidal ideation
- Al-Asadi, Ali, Klein, Britt, Meyer, Denny
- Authors: Al-Asadi, Ali , Klein, Britt , Meyer, Denny
- Date: 2014
- Type: Text , Journal article
- Relation: Journal of Medical Internet Research Vol. 16, no. 10 (2014), p. e248
- Full Text:
- Reviewed:
- Description: BACKGROUND: A relative newcomer to the field of psychology, e-mental health has been gaining momentum and has been given considerable research attention. Although several aspects of e-mental health have been studied, 1 aspect has yet to receive attention: the structure of comorbidity of psychological disorders and their relationships with measures of psychosocial adjustment including suicidal ideation in online samples. OBJECTIVE: This exploratory study attempted to identify the structure of comorbidity of 21 psychological disorders assessed by an automated online electronic psychological assessment screening system (e-PASS). The resulting comorbidity factor scores were then used to assess the association between comorbidity factor scores and measures of psychosocial adjustments (ie, psychological distress, suicidal ideation, adequate social support, self-confidence in dealing with mental health issues, and quality of life). METHODS: A total of 13,414 participants were assessed using a complex online algorithm that resulted in primary and secondary Diagnostic and Statistical Manual of Mental Disorders (Fourth Edition, Text Revision) diagnoses for 21 psychological disorders on dimensional severity scales. The scores on these severity scales were used in a principal component analysis (PCA) and the resulting comorbidity factor scores were related to 4 measures of psychosocial adjustments. RESULTS: A PCA based on 17 of the 21 psychological disorders resulted in a 4-factor model of comorbidity: anxiety-depression consisting of all anxiety disorders, major depressive episode (MDE), and insomnia; substance abuse consisting of alcohol and drug abuse and dependency; body image-eating consisting of eating disorders, body dysmorphic disorder, and obsessive-compulsive disorders; depression-sleep problems consisting of MDE, insomnia, and hypersomnia. All comorbidity factor scores were significantly associated with psychosocial measures of adjustment (P<.001). They were positively related to psychological distress and suicidal ideation, but negatively related to adequate social support, self-confidence, and quality of life. CONCLUSIONS: This exploratory study identified 4 comorbidity factors in the e-PASS data and these factor scores significantly predicted 5 psychosocial adjustment measures. TRIAL REGISTRATION: Australian and New Zealand Clinical Trials Registry ACTRN121611000704998; http://www.anzctr.org.au/trial_view.aspx?ID=336143 (Archived by WebCite at http://www.webcitation.org/618r3wvOG).
- Authors: Al-Asadi, Ali , Klein, Britt , Meyer, Denny
- Date: 2014
- Type: Text , Journal article
- Relation: Journal of Medical Internet Research Vol. 16, no. 10 (2014), p. e248
- Full Text:
- Reviewed:
- Description: BACKGROUND: A relative newcomer to the field of psychology, e-mental health has been gaining momentum and has been given considerable research attention. Although several aspects of e-mental health have been studied, 1 aspect has yet to receive attention: the structure of comorbidity of psychological disorders and their relationships with measures of psychosocial adjustment including suicidal ideation in online samples. OBJECTIVE: This exploratory study attempted to identify the structure of comorbidity of 21 psychological disorders assessed by an automated online electronic psychological assessment screening system (e-PASS). The resulting comorbidity factor scores were then used to assess the association between comorbidity factor scores and measures of psychosocial adjustments (ie, psychological distress, suicidal ideation, adequate social support, self-confidence in dealing with mental health issues, and quality of life). METHODS: A total of 13,414 participants were assessed using a complex online algorithm that resulted in primary and secondary Diagnostic and Statistical Manual of Mental Disorders (Fourth Edition, Text Revision) diagnoses for 21 psychological disorders on dimensional severity scales. The scores on these severity scales were used in a principal component analysis (PCA) and the resulting comorbidity factor scores were related to 4 measures of psychosocial adjustments. RESULTS: A PCA based on 17 of the 21 psychological disorders resulted in a 4-factor model of comorbidity: anxiety-depression consisting of all anxiety disorders, major depressive episode (MDE), and insomnia; substance abuse consisting of alcohol and drug abuse and dependency; body image-eating consisting of eating disorders, body dysmorphic disorder, and obsessive-compulsive disorders; depression-sleep problems consisting of MDE, insomnia, and hypersomnia. All comorbidity factor scores were significantly associated with psychosocial measures of adjustment (P<.001). They were positively related to psychological distress and suicidal ideation, but negatively related to adequate social support, self-confidence, and quality of life. CONCLUSIONS: This exploratory study identified 4 comorbidity factors in the e-PASS data and these factor scores significantly predicted 5 psychosocial adjustment measures. TRIAL REGISTRATION: Australian and New Zealand Clinical Trials Registry ACTRN121611000704998; http://www.anzctr.org.au/trial_view.aspx?ID=336143 (Archived by WebCite at http://www.webcitation.org/618r3wvOG).