Accessibility of Healthcare Sites: Evaluation by Automated Tools

2021 ◽  
pp. 625-636
Author(s):  
Kumari Sarita ◽  
Parminder Kaur ◽  
Satinder Kaur
Keyword(s):  
2021 ◽  
Vol 26 (6) ◽  
pp. 1-36
Author(s):  
Pushpita Roy ◽  
Ansuman Banerjee

Digital Microfluidics is an emerging technology for automating laboratory procedures in biochemistry. With more and more complex biochemical protocols getting mapped to biochip devices and microfluidics receiving a wide adoption, it is becoming indispensable to develop automated tools and synthesis platforms that can enable a smooth transformation from complex cumbersome benchtop laboratory procedures to biochip execution. Given an informal/semi-formal assay description and a target microfluidic grid architecture on which the assay has to be implemented, a synthesis tool typically translates the high-level assay operations to low-level actuation sequences that can drive the assay realization on the grid. With more and more complex biochemical assay protocols being taken up for synthesis and biochips supporting a wider variety of operations (e.g., MicroElectrode Dot Arrays (MEDAs)), the task of assay synthesis is getting intricately complex. Errors in the synthesized assay descriptions may have undesirable consequences in assay operations, leading to unacceptable outcomes after execution on the biochips. In this work, we focus on the challenge of examining the correctness of synthesized protocol descriptions, before they are taken up for realization on a microfluidic biochip. In particular, we take up a protocol description synthesized for a MEDA biochip and adopt a formal analysis method to derive correctness proofs or a violation thereof, pointing to the exact operation in the erroneous translation. We present experimental results on a few bioassay protocols and show the utility of our framework for verifiable protocol synthesis.


Author(s):  
Daniel González-Arribas ◽  
Manuel Soler ◽  
Javier López-Leonés ◽  
Enrique Casado ◽  
Manuel Sanjurjo-Rivo

The future air traffic management system is to be built around the notion of trajectory-based operations. It will rely on automated tools related to trajectory prediction in order to define, share, revise, negotiate and update the trajectory of the aircraft before and during the flight, in some case, in near real time. This paper illustrates how existing standards on trajectory description such as the aircraft intent description language can be enhanced including optimisation capabilities based on numerical optimal control. The Aircraft Intent Description Language is a formal language that has been created in order to describe aircraft intent information in a rigorous, unambiguous and flexible manner. It has been implemented in a platform for a modular design of the trajectory generation process. A case study is presented to explore its effectiveness and identify the requirements and needs to generate optimised aircraft intents with higher automation and flexibility. Preliminary results show the suitability of numerical optimal control to design optimised aircraft intents based on the aircraft intent description language.


2018 ◽  
Vol 13 (1) ◽  
pp. C1-C9 ◽  
Author(s):  
Veena Looknanan Brown ◽  
Paul J. Coram ◽  
Sean A. Dennis ◽  
Denise Dickins ◽  
Christine E. Earley ◽  
...  

SUMMARY On July 16, 2018, the International Auditing and Assurance Standards Board (the Board or IAASB) issued a request for comment on its Exposure Draft, Proposed International Standard on Auditing 315 (Revised): Identifying and Assessing the Risks of Material Misstatement and Proposed Consequential and Conforming Amendments to Other ISAs (ED-315). Major enhancements proposed include explicit recognition of the auditor's use of automated tools and techniques, requiring an understanding of an auditee's use of information technology relevant to financial reporting, acknowledging the influence of an entity's complexity on the audit plan, and increasing the emphasis on the need for professional skepticism. The comment period ended on November 2, 2018. This commentary summarizes the participating committee members' views on selected questions posed by the IAASB. Data Availability: ED-315, including questions for respondents, is available at: https://www.ifac.org/publications-resources/exposure-draft-isa-315-revised-identifying-and-assessing-risks-material.


2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
George Iakovakis ◽  
Constantinos-Giovanni Xarhoulacos ◽  
Konstantinos Giovas ◽  
Dimitris Gritzalis

The COVID-19 outbreak has forced businesses to shift to an unprecedented “work from home” company environment. While this provides advantages for employees and businesses, it also leads to a multitude of shortcomings, most prevalent of which is the emergence of additional security risks. Previous to the outbreak, company computer networks were mainly confined within its facilities. The pandemic has now caused this network to “spread thin,” as the majority of employees work remotely. This has opened up a variety of new vulnerabilities, as workers’ cyber protection is not the same at home as it is in office. Although the effects of the virus are now subsiding, working remotely has embedded itself as the new normal. Thus, it is imperative for company management to take the necessary steps to ensure business continuity and be prepared to deal with an increased number of cyber threats. In our research, we provide a detailed classification for a group of tools which will facilitate risk mitigation and prevention. We also provide a selection of automated tools such as vulnerability scanners, monitoring and logging tools, and antivirus software. We outline each tool using tables, to show useful information such as advantages, disadvantages, scalability, cost, and other characteristics. Additionally, we implement decision trees for each category of tools, in an attempt to assist in navigating the large amount of information presented in this paper. Our objective is to provide a multifaceted taxonomy and analysis of mitigation tools, which will support companies in their endeavor to protect their computer networks. Our contribution can also help companies to have some type of cyber threat intelligence so as to put themselves one step ahead of cyber criminals.


2021 ◽  
Author(s):  
Anita Bandrowski ◽  
Jeffrey S. Grethe ◽  
Anna Pilko ◽  
Tom Gillespie ◽  
Gabi Pine ◽  
...  

AbstractThe NIH Common Fund’s Stimulating Peripheral Activity to Relieve Conditions (SPARC) initiative is a large-scale program that seeks to accelerate the development of therapeutic devices that modulate electrical activity in nerves to improve organ function. Integral to the SPARC program are the rich anatomical and functional datasets produced by investigators across the SPARC consortium that provide key details about organ-specific circuitry, including structural and functional connectivity, mapping of cell types and molecular profiling. These datasets are provided to the research community through an open data platform, the SPARC Portal. To ensure SPARC datasets are Findable, Accessible, Interoperable and Reusable (FAIR), they are all submitted to the SPARC portal following a standard scheme established by the SPARC Curation Team, called the SPARC Data Structure (SDS). Inspired by the Brain Imaging Data Structure (BIDS), the SDS has been designed to capture the large variety of data generated by SPARC investigators who are coming from all fields of biomedical research. Here we present the rationale and design of the SDS, including a description of the SPARC curation process and the automated tools for complying with the SDS, including the SDS validator and Software to Organize Data Automatically (SODA) for SPARC. The objective is to provide detailed guidelines for anyone desiring to comply with the SDS. Since the SDS are suitable for any type of biomedical research data, it can be adopted by any group desiring to follow the FAIR data principles for managing their data, even outside of the SPARC consortium. Finally, this manuscript provides a foundational framework that can be used by any organization desiring to either adapt the SDS to suit the specific needs of their data or simply desiring to design their own FAIR data sharing scheme from scratch.


Sign in / Sign up

Export Citation Format

Share Document