The technical filed generally relates to a system including a client device, data input sources and a server.
A Radio-frequency Identification (RFID) chip can transmit information to a reader in response to an interrogation signal or polling request from the reader. The RFID chip can be incorporated in a tag (RFID tag) which is placed on a medical consumable item so that information can be passively captured. An RFID tag can be an active-type with its own power source, or a passive-type or battery-assisted passive type with no or limited power source. Both the passive-type and battery-assisted passive type will be referred to here as passive-type for sake of brevity. Placing an active-type RFID tag on some medical consumable items may not be feasible due to financial considerations, weight, etc. On the other hand, placing a passive-type RFID tag on medical consumable items may be more feasible; however, a power source will be needed to passively obtain information. Therefore, a device that can provide power to the RFID tag on the medical consumable item as well as obtain the information from the RFID tag would be beneficial.
Artificial Intelligence (AI) technologies such as machine learning and deep learning have become ever present due to technological advances in data storage and processing. Machine Learning at its most basic is the practice of using algorithms to parse data, learn from it, and then make a determination or prediction about something in the world. So rather than hand-coding software routines with a specific set of instructions to accomplish a particular task, the machine is “trained” using large amounts of data and algorithms that give it the ability to learn how to perform the task. Deep learning involves neural networks inspired by our understanding of the biology of our brains all those interconnections between the neurons. But, unlike a biological brain where any neuron can connect to any other neuron within a certain physical distance, these artificial neural networks have discrete layers, connections, and directions of data propagation.
It is very important to identify, diagnose and treat medical, operations, and administrative issues that may not be easily apparent during medical care to enable better care coordination, quality improvement, care surveillance, monitoring, and clinical business intelligence. However, medical care for patients is often provided among multiple providers in a plurality of care settings that may have no affiliation. In addition, a large number of the determinants of health and wellness are socio-economic in nature—social determinants of health—which may not be adequately captured in traditional healthcare information systems. For this reason, third party data sources and sensor-based data have the potential to significantly augment insight to providers of healthcare and care coordinators. Certain risk factors may be known to organizations providing some services, but those risk factors may not be known to other organizations providing other services. For example, medical care for a veteran may be spread across multiple care providers. One risk factor may be known to one care provider and another risk factor known to another care provider. Another example would be in a case where a social worker may be providing help with unemployment and not be aware of medication the patient is taking that increases suicidal thoughts.
A system that can identify patients at risk for suicide and scenarios that may represent increased risk that a patient may commit suicide would be desirable. It would be further preferable if such a system could take advantage of Al techniques to predict the risk that a patient may commit suicide so that resources can be allocated to those at highest risk for suicide, thereby reducing suicides. Those resources could be provided to help deal with suicidal ideation, suicidal behavior, and suicides for example.
Without counter-measures, suicidal patients might only be identified when presenting due to the sequelae of suicidal ideation and or behavior or when an individual or provider asks a patient if they are suicidal and the patient honestly answers. In view of this concern, the present disclosure concerns a system capable of predicting whether a patient may be having suicidal ideation or may be about to actively be engaged in suicidal behavior using methodologies.
Accordingly, the present disclosure concerns a system which provides a platform for collecting data and analyzing data collected over time and in real time using trained models to deliver actionable insights in real time to the appropriate stakeholders capable of intervening.
The system can leverage analytics from third party data sources as inputs into its predictive analytics, such as the Department of Veteran's Affairs Reach Vet Analytics that can be used to assess and or predict the risk of suicide, for example.
The system receives and delivers information to and from hospital information systems and client devices used by healthcare and social services workers, patients, family members, and care givers. In addition, the system provides client applications for managing patients identified to be at high risk for suicide, clinical and administrative suicide prevention work flows, real time analytics and data visualization tools that aid provider organizations and their healthcare worker employees in carrying out these work flows, monitoring these work flows, and improving the quality and timeliness of the services delivered as a part of this work flow. The improvement of the quality and timeliness of services is namely aimed at preventing suicide when a patient has been identified to be at high risk.
Furthermore, the system improves the provider organization's situational awareness, responsiveness to particular situations or scenarios that pose risk, and compliance with key performance indicators of the inventive system's proprietary technology enabled workflows. Situational awareness, notifications and escalations thereof leverage the inventive system's notification micro service.
The system is notably unique in not only predictive analytics but also in its capability to inject its insights, findings and predictions into key clinical and administrative work flows enabled by the system's client applications that are used to manage patients identified to be at high risk for suicide and aid in the management and monitoring of their care within and across a plurality of healthcare provider organizations, such as in the case of “non-Veterans Affairs care” also known as “non-VA care.” The system can utilize data collected in the course of work flows carried out via its client applications as inputs into to its predictive analytics.
Accordingly, the present disclosure concerns a system comprising: a plurality of radio-frequency identification (RFID) chips, wherein a first RFID chip of the plurality of RFID chips is a passive-type RFID chip, and one or more of the plurality of RFID chips include a sensor group; a data collection engine (DCE) device communicating with the first RFID chip, wherein the DCE comprises: a power transmission subsystem including a power source and an antenna arranged to wirelessly transmit power from the power source to the first RFID chip; a transceiver configured to receive first data from at least one of the first RFID chip and a second RFID chip of the plurality of RFID chips while the first RFID chip is activated by the power received, the first data including identification information of the at least one of the first and second RFID chips; a controller operatively coupled to the transceiver; and one or more memory sources operatively coupled to the controller, the one or more memory sources including instructions for configuring the controller to generate one or more messages indicative of the identification information to be sent by the transceiver to a server device via the network connection, wherein the first RFID chip includes an antenna for wirelessly receiving the power from the transceiver of the DCE and control logic for generating the identification information, wherein the server device comprises: a transceiver configured to receive the one or more messages from the DCE; a controller operatively coupled to the transceiver; and one or more memory sources operatively coupled to the controller, the one or more memory sources storing a trained neural network model (NNM) for generating an output value corresponding to a present event based upon one or more of the identification information and position information, wherein the output value corresponds to a suicide risk.
The present disclosure further concerns a client device comprising: a transceiver communicating with a server device via a connection to a network, the transceiver configured to send a request message to the server device and receive a reply message from the server device in response to the request message, the reply message including an output value generated from a trained model stored at the server device; a controller coupled to the transceiver; a display device coupled to the controller; and a memory including instructions for configuring the controller to: generate the request message; and render a graphical display on the display device based upon the output value. The reply message can include a plurality of output values, the graphical display is a cluster diagram including a plurality of clusters of similar characteristic output values of the plurality of output values.
The controller is further configured to: calculate a suicide prevention readiness score (SPRS) from a trained model based upon an input data set; and generate an information reply including a graphical display indicating the output value of trained model.
The input data set can include a status of healthcare provider organization personnel suicide prevention training and attributes of the suicide prevention training, and a status of a healthcare provider organization community outreach activities and attributes of the healthcare provider organization community outreach activities.
The accompanying figures, in which like reference numerals refer to identical or functionally similar elements, together with the detailed description below are incorporated in and form part of the specification and serve to further illustrate various exemplary embodiments and explain various principles and advantages in accordance with the present invention.
In overview, the present disclosure concerns a system which includes various input data sources, client devices and backend devices. The input data source may include a Data Collection Engine (DCE) and an RFID tag associated, for example, identifications of medical professionals and patients. The backend devices can be one or more server devices.
The instant disclosure is provided to further explain in an enabling fashion the best modes of performing one or more embodiments. The disclosure is further offered to enhance an understanding and appreciation for the inventive principles and advantages thereof, rather than to limit in any manner. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
It is further understood that the use of relational terms such as first and second, and the like, if any, are used solely to distinguish one from another entity, item, or action without necessarily requiring or implying any actual such relationship or order between such entities, items or actions. It is noted that some embodiments may include a plurality of processes or steps, which can be performed in any order, unless expressly and necessarily limited to a particular order; i.e., processes or steps that are not so limited may be performed in any order.
Reference will now be made in detail to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
Referring to
Some exemplary examples of data inputs are healthcare data from a variety of sources. Some data such as vital signs can be observed directly from the patient. The vital sign data would then be inputted into the system by an end user using a client application for example. Healthcare data can also be obtained from other sources such as data input from users that use client applications that comprise the inventive system or that from third party applications or systems, a healthcare information exchange (HIE), hospital information systems, patient facing software applications, Health level 7, continuity of care documents (CCDs), Recovery Engagement and Coordination for Health-Veterans Enhanced Treatment (REACH-VET) analytics and data, Army Study to Assess Risk and Resilience in Servicemembers (Army STARRS) analytics and data, third party methods or algorithms, medical claims information submitted for payment of services rendered, consults for healthcare services, status changes related to the fulfilment of consult requests, the content of consult requests and the reports received in response, medical imaging data and interpretations thereof, laboratory data results, healthcare transportation records and claims for payment remittance for such services, known prior suicide attempts, pharmacy prescription and pharmaceutical dispensing data, and data from standardized patient assessments such as SF-36.
Other data can also come from sources such as 911 call centers, police scanners, law enforcement databases, social media data, human facial imaging data and changes over time and interpretations thereof, location data, attributes describing a patient's living situation, economic data from the patient's location such as the unemployment rate, attributes of the patient such as marital status, race, etc . . . , data collected from care givers, family members and friends of the patient, data that may be indirectly attained such as data about job loss, behavior changes, or relationship changes, obituaries, death certificate data, news articles from various media sources and Internet of things (IoT) enabled devices for example. The sources of data are not limited as long as there is predictive value in the data.
The DCE 102 is shown communicating with an RFID tag 108. As discussed later, the DCE can be disposed in one or more rooms of a facility such as a hospital and the RFID tag 108 can be associated with a medical item such as a patient wrist band 902 (
Referring to the block diagram of
Referencing the Open Systems Interconnection reference model (OSI model), the transceiver 202 can provide the physical layer functions such as modulating packet bits into electromagnetic waves to be transmitted and demodulating received waves into packet bits to be processed by higher layers (at interface 206). The transceiver 202 can include an antenna portion 205, and radio technology circuitry such as, for example, ZigBee, Bluetooth and WiFi, as well as an Ethernet and a USB connection. The transceiver 202 also includes a wireless power transmitter 204 for generating a magnetic field or non-radiative field for providing energy transfer from the power source 203 and transmitting the energy to, for example, an RFID tag by antenna portion 205. The power transmitter 204 can include, for example, a power transmission coil. The antenna portion 205 can be, for example, a loop antenna which includes a ferrite core, capacitively loaded wire loops, multi-turn coils, etc. In addition to energy transfer, the transceiver portion 202 can also exchange data with the RFID tag. Data transmission can be done at, for example, 1.56 MHz. The data can be encoded according to, for example, Amplitude Shift Keying (ASK). The transceiver 202 includes a power transmission system composed of the antenna 205 and the power transmitter 204.
The interface 206 can provide the data link layer and network layer functions such as formatting packet bits to an appropriate format for transmission or received packet bits into an appropriate format for processing by the controller 208. For example, the interface 206 can be configured to encode or decode according to ASK. Further, the interface 206 can be configured in accordance with the 802.11 media access control (MAC) protocol and the TCP/IP protocol for data exchange with the server via a connection to the network. According to the MAC protocol, packet bits are encapsulated into frames for transmission and the encapsulation is removed from received frames. According to the TCP/IP protocol, error control is introduced and addressing is employed to ensure end-to-end delivery. Although shown separately here for simplicity, it should be noted that the interface 206 and the transceiver 202 may be implemented by a network interface consisting of a few integrated circuits.
The memory 210 can be a combination of a variety of types of memory such as random access memory (RAM), read only memory (ROM), flash memory, dynamic RAM (DRAM) or the like. The memory 210 can store location information and instructions for configuring the controller 208 to execute processes such as generating messages representative and indicative of medical data and events received from RFID tags as discussed more fully below.
The controller 208 can be a general purpose central processing unit (CPU) or an application specific integrated circuit (ASIC). For example, the controller 208 can be implemented by a 32 bit microcontroller. The controller 208 and the memory 210 can be part of a core (not shown).
In
Referring to
Generally, the logic circuit 312 generates data such as an identification of the RFID tag and/or the item to which it is affixed, state, location, and changes in any data or properties thereof over time, all of which will be referred to as medical data. It should be noted that the data includes situational data which refers to a) the identity of the RFID tag, the identity reference for an individual, facility plant, property, equipment to which the RFID tag is affixed, and b) the distance between an RFID tag and other RFID tags, the distance between the RFID tag and the DCE, the distance between the RFID and a client device such as smartphone, the identity and any identity references of the other RFID tags, DCEs and mobile client devices (i.e. smartphones) with which the RFID communicates, and any obtained from a sensor associated with i) the RFID tag or ii) another RFID tag, or client device (i.e. smartphone) with which the RFID communicates. Examples of the sensor data might be location in three dimensions, acceleration or velocity, displacement relative to some reference, temperature, pressure, to name a few.
The data can also include data indicative of an event such as, for example, near field communication (NFC) established with the DCE or another RFID tag, a time duration for which the RFID tag 304 has been within a certain location, historical data, etc. Although not shown, the logic circuit 312 can include or be coupled to a non-volatile memory or other memory sources.
The interface 310 can format a received signal into an appropriate format for processing by the logic circuit 312 or can format the medical data received from the logic circuit 312 into an appropriate format for transmission. For example, the interface 310 can demodulate ASK signals or modulate data from the logic circuit 312 into ASK signals.
Referring to
The antenna portion 324 and interface 326 can be similar to those of the passive-type RFID tag 304. However, it should be noted that the antenna portion 324 can receive data from other passive-type and active-type RFID tags as well as the DCE and can send this and other data to the DCE, or other RFID tags.
The sensing group 334 includes sensing portions for sensing contact, motion characteristics such as an acceleration value, whether the chip is within a predetermined distance from another RFID tag, a distance from one or more other RFID tags and/or the DCE, and/or distance and angle from a baseline orientation. The sensing group 334 can include a set of accelerometers for determining the acceleration value of the item 320, a digital compass that collects orientation information about the item 322, a gyroscope for measuring angular rotation associated with the apparatus to provide an orientation value, a proximity sensor for detecting if the chip 322 is within a predetermined distance of another chip 322, a touch sensor layer and/or pressure sensor for sensing contact and magnitude of the pressure, and a geomagnetic sensor for sensing geomagnetic field strength. Preferably, the sensed motion characteristics include data represented in the time domain. The accelerometers can detect subtle movements along the three axial directions. The accelerometer reading, when combined with the data from the digital compass and/or the gyroscope, can facilitate motion detection. The sensing group 334 can include a separate OpenBeacon active tag or a Sense-a-Tag as described in “Proximity Detection with RFID: A Step Toward the Internet of Things” by Bolić et al., Pervasive Computing, IEEE, (Volume 14, Issue 2), published on April-June 2015, the contents of which are incorporated herein by reference. Further, in conjunction with or separately from the proximity sensor, the sensing group can include a distance sensor for measuring a distance to a target node such as another RFID chip. The distance sensor may be a received signal strength (RSS) indicator type sensor for measuring the RSS of a signal received from a target node such as the DCE or another RFID chip. The distance from the target node can be obtained by a plurality of RSS measurements.
The controller 330 is configured according to instructions in the memory 332 to generate messages to be sent to the DCE or another tag. Particularly, the controller 330 can be configured to send a registration message which includes identification data associated with the RFID tag 322 and thus the medical item 320. Further, in a case in which the RFID tag 322 wirelessly provides power to another passive-type RFID tag, the controller 330 can be configured to generate a message including identification data associated with the passive-type RFID tag, in combination with, or separately from its own identification data to the DCE.
The controller 330 can be configured to generate messages including data indicative of an event. These types of messages can be sent upon receiving a request from the DCE or another entity, upon occurrence of the event, or at regular intervals. Example events include near field communication established with another RFID tag, contact detected by the sensing group 334, positional information, a time duration of such contact and position, etc.
It should be noted that the passive-type RFID tag can also include a sensing group or be coupled to the sensing group. For example, the RFID tag 304 can be a Vortex passive RFID sensor tag which includes a LPS331AP pressure sensor. Both active and passive types of sensors can include RSS measurement indicators. The controller or control logic can determine the distance from the RSS measurements based upon localization algorithms such as, for example, Centroid Location (CL), Weighted CL, or the Relative Span Exponentially Weighted Localization (REWL) algorithm as discussed in “Experimental Assessment of a RSS-based Localization Algorithm in Indoor Environment” by Pivato et al., IEEE Instrumentation and Measurement Technology Conference, published on May 2010, the contents of which are incorporated herein by reference. As mentioned above, the DCE 102 can store data regarding its fixed location (i.e. room 106). In this case, the physical location of the RFID tag 110 can be determined via the DCE 102. Alternatively, the RFID tags can obtain position from some external reference (i.e. a device with GPS or via a device that provides an indoor positioning system location reference, or WiFi hotspots, that themselves have a known location, which can somehow transmit WiFi ids to the RFID chips). This later approach, involving an external device other than the DCE 102, would occur via having the other external device communicate with the RFID tag and write location data to the RFID tag memory which is then sent along with any messages to the DCE. Further, the RFID tags could also be designed to record this location information from an external source upon being interrogated by a DCE.
Referring to
The memory portions 2006, 2007, 2008 can be one or a combination of a variety of types of memory such as RAM, ROM, flash memory, DRAM or the like. The memory portion 2006 includes instructions for configuring the controller 2004. The second memory portion 2007 includes one or more trained models. It should be noted that the database and the trained models can be included in the memory portion 2006. They are shown separately here in order to facilitate discussion. The data inputs as discussed above are collectively stored the database 2008.
The controller 2004 is configured according to the instructions in the first memory portion 2006 to determine data in the database 2008 that is associated with the identification for each of the one or more RFID tags (received in the message from the DCE); store data in the message from the DCE in the database 2008 to be associated with the identification of the first RFID tag; and as will be discussed more fully below, predict a suicide risk associated with a patient event based upon inputting attributes of the patient event into the trained model such as a neural network model or self-organizing map network.
The controller 1104 and database 1108 can be configured to perform command query responsibility segregation in which commands are separated from queries to allow scaling of servers that respond to queries separately from servers delegated to responding to messages. The controller 1104 and database 1108 can further be configured to use event sourcing and/or event streaming to ensure all changes to an application state get stored as a series of events which can be not only queried but reconstructed.
Referring to
In the discussion here, the server 2014 and client device 116 are shown as separate entities for ease of discussion. However, in actual implementation the server 2014 and client device 116 may be implemented within a single computing device. Moreover, the portions of server 2014 may be distributed among various computing devices. For example, the trained models shown stored in memory portion 2007 or the database(s) 2008 could be stored at a plurality of different computing devices. Modifications as described above and below to the embodiments may be combined and are not limiting to the inventive system.
The system can also use work flows as inputs, data collected in the process of managing patients done via the proprietary user interfaces as well as data derived from activity tracked via the hospital information systems; some examples of the latter include appointments, patient movements, facility visits or admissions, healthcare employee charting, among others.
Examples of the work flow specific client applications include, applications used by social workers and clinicians that manage patients at high risk for suicide and client applications that the managers and facility administrators that oversee this clinical and administrative work flow use. The system's client applications, used on both mobile and desktop devices, include both native and web browser based technologies that leverage the organic data collected over time from use of the system, the system's server's hospital information system and healthcare information exchange interfaces and the other numerous interfaces providing data input into the system and the predictive analytic outputs of the proprietary models that consume this data. Data generated via these work flows executed in the client application in the regular course of its use and data about the facility or provider organization that is responsible for managing a given patient at high risk for suicide is used not only to manage the patient's care but also as inputs to the system's predictive analytics.
Some examples of data the system collects and leverages include: i) any patient record flags from hospital medical records and any reviews thereof, renewals, discontinuations and related documentation, for example documentation explaining the basis for continuance or discontinuation; ii) healthcare or social services worker charting including, but not limited to social worker charting, physician and psychologist charting, suicide prevention safety plans, patient risk assessments and other charting including, but not limited to: a) metadata about the charting such as note title, date of creation, date signed by author or cosigners, identity of author and any cosigners; and b) content of such charting both structured and free text; iii) any appointments the patient has scheduled for medical or social services; iv) hospital information system registration and patient movement data from medical facilities, both the local facility and remote facilities via healthcare information exchange. For example, did the patient go to a given medical facility for a scheduled appointment, did the patient no show for an appointment, was the patient seen in the emergency department, and/or was the patient admitted to an inpatient facility; v) any follow up activities that take place such as following up patients with particular patient record flags and documentation occurring at that time or thereafter such as in the event a patient does not show up for an appointment, or in the event a patient checks out after an appointment, is discharged from the emergency department or is discharged from an inpatient facility. Utilizing proprietary business logic and analytics, the system can identify situations that may represent a change or increase in the risk of a potential suicide and when such scenarios are identified, escalate this concern to the appropriate stakeholders.
Some simple examples of non-patient specific data the system utilizes in its analytics and provides client based work flow solutions to help provider organizations manage includes, but is not limited to, the status of suicide prevention training by employees at a given provider organization or facility (i.e., was it completed within a certain range of time from hire and/or was it renewed/updated at a predefined interval as well as the nature of or attributes of the suicide prevention training completed) and attributes about the suicide prevention outreach conducted by the facility or provider organization (frequency, location, partner organizations involved, attendance, attendees, speakers/presenters, etc.) and changes in these attributes over time. One can think of these as “attributes of the facility” that are input into the analytics when a patient at high risk for suicide is being managed at a given facility both at the time of model training (i.e. the attributes as assessed previously in conjunction with antecedent cases) and subsequently for de novo cases for which suicide risk is being predicted.
In addition to: i) the system's client applications end users use to manage this work flow; and ii) the use of this organically generated data as inputs into the training of the system's predictive models, the system also provides within its client applications functionality that allows the facility to track the status of suicide prevention training for its employees and to monitor how frequently it is carrying out suicide prevention outreach and the quality of said outreach activities based on predefined key performance indicators. The system does this by including a client application that generates outputs to a graphical user interface presenting data visualizations, score cards, and dashboard metrics describing the data generated from these activities, the individuals involved, and the related key performance metrics; specifically, notable trends in these at snapshots in time and over time. Along with these aggregate statistics and key performance indicators, the system provides a proprietary scoring of the facility, dubbed the facility's “Suicide Prevention Readiness Score (SPR Score or SPRS).” The SPRS is assessed over time and in real time and trends and data visualization views of the score and its subcomponents over time are provided. Using controls in the graphical user interface, end users can change the date ranges and roll up (aggregate) or drill down into (examine sub-groups) the data and regenerate the data visualizations, score cards, and dashboard metrics after defining new criteria (ad-hoc queries). In this way, the system allows its end users to ask questions of their data assessing their performance in carrying out the activities entailed in this work flow. The system can also be configured to notify particular stakeholders using its notification micro service as described elsewhere herein, when particular key performance metric variances are identified relative to benchmarks or predefined thresholds. The SPRS could then be an input for patient when receiving services at the facility.
For those patients at high risk for suicide that have all or some of their medical and mental healthcare services rendered at more than one provider organization, the system is able to utilize health care information exchange and medical claims data to track the patient's care and milestones in their care, events and various clinical and administrative endpoints that feed into the systems' predictive analytics. Moreover, for some provider organizations (for example the Veterans Healthcare Administration) that outsource and which may pay for care delivered under contract by other providers in the community or for entities engaged in management of their patient's care across multiple facilities (payors or provider organizations using value based care delivery models, for example), the system also has native and web based client applications usable on mobile and desktop devices (as well as API interfaces that can be integrated into by 3rd party developers) that can be leveraged to further enhance or supplement the data received via health information exchange, Continuity of Care Documents (CCD), and claims data.
Alerts and Notifications
The system consists of machine learning based predictive analytics that assess the probability that a given patient will commit suicide. The system is capable of not only calculating the risk, but also deploying and or transmitting its findings to various stakeholders. The system is further capable of providing real time analytics about patients that have been identified to be at risk and changes in their status or attributes of their medical care and services over time. The system includes proprietary workflow technology that can be employed by healthcare provider organizations to better manage patients that have been identified to be at risk for suicide and provides real time analytics and insight regarding key performance metrics related to this proprietary workflow technology.
The system can provide alerts via any number of communication mediums when particular tasks are soon to be due, due or past due or when certain events have been predicted to occur with a probability greater than the configurable threshold levels. Further, the system provides analytics that summarize how well the provider organization, its subdivisions or teams, and its individual healthcare and social services workers are performing currently and over time in managing patients at risk for suicide via this proprietary end user client technology enabled workflow, including performance, process and outcome measures. Further data collected, and statistical trends derived from this data is used as input data to the inventive systems predictive analytics.
The system is also able to be configured to send out automated communications (notification micro service) and alerts following proprietary business rules and logic to a variety of client devices to native applications running on hardware devices via a variety of communications technologies, protocols and networks. Examples of hardware devices that could be used are laptops, desktops, thin clients, tablets, phones, pagers and other mobile devices. The automated communications, notifications, and alerts terminology may be used interchangeably. The output value of the system may be an automated communication for one end user, a notification for another end user and an alert for a third end user. The business rules would define how the communications of the inventive system are sent out.
The system's notification micro service can be configured to notify and escalate, if necessary, situations or scenarios that warrant attention by specific stakeholders based on the proprietary predictive models (i.e. trained neural network predictive models), business logic, administrative rules, and clinical pathways the system leverages. In the event such a scenario is identified, the notification micro service can leverage any number of communication technologies to alert stakeholders and end users, for example, but not limited to, automated phone calls, email, SMS messages, analog or digital paging systems, push notification, audible and tactile alerts, visual alerts (i.e. in the system's client applications), HTTP (i.e. post to an internal or 3rd party system), HL7, overhead announcement via hospital PA system.
The system can be configured to send out particular communications or requests and to request the submission of (a reply with) particular predefined data (for example via a form which may request structured data or allow the entry of free text data) in response—in many ways this is analogous to customer satisfaction surveys that may be sent out after, for example a hotel stay at a particular hotel operator's property. As with other use cases described herein, data collected in this process is used as an input to the systems predictive analytics (i.e. the aggregate patterns over time therein, particularly from antecedent cases with known outcomes—suicide/no suicide) and help the system better predict outcomes related to the two endpoints of interest over time. In this way the system is a platform that can be employed to address the needs of particular provider organizations such as the Veterans Health Administration that have a vested interest in preventing suicide among US Veterans, but that face challenges in doing so given only a subset of Veterans receive healthcare services at a Veterans Health Administration facility.
Patient facing native and web browser-based client applications could be used to securely communicate with the patient and that enable secure communication between and amongst the patient, care givers, healthcare workers, social services workers, and other stakeholders in the patient's care and wellbeing.
Authentication and Authorization
Access to the system is secure and requires authentication and authorization and data communications are encrypted. The system's end user functionality can be accessed via desktop workstation or mobile device and can be via the system's client applications running in a web browser or via the system's native applications running on a mobile or desktop device. The system's user interfaces adapt to a variety of device form factors and viewport sizes.
The system and its related client applications have the ability to encrypt and decrypt data as needed for to execute necessary business processes and logic and for presentation of data to authenticated and authorized users in the user interfaces of the systems client applications.
Access to the system's client application-based workflow and communications solutions and dashboard and data visualization technologies is controlled using state of the art access control technologies via which users are authenticated and authorized, for example, OAuth2/claims based security, OpenIdConnect, etc. The system also can be configured to use enterprise access control systems, for example, but not limited to, Lightweight Directory Access Protocol (LDAP), the Department of Veterans Affairs Citrix Access Gateway (CAG), Personal Identity Verification (PIV) Card, and/or Access/Verify based authorization/authentication. In addition, the system can be configured to work with single sign on technologies.
Data sent and received by the system is encrypted in motion and at rest and can be configured to use current and future state of the art encryption methodologies such as Triple Data Encryption Standard (DES), the Rivest-Shamir-Adleman (RSA) cryptosystem, Blowfish, Two Fish, Advanced Encryption Standard (AES), among others.
Data Visualization and Client Application
The system provides data visualization technologies, briefly described above, to enable its users to observe trends, easily assess the current status of particular processes or work flows versus targets/thresholds/reference ranges, all in real time. The system utilizes business rules, graphics, charts, the visual presentation of statistical process control analytics, icons, animation, color and text to highlight particular information. The dashboard makes current trends available and provides inputs and controls that enable “drill down/roll up” and “slice and dice” features that leverage attributes of the input data and metrics; this provides ad hoc query functionality that allows end users to examine data, metrics, and key performance indicators in aggregate and/or for particular sub groups over configurable date ranges. The system can be configured to send out, for example via email, periodic reports that detail performance and trends over time. For example, multiple teams of healthcare workers at a given facility or across multiple facilities may be tasked with managing particular patients at high risk for suicide. The system's work flow tools and analytics in conjunction with end user configuration can determine which teams and individuals are responsible for managing the care of a given patient at high risk for suicide. Leveraging this knowledge, the system provides proprietary scoring of performance in aggregate, for each team, and for each individual. Because particular aspects of the system's proprietary technology enabled monitoring of specific work flows assesses and tracks activities that are initiated and carried out by humans, such as healthcare or social services workers (i.e. follow up after a patient at high risk for suicide after a missed appointment), these attributes and objective observations made by the system on each patient's care as carried out by human actors can be input into the inventive systems predictive analytics and proprietary scoring algorithms. Scores generated from these proprietary algorithms can, of course be used in predicting the risk for suicide, but also can be used to provide aggregate, subgroup and individual performance data (of how well the suicide prevention team stakeholders are carrying out their responsibilities) over particular date ranges and at various snapshots in time enabling healthcare provider organizations, managers, and facility leaders to monitor processes in real time and over time and improve performance/maximize the effectiveness of their efforts to prevent a potential suicide. This data is also used as inputs into the inventive system's proprietary facility “Suicide Prevention Readiness Score (SPR Score or SPRS).” Those provider organizations that subscribe to the system's benchmarking service, can view their SPRS scores relative to similar (deidentified) peer organizations as a means of assessing their relative performance. This real time analytics, scorecard, and dashboard data can be accessed via the system's native or web browser based client applications via desktop computers or workstations or mobile devices. The system is also configured to provide large screen displays that can be mounted on the wall in areas used by healthcare and social services worker teams, analysts, managers, and administrators of healthcare provider organizations. Displays can be configured to show only de-identified data and/or aggregate data or if in a restricted area, more granular data to support the workflows described herein.
The system's client applications utilize the system's server side application programming interface for secure communications and data exchange. The system is capable of exposing its application programming interface to third party developers enabling them to develop additional client applications that leverage the inventive system's predictive analytics tools and functionality. The system provides a plurality of APIs (for example, but not limited to, messaging based, web sockets, HTTP based, Remote Procedure Call or Windows Presentation Foundation based, etc.) and some of which employ an interoperability standard such as REST, RESTful or RESTlike or Fast Healthcare Interoperability Resources (FHIR), to name a few.
The client applications provide a “patient panel” or list of patients with particular aspects of their care that is being managed at a given facility. One example for how these client applications are used is, to track certain milestones and events and to ensure compliance with the collection of certain clinical and administrative documentation that is required as part of the suicide prevention clinical pathway. The graphical user interface provides situational awareness into issues or situations that may require intervention by a field healthcare worker or case manager; this includes, to provide one example, alerts about certain documentation that is due soon, due, or past due/missing. This client application that is a part of the system is a tool that organizations such as payors or large provider organizations, such as the Veterans Health Administration can use to improve compliance with particular work flows and ensure collection of particular clinical and administrative documentation necessary for compliance with contracts with community providers, for example those for the provision of “non-VA care.” Additional use cases for the system's client applications (and API calls that can be used by third party developers) are those in which field healthcare workers such as the case managers supervising/monitoring/tracking outsourced care for patients at risk for suicide that are receiving services in the community to capture data that is part of particular clinical pathways and administrative milestones and process checks.
The client applications and APIs can also be used by field healthcare workers such as case managers to capture (i.e. author or dictate) clinical documentation and submit said documentation to the referring entities electronic health record for the patient. Furthermore the video sensor on the client devices and or API calls that are used by third party developers that integrate other client devices into the system can be used to share clinical and administrative documentation (i.e. as another means of healthcare information exchange) that is needed clinically or required to be submitted contractually as a part of oversight, monitoring and assessment of the services provided by contracted community provider organizations. Where applicable, this data is yet another input that the system can be configured to input into its predictive analytics, one example of which would be data inputs into care plans and clinical pathways that have been configured in the system.
The system provides a user interface in one of its client applications that allows suicide prevention coordinators and other healthcare workers and provider organization managers and leaders to manage, monitor and assess both clinical and administrative aspects of the patient's care (individual patients or patients in aggregate) at their facility and at remote facilities that may be solely or jointly caring for the patient, for example in the case of “non-VA care.” In addition to healthcare workers, other stakeholders such a patient centered medical homes, accountable care organizations, payor organizations, etc. can leverage the platform to manage and monitor the patient's care progression and the real-time analytics and data visualization tools therein; both individual and aggregate views are provided. Examples of this activity includes, but is not limited to, appointment scheduling, whether the patient has or has not showed up for a given visit, consult requests and whether the consult request has been fulfilled/completed, tracking the providers, mental health, social services, and healthcare workers involved in the patient's care collectively and their charting and documentation on the patient including metadata about the charting as previously described and the content of the charting itself, unplanned visits such as emergency room visits, hospital admissions, ambulance transportation records, law enforcement data, and clinical documentation and claims submitted for payment for rendered services at any facility.
Using the system's proprietary technology enabled work flows provider organizations and payors to monitor the status and progress of patients at risk for suicide across a potentially heterogeneous mix of healthcare provider organizations, mental and social services providers, home health services providers, community organizations such as the Salvation Army, and other services providers. The system utilizes data collected via this technology enabled work flow as an input to its proprietary machine learning predictive analytics. The system further leverages this data it collects organically over time as inputs to its proprietary scoring algorithms that rate healthcare provider organizations and services providers on the care they provide to patients at risk for suicide, as described elsewhere herein.
Furthermore the system is able to use proprietary analytics to make recommendations at particular junctures in the patient's care across the local and remote healthcare provider organizations; for example, should a given patient, for example, but not limited to, one at high risk for suicide, need a referral for mental health services locally or in the community or at another facility, be it psychological services, psychiatry services, group counseling services, home health services, etc., the system can examine attributes of the patient in need of referral and leverage its proprietary trained models to provide a ranked list of potential matches for the patient that provide the services in need and that optimize the prioritized input parameters (leveraging data known by the system about similar patients and the process metric data and outcomes from the services they received at various available local or remote providers/provider organizations).
The system can be configured by the end user to maximize, weight or prioritize particular factors in making match recommendations including attributes such as, how soon the patient needs to be seen, how important it is that the patient be seen by or before the requested date, the distance from the patient's residence, accessibility via public transportation, patient preference etc. or particular outcomes or process metrics known by the system which it learns over time about the available services providers (for example, from clinical documentation and claims received, or not received) used by previous patients the system has seen (for example, data such as, but not limited to, current patient/case load, no show rates, appointment cancellations, suicide rate of previously referred patients, timeliness of services rendered and frequency of complete and high quality documentation of the services rendered, findings, assessments and interpretations, etc.).
Furthermore, one of the system's client applications provides patient panel functionality to aid the suicide prevention and other healthcare workers in managing a proprietary technology enabled clinical and administrative work flow tailored to the use case where patients receive care across a potentially heterogeneous set of local or remote (i.e. in the community) provider organizations involved in the provision of healthcare, mental health, and other services to patients at high risk for suicide. A portion of this use case was described earlier herein.
The system makes available configuration settings that allow the entry of business rules relating to particular suicide prevention clinical pathways and related key performance indicators (KPIs). Care provided to patients at high risk for suicide is assessed against the configured clinical pathways and KPI performance is calculated. This output of these analytics and the input data is used by the system in its predictive analytics and by its recommendation engine described above. Also leveraging its proprietary technology enabled work flow and business rules derived from configured care plans or clinical pathways the system provides proprietary scoring of remote (i.e. community based) services providers to which a given entity using the system refers patients. Via its data visualization, dashboard and score card user interfaces in its client applications, the system provides real time and historical analytics depicting the performance of local services providers (i.e. in house), remote (i.e. community based) services providers and other providers to which a given entity using the system refers patients for care. The data visualizations can highlight trends at a moment in time and over time relating the system's proprietary scoring algorithms and related to performance against related clinical guidelines, business rules, and clinical pathways bringing clarity to the assessment of relative performance versus benchmarks, peer provider organizations, etc.
Healthcare provider organizations that utilize the system can implement it as an enterprise system or use a multi-tenant deployment of the system. Entities using the system can choose to use models that are continuously trained only using data that relates to patients whose care they manage locally or in conjunction with other entities or organizations to train the predictive analytics machine learning models. However, the system is capable of providing access to machine learning models that have and are being trained on an ongoing basis from data from one or a plurality of healthcare provider organizations. Thus, the system can provide access to potentially more accurate predicative analytics via its ability to enable entities using the platform to opt into shared training of the system's models; in other words, a given entity, even in an enterprise deployment, can opt into sharing data securely to a server deployment of the system that receives data from a plurality of the system's deployments that trains models, and then makes said trained models available to entities that have opted into this service.
Entities deploying the system for this purpose can then use the system's notification micro service to obtain real time situational awareness and alerts about individuals that may be at risk for suicide and potentially in need of intervention, outreach and/or healthcare and mental health services. The entities deploying the system are able to establish predefined business rules in regards to particular individuals that should be notified via the notification micro service in particular scenarios (i.e. particular predicted outcomes); an example may be a case manager, social worker or other healthcare worker employed by the entity with a job responsibility for fielding such alerts and determining what action needs to be taken or automated routing of notifications from the inventive system to a call center for an outreach call/check by a an individual with specific training in suicide prevention. In addition, if the individuals being assessed for potential risk of committing suicide have had opted into potential notification of particular authorized individuals, for example family members, spouses, healthcare providers, case managers, social workers, or any other individuals, the system can be configured to request specific actions by a plurality of said individuals. To provide an example, the system could be configured to ask particular individuals to check on (call or visit) the individual and asked to report back specific information via the system's client application. This can be as simple as: “Was able to contact XYZ” and/or “I have spoken to XYZ and they are okay” or “I was not able to contact XYZ after N attempt(s).” This interaction would be via the patient facing (or family or care giver facing) client applications of the system previously described herein.
The DCE or server device can determine the patient's risk for suicide based upon the data enumerated above and technology enabled work flows described herein utilizing algorithms developed leveraging machine learning techniques including neural networks, support vector machines, genetic programming, genetic algorithms, Bayesian statistics, decision trees, case based reasoning, information fuzzy networks, particle swarm optimization, simulated annealing, among others, that allow for complex pattern recognition, in some cases, leveraging pre-existing or previously collected “training” data, in addition to any newly acquired data, to predict an outcome, namely, in this use case, the probability that a patient is at risk or will attempt to take their life or changes in the risk profile or “risk signature” over time.
Using the above described methods, the system leverages proprietary models that are trained, for example, using supervised machine learning and the above enumerated data from cases known to and known not to have committed suicide, and uses the trained models to then make predictions on new patients or cases the system has not seen previously. The system is designed to be configurable such that it can evolve and consume new data types/sets as inputs to its predictive technologies. The system's models are capable of ongoing learning over time (continuous training of its models) and is thereby capable of learning from new data in real time allowing for maintenance of and potentially improvement in the inventive systems predictive capabilities, particularly as behaviors evolve and new data sources are introduced.
As mentioned above, the server device (or DCE) can utilize machine learning algorithms to predict events related to, risk of suicide or changes therein. A trained model can be used to determine whether a patient that has been flagged to be at risk for suicide (to address one use case of the system described herein) has had a change (for example a worsening) in the predicted risk of suicide. For example, using a simple, human understandable example, if a patient did not show up to an appointment and was not able to be reached subsequently by a healthcare worker that followed up as determined by documentation, the system ingests and analyzes, the trained model would be used by the system after registering each event to assess whether the pattern of events in the context of other data the system has access leads to a significant increase in the individuals predicted risk for suicide. To provide one example of how this is done, the server device can train a Neural Network Model (NNM) to generate an output value to make this prediction.
Referring to
If the RFID chip 910 is a passive type, it can send the data while receiving power from the DCE 102. In this case, the event would be the patient 60 showing up for a scheduled medical appointment as indicated by the patient 60 being in the medical facility room 900. In
Referring to
Referring to
Referring to
Referring to
At 1320, the patient wearing the patient ID band including the RFID tag enters a room at facility B having a DCE disposed, for example, on the ceiling to define a coverage area. The RFID tag sends a registration message identifying itself to the DCE in response to a polling request or broadcast message.
At 1322, the DCE registers the patient associated with the RFID tag in the room as “Event 3”. At 1324, the patient becomes in proximity to a medical professional (MP2). It is detected that the RFID tag in the patient ID band detects is in proximity to the RFID chip associated with the second doctor's ID badge similarly to as discussed with respect to step 960 in
In the above example, the DCE can be separate DCE's at facility A and facility B. Both DCE can register the two events as first and second events, but the server can recognize these as four different events upon receiving the messages indicative of the events from the respective DCE.
Referring to
Creating a Trained Neural Network Model to Predict an Outcome
The server device 2014 stores a trained neural network model which is used to predict an outcome of a clinical patient event. A representation of the process for creating, training and using the trained model is shown in
The model 1105 is trained by an iterative machine learning algorithm. After initial deployment, the server 2014 will also continuously collect data from a variety of sources along with actual related healthcare system clinical and operational outcomes; this data can subsequently be used as training data. As such, the server 2014 is able to continuously learn and improve its ability to predict the outcomes of interest. In addition, the knowledge of the system can continue to evolve in the event the system dynamics change.
There is a relationship between the multitude of attribute data the system collects about a suicidal behavior and the outcome in question. Exemplary suicide attributes the server 2014 collects about a suicide risk can be used include, for example, marital status change and loss of employment. However, there is no one specific mathematical relationship or equation that describes the relationship between attributes of the suicide risk and the outcome of interest. However, because of the server's machine learning capabilities it has the ability to “learn” or be trained from pre-existing data and from the data it collects prospectively. Said another way, the server 2114 “learns” from experience.
Data Set Encoding, Normalization and De-Normalization
Neural network models only use numerical double values for training and processing. Thus any nominal categorical data fields that are a part of raw data that will ultimately be used by models in the system are first encoded to numerical values and “raw” numerical data in many cases by a pre-processing such as normalization 1103 before training and processing. While normalization and de-normalization steps may not be explicitly described as being carried out before or after data consumption by any given model, this should not be misconstrued and lead to the assumption that these routine steps are not carried out.
The normalization processes 1103 and corresponding de-normalization processes 1111 are used not only for training data sets, but also for new, unseen data that is fed into the trained models. Though it is not the rule, frequently, the output from the trained models is normalized and in the event it is a categorical data field the output will also be encoded. Thus, often output from the system models has to be de-normalized and possibly decoded to yield the “raw data,” “human readable” format of the predicted output.
Neural network training is often more efficient when independent numeric data (x-data) is normalized. For this reason, the system most often normalizes numeric data along the same scale being utilized by the model for all data fields, including nominal data fields. The scale the system utilizes for normalization depends on the particular activation function employed by a given model. In most cases this results in normalization either from −1 to 1 or 0 to 1, however, in some cases intermediate range values may be used as well, such as −0.5 to 0.5, for example. This “raw data” normalization step also prevents predictors or inputs that are relatively larger in magnitude (as compared to other predictors or inputs) from having more relative influence on the change in the value of synaptic weights during training of the system models. For problems with normalized nominal data, one neuron is required to represent each numeric data field type.
An example of one of the independent predictors (input x-data) or discharge attributes that can be utilized by the system is the number of medications a given patient is prescribed at the time of discharge. Suppose a patient has 19 discharge medications and that this “raw data” value needs to be normalized to a −1 to 1 normalization range. If the actual range of the possible number of discharge medications is 0 to 50, for example, then to normalize this input x-data, the system's continuous or numeric normalization process would carry out normalization calculations similar to those illustrated herein. Initially, the value can be plotted on an actual range as shown in
{[(19−0.0)*(1.0−(−1.0))]/(50.0−0.0))+(−1.0)=−0.24
Referring to
In the encoding process, the system may encode classification labels into double values within the normalization range such as −1 to 1 or 0 to 1. The scale the system utilizes for encoding depends on the particular activation function employed by a given model. An approach the system employs at times to encode nominal data fields is so called one-of-N encoding as shown in
Due to this shortcoming of one-of-N encoding, particularly in instances when there are more than two nominal categories, the server can employ equilateral encoding (one-of-(N−1) encoding shown in
Where the variables represent the following:
With equilateral encoding, all classes are able to be represented by a number of doubles equal to one minus the total number of nominal data classes, in this case 2 (3−1=2). When this technique is used, every set of possible ideal and actual combinations in the above example will result in an equivalent Euclidean distance.
Ideal: {0.5, 1} Actual: {0.933, 0.25}
Ideal: {0.06698, 0.25}
Actual: {0.5, 1}
Equilateral encoding is not employed by the system in scenarios where there are less than three distinct nominal categories.
Exemplary embodiments of a supervised and unsupervised neural network training algorithm used to create a trained model will be discussed. However, these embodiments are merely examples. Those skilled in the art know any variety of machine learning algorithm approaches can be used for the purpose of training system models including, but not limited to support vector machines, genetic programming, Bayesian statistics, decision trees, case based reasoning, information fuzzy networks, clustering, hidden Markov models, particle swarm optimization, simulated annealing, among others. While the exemplary embodiments herein do not detail every machine learning approach employed by the system to solve the technical problem, this should not be construed as an omission of these capabilities or approaches which the system can and in some case does leverage to solve the technical problem.
There are three primary categories of machine learning tasks: classification, regression and clustering tasks.
Classification
Referring to
Regression
Referring to
Clustering
Clustering tasks carried out in the server entail an unsupervised learning process. For clustering tasks, categories and outcomes are not known, or if known are not used for model training. Models are trained from the inputs of the data set, again without or ignoring the corresponding outputs, and from these the model training algorithm tries to identify similarities among the input data and cluster the data based on these learnings, so called “unsupervised learning.” The backend devices employ each of these categories of machine learning tasks.
Unsupervised Learning
The server 2014 in some instances utilizes unsupervised learning techniques (for example Self-Organizing Map (SOM)—also known as Kohenen Map, Singular Value Decomposition (SVD), and Principal Component Analysis (PCA)) for the purpose of dimensionality reduction. This is done to reduce the input data sets from a large number of dimensions to a lower number of dimensions, such as, for example, to two or three dimensions. This is often employed as a pre-processing step in advance of the application of supervised learning methods. By leveraging unsupervised learning for the purpose of dimensionality reduction, the system is able to reduce the processing (training) time and improve model accuracy. Some supervised machine learning techniques work very well on data sets with a low number of dimensions, however, when there are a very large number of dimensions, performance can degrade, the so called “curse of dimensionality.” Thus, the employment of dimensionality reduction techniques actually boosts model performance and efficiency for some tasks.
Another exemplary task, for which the server 2014 uses unsupervised learning, as detailed further later herein, is data visualization. Humans are quite facile with the visualization of data in two or three-dimensional space, however visualizing data with more than three dimensions is not a task for which humans are well suited. One of the ways the system overcomes this is by using its unsupervised learning dimensionality reduction capabilities to make patterns in n-dimensional data more easily perceptible to human end users. Thus, the server's dimensionality reduction techniques significantly boost its ability to make data actionable by making the visibility of meaningful, yet complex patterns, more perceptible to its human end users.
Supervised Learning
The backend devices can use supervised machine learning techniques.
Referring to
In the neural network, connections between neurons have a connection weight or synaptic weight, for example the connection between I1 and H2 has a synaptic weight of wih 12. The wih 12 notation means the synaptic weight of the connection from input neuron I1 and hidden neuron H2. This synaptic weight denotes the strength of the connection, the higher the weight the higher the strength and vice versa. This synaptic weight determines the effect the synapse has on processing. The synaptic weight is also directional. Said another way, this means the connection from I1 to H2 is different from that from H2 to I1. Thus the notation wih 12 not only denotes the neurons that are connected or involved but also the direction of the connection.
As shown in
The Sigmoid Function
As shown in
The Hyperbolic Tangent Function
As shown in
The Linear Function
ƒ(x)=x
As shown in
The activation functions detailed above are exemplary of activation functions used by the inventive system. One skilled in the art will understand that there are also other activation functions that can be used in neural networks. This disclosure is not intended to be exhaustive, but is intended to describe the fact that the server 2014 employs a plurality of activation functions to accomplish its objectives.
A NNM is a neural network architecture with a particular structure tailored to a particular problem statement. An exemplary problem statement the server's 2014 neural networks model is the prediction of whether a given patient from a particular facility is likely to suffer attempt a suicide. Using a trained NNM, the server 2014 predicts the likely outcome using a plurality of the properties or attributes of the patient (the inputs). Each model in the system contains input, output, bias and hidden neurons. The input and output neurons are required whereas the bias and hidden neurons are optional depending on the nature of the specific problem statement and its requirements. Each model also has a structure. The exemplary neural network herein depicted in
During the training process, the synaptic weights are adjusted to minimize the error of the output. Thus, the final synaptic weights of the trained model are only known once model training is complete. After successful training of the model, the finalized synaptic weights are then used to make predictions.
Training the NNM
To train the NNM, the controller iteratively performs a machine learning algorithm (MLA) to adjust the values of the synaptic weights until a global error of an output of the NNM is below a predetermined acceptable global error. Performing of the MLA includes: generating an output value of the NNM for each past patient in the training data set using each patient's respective appointment events and related subsequent reached/not reached events (in follow up of the patient's no show for the respective appointment) as the input attributes; measuring the global error of the NNM based upon the output values of the NNM and the quantifiable outcomes of the past patients; and adjusting the values of the synaptic weights if the measured global error is not less than the predetermined acceptable global error to thereby obtain a trained NNM. Here, if the global error is never reached after number of outcomes, the model can be revised, such as number of hidden layers, neurons, etc.
There are two types of error that pertain to neural networks. The first is Local Error (E). Local error is the actual output value computed by the neural network subtracted from the ideal value (i.e. the output value in the training data set). This error is “localized” to particular output neurons, hence the name local error. The other type of error is the error of the neural network, also called network error or global error. The global error is the cumulative effect of the error at each of the outputs (the local error for each output). There are a few types of global error which are briefly discussed below.
Mean Square Error (MSE)
The mean square error (MSE) is the sum the square of all local errors divided by the total number of cases.
Sum of Square Errors (ESS)
The sum of square errors (ESS) is the sum of the square of all local errors divided by two (2).
Root Mean Square Error (RMS)
The root mean square error (RMS) is the square root of the MSE.
The system generally uses MSE, however, in some specific instances the other methods for determining the global error are used.
To more formally state the objective of using machine learning to train the models in the system, it is most accurate to say that the system employs machine learning algorithms and training data to adjust the synaptic weights for the connections in each model such that the global error is less than a pre-established level. The system is configured with acceptable global error levels that balance the tradeoffs of model overtraining (acceptable global error level too low) and model undertraining (acceptable global error level too high).
Referring to
Different machine learning algorithms as well as different global error calculation methods can be employed to update the synaptic weights. Some of the machine learning algorithms the server can be configured to employ include ADALINE training, backpropagation algorithm, competitive learning, genetic algorithm training, Hopfield learning, Instar and Outstar training, the Levenberg-Marquardt algorithm (LMA), Manhattan Update Rule Propagation, Nelder Mead Training, Particle Swarm (PSO) training, quick propagation algorithm, resilient propagation (RPROP) algorithm, scaled conjugate gradient (SCG), among others. Machine learning algorithm selection is determined based on a number of factors some of which include accuracy of the algorithm, the computation resources available and those required of the algorithm, the available or ideal training time duration, among others.
Training the system models is an iterative process referred to as propagation. As discussed above, the process begins by using randomly assigned synaptic connection weights to compute the outcome of the model (1803). Using the known output values for cases in the training data set and the output values computed by the model, the local error at each output, and subsequently the global error of the network is determined (1804). If the global error is not below the pre-established acceptable global error rate a new iteration with updated synaptic weights will ensue. The process for updating the synaptic weights (1808) is referred to as propagation training. As already discussed, the system can be configured to employ one of a variety of methods (algorithms) for updating the synaptic weights during the training process for a given model. Referring to
The model propagation training process utilized by the system can also employ the concept of momentum to deal with the challenge of local minima that can complicate backpropagation (the process of following the contour of the error surface with synaptic weight updates moving in the direction of steepest decent), for example, when the network architecture includes a hidden layer. Momentum is the concept that previous changes in the weights should influence the current direction of movement in the weight space (essentially the percentage of previous iteration weight change to be applied to the current iteration). As such, the inclusion of the momentum parameter can help networks employed by the inventive system to “roll past” local minima. In addition, the inclusion of the momentum parameter can also help speed learning, particularly when long flat error surfaces are encountered. At 1914, the updated synaptic weights are calculated based upon the derivative of the error, the defined learning rate and the momentum parameter.
Training and Validation of System Models
To validate the NNM, the controller generates an output value of the trained NNM for each past patient appointment events of the validation data, wherein each of the output values represents a calculated quantifiable outcome of the respective patient risk for suicide; and determines if the output values correspond to the known quantifiable outcome within the predetermined global error; The creation and training of the NNM can be repeated until validation data results are satisfactory, defined as output data from the NNM being within the acceptable level of global error from the output values in the validation data set.
The training process for the NNM employs a representative data set, which can be a plurality of past patient events as discussed above. Referring to
The training data set 2003 along with the defined system models, the selected machine learning training algorithms and the method each uses for global error calculations, in conjunction with the pre-defined acceptable global error rates are used to train the NNM starting with randomly assigned synaptic weights for each model's neuronal connections. The requisite number of synaptic weight calculation iterations are executed until an acceptable global error level is obtained. Subsequently, the trained model 2009 is then used to predict the outcome for cases in the validation data set 2005, the so called “unseen data” (from the perspective of the trained model). Because the real outcome of each case in the validation data set is known, at this point a validation report can be generated comparing the predicted results with the actual results and the findings can be used to determine the validity of the trained model, essentially whether it is successfully predicting the actual outcomes for the cases in the validation data set. The end result is an assessment of how well the trained system model performs on unseen data.
Using the Trained NNM
The controller conducts pre-processing of input attributes of the new patient appointment and post no show follow up events (transactions). The input attributes can be, in this overly simplified example: seen at appointment (Boolean or yes/no) and outreached and successfully contacted after missed appointment (Boolean), as mentioned above. The controller generates an output value of the trained NNM based upon the input attributes of the new clinical patient transaction. The output value can be a predicted risk of suicide. Finally, the server device can compare the predicted risk for suicide with the threshold criteria or business logic the system has been configured with to determine whether notification or escalation is required.
The input attributes can further be social determinants of health (SDoH) related data. The SDoH data might consist of zip code related data, unemployment/financial distress data, education level data, housing status/shelter status/or change therein, food access status, and other SDoH data.
The input attributes can further be data from court and/or law enforcement databases.
The input attributes can further be economics and meteorological data within some interval of the date and time of the new event.
The input attributes can further be genomics data obtained from a specimen from the subject/actor/patient participant in the new event within some interval of the date and time of the new event.
The input attributes can further be geospatial data obtained from a proxy (i.e. GPS enabled device, RFID tag registered at a DCE with a known location, device signal registered by an wifi access point or cellular tower with a known location, etc.) for the subject/actor/patient participant in the new event within some interval of the date and time of the new event.
The input attributes can further be the data derived from the extraction of structured data from a plurality of electronic medical record sources matched to the subject/actor/patient participant in the new event, including but not limited to, diagnostic data, clinical encounters, pharmacy data, admissions data, emergency department visits, health factors, laboratory results.
The input attributes can further be the data derived from natural language processing (NLP) of data from text based narratives stored on a medium and/or audio and/or video content from which text is extracted from the audio signal using natural language processing or other method (e.g., manual transcription, etc.), generated by administrative or clinical healthcare personnel or other individuals (e.g., family members, spouses, care takers, police officers, attorneys, juries, judges, credit reports, collection officials notices etc.) wherein the content provides insight into stressful life events including housing instability, job instability, marital instability, social isolation, food insecurity, relationship problems, justice involvement, alcohol and/or drug use or detox, access to lethal means derived or other insights from a plurality of potential sources with records/narratives that can be matched to the identity of the subject/actor/patient participant in the new event.
The input attributes can further be the data from a phone conversation (i.e., live and or asynchronous audio signal including voice and any other audio content) and the language content and background noise(s) thereof; source could be a call to a crisis or emergency line like 988 or 911)
The input attributes can further be the data such as notes/documentation/impressions/categorizations/content generated by participants in communication (i.e., notes entered into an information system by an operator or respondent (i.e. a 988 or Veterans Crisis Line operator or responder) including free text and or responses entered in a form or standardized questionnaire of any sort and any computer or machine generated decision support, analysis, or conclusions derived therefrom or therefrom in combination with other data).
The input attributes can further be the data such as emotions expressed (voice signal, video signal, words). The server device, wherein a method is provided for system model(s) architecture design, training of model(s) and validation of model(s) including those used in intermediate steps and any used later in the systems machine learning pipeline (i.e., deep neural networks used in any ensemble stage, emojis, pictures, etc.) by all parties (and combination thereof—i.e. that of a plurality of individuals communicating together) involved such as a caller/initiator/sender and receiver/respondent/operator in conversation/communication (including an assessment, probability, and or categorization thereof such as that obtained via a trained model—i.e., emotion artificial intelligence and changes thereof in that of participants/parties in the communication over time [time series of analysis of progression of communication—i.e., analysis of subcomponents of a communication over a time; assessment can be derived from a plurality of aspects of a given communication—i.e. words and combinations or patterns thereof, video signal—i.e., facial recognition, emotion artificial intelligence derived from facial analysis, text analysis, audio signal analysis, acoustic properties of speech, and linguistic analysis of language]).
The input attributes can further be data such as live and/or asynchronous video with or without audio (including voice and any other audio content and the language content and background noise(s)) including all content captured such as weather conditions, objects or people in video such as train, bridge, river, party goers, alcohol, drug paraphernalia, law enforcement, sirens, gestures, movements, etc.
The input attributes can further be data from a virtual reality interaction (i.e., the Metaverse).
The input attributes can further be data from interaction with a device sensor or data derived from a device sensor (i.e., taps, swipes, clicks, taps, pressure applied over time, velocity, acceleration, global and or indoor positioning systems, wireless beacons and access points, Bluetooth).
The input attributes can further be data from rich media shared or sent from one party to another or posted on a digital medium (i.e., Emojis, Pictures, Images).
The input attributes can further be data from text message(s) (i.e., from communications done via a Short Message Service [SMS], WhatsApp, etc.).
The input attributes can further be communications such as a posting in a digital forum or community (i.e., Reddit, Slack, Facebook, LinkedIn, Snapchat, Nextdoor, Pinterist, YouTube, Instagram, WhatsApp, Twitter, TikTok, etc.).
The input attributes can further be a chat/Instant Message (i.e., a standalone IM service or that embedded in a webpage such as that at veteranscrisisline.net).
The input attributes can further be data from “self-check quiz” results (e.g., a self-assessment filled out on some medium such as paper, a website, or other analog or digital medium)/content or other response to questions administered by self or other including standardized instruments (i.e. Columbia Suicide Severity Rating Scale, Patient Health Questionnaire 9, Beck Depression Inventory, etc.).
The input attributes can further be data from an interaction resulting from outreach following a referral from a third party (i.e., referral from White House Hotline, a call center, referral from the community/citizens concerned about a neighbor or someone on social media).
The input attributes can further be data from a discussion or interaction with a peer (i.e., U.S. Department of Veterans Affairs Peer Support Outreach Center).
The input attributes can further be data from an analysis of interaction/comments/replies from discussions on a platform—i.e., Reddit, etc.)—so called “online social support”: “Why does no one like me”→“I'm rooting for you” or “I'm in a similar situation” (analysis of comments related to esteem or network support that may augment risk of suicidal ideation such as propensity score matching on linguistic data in comments De Choudhury, Kiciman, Dredze, Coopersmith, Kumar, CHI, 2016).
The input attributes can further be data from patterns of mental health discourse on social media (changes in linguistic structures, interpersonal awareness, social interaction and content) (De Choudhury, Kiciman, Dredze, Coppersmith, Kumar CHI 2016).
The input attributes can further be data from a social media index (De Choudhury, Counts, Horvitz. WebSci2013)—standardized difference between frequency of depression-indicative and standard posts compared to a period before between k and t−1 (1<=k<=t−1).
The input attributes can further be data from pharmacy prescription and pharmaceutical dispending data potentially including that from a prescription drug monitoring program database, electronic prescribing, pharmacy point of sale system; drug data received from a remote client device; healthcare transportation records; medical claim data; and consultation records.
The input attributes can further be communications initiated by a person or a machine.
The input attributes can further be communications including audio and/or video signals from poison center calls, lifeline/crisis line calls (i.e. 988 in the United States, 111 in the United Kingdom, etc.), emergency calls (i.e. 911 in the United States), SMS, chat, instant messaging (IM) or other communications between the communication initiator and a plurality of humans and/or machines, including: i) peer support specialists; ii) social workers; iii) healthcare personnel; iv) crisis line, emergency line, or other type of responders, operators, or bots; v) neighbors; vi) friends; vii) strangers; viii) synchronous or asynchronous virtual care visits; ix) synchronous or asynchronous virtual interactions with a plurality of individuals or machines.
The backend device receives a plurality of input attributes of a new patient event. This data may come from a client device, from the database at the server, or a combination. The data is pre-processed (for example, normalized) to generate an input data set, and the data is input into the trained model 1107 which then generates an output value. The output value is then post-processed (for example, de-normalized). Finally, the output value is classified into a suicide risk category (classification task) or a value such as the probability of a suicide attempt (regression task) to predict the outcome. For example, in the simplest case the de-normalized output value can be a Boolean value (suicide or no suicide). In another case, the output value can be a probability of a suicide occurring. In this case, the server may assign probability ranges which define particular suicide categories.
The pre-processing of said communications data may entail preparing the audio signals and voice signals for linguistics or text analysis to be carried out on the content of the communications including text extracted from this data, such as the audio signal or other sources, including that which may be derived by natural language processing with or without machine learning techniques or other means.
The pre-processing of communications data may further be permit analysis of patterns of word use such as that provided via linguistic analysis in which, for example, statistical methods, natural language processing (NLP), data science/machine learning based techniques, word databases, and taxonomies may be employed to find the most probable meaning of the content/text.
The techniques employed may include sentence detection, tokenization, lemmatization, cleaning, categorization, classification, sentiment analysis, named entity recognition, clustering, matrix factorization, latent semantic indexing, part of speech tagging, parse labeling indicating how a token is used in a sentence, phrase or utterance, dependency analysis showing how tokens are interrelated, feature extraction from raw linguistic analysis such as grouping similar topics, classifying topic of text, determining the frequency or occurrence of topics, analyzing trends and changes in attributes/characteristics over time, sentence parsing (i.e., that provided via tools like Bitext, ApacheOpenNLP, StanfordCoreNLP, and GATE), rules based analysis, for example using gazetteers that permit both lemmatization and synonym grouping, deep learning and neural networks.
The pre-processing of communications data may further entail extracting the acoustic properties from the audio signal, including that which might be derived from speech/voice signal, ambient noise signal, and other signals therein.
The acoustic properties extracted from the audio signal may include a plurality of attributes enabling the assessment of the veracity of verbal statements using acoustic-prosodic features (e.g., formant frequencies, speech intensity) and lexical features (e.g., verb tense, use of negative emotion words) in utterances.
The acoustic properties might include a plurality of attributes, such as intonation, pitch, perturbation, loudness, formant frequencies or other attributes.
The acoustic properties might further include a plurality of attributes such as subharmonics and frequency perturbation.
The acoustic properties might further include a plurality of attributes that enable assessment of a speaker's character traits, for example, using prosodic features, such as speaking rate, pitch, energy, and formants and characteristics of linguistic expression.
The acoustic properties might further include a plurality of attributes that enable: i) the elicitation of non-speech sounds associated with certain emotional states, such as crying, laughing, and sighing; ii) the determination of moods and emotions recognized using computerized methods such as: happiness, anger, sadness, neutrality, sincerity, stress, amusement, enthusiasm, friendliness, frustration, impatience, compassion, sarcasm, boredom, anxiousness, serenity, astonishment; iii) the detection of arguments or an awkward, assertive, friendly, or flirtatious mood between speakers; iv) the analysis of voice and word use parameters that identify personality traits, such as gestural expressiveness, interpersonal awkwardness, fearfulness, and emotionality; v) the evaluation of a speaker along the so-called “Big Five” personality traits (also referred to as the “OCEAN model”), comprising openness, conscientiousness, extroversion, agreeableness, and neuroticism.
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the assessment of the veracity of verbal statements using acoustic-prosodic features (e.g., formant frequencies, speech intensity) and lexical features (e.g., verb tense, use of negative emotion words) in utterances.
The acoustic properties extracted from the audio signal may identify the sex of a speaker
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the prediction of a target's age range (e.g., child, adolescent, adult, senior) or actual year of birth.
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling inferences to be made about body measures, moods and emotions, age and gender, personality traits, intention to deceive, sleepiness and intoxication, native language, physical health, mental health, impression made on other people, socioeconomic status.
Where the acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the prediction of medium-term states that affect cognitive and physical performance, such as fatigue and intoxication (i.e., using certain speech cues, such as speech onset time, speaking rate, and vocal tract coordination, as biomarkers for the separate assessment of cognitive fatigue and physical fatigue); intoxication can have various physiological effects, such as dehydration, that lead to changes in the elasticity of muscles, and reduced control over the vocal apparatus, leading to changes in speech parameters like pitch, jitter, shimmer, speech rate, speech energy, nasality, and clarity of pronunciation (“slurred speech” is, for example, a hallmark effect of excessive alcohol consumption).
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the prediction of the consumption of drugs such as ±3,4-methylenedioxymethamphetamine (“MDMA”) based on speech cues.
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the identification of a person's country of origin and the estimation of his or her “degree of nativeness” on a continuous scale.
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the identification of discriminating accents within a language, such as regional Indian accents in spoken Hindi (e.g., Kashmiri, Manipuri, Bengali, neutral Hindi) or accents within the English language (e.g., American, British, Australian, Scottish, Irish), as well as for the recognition of foreign accents, such as Albanian, Kurdish, Turkish, Arabic and Russian accent in Finnish or Hindi, Russian, Italian, Thai, and Vietnamese accent in English.
The acoustic properties extracted from the audio signal may further include a plurality of attributes that enable the identification of indicative sounds like coughs or sneezes and certain speech parameters, such as loudness, roughness, hoarseness, and nasality, providing rich information about a speaker's state of health.
The acoustic properties extracted from the audio signal may further include a plurality of attributes that enable the identification of voice cues may reveal a speaker's smoking habit.
The acoustic properties extracted from the audio signal may further include a plurality of attributes that enable the identification of speech abnormalities that are a defining characteristic of various mental illnesses such as pitch variation, verbal fluency, intonation, loudness, speech tempo, semantic coherence, and speech complexity; for example, a voice with little pitch variation is a common symptom in people suffering from schizophrenia or severe depression.
The acoustic properties extracted from the audio signal may further include a plurality of attributes that enable the identification of depressive speech which can be detected with high accuracy based on voice cues, even under adverse recording conditions.
The acoustic properties extracted from the audio signal may further include a plurality of attributes providing insight into a person's socioeconomic status such as those derived from language abilities—including vocabulary, grammatical development, complexity of utterances, productive and receptive syntax which vary significantly between different social classes, starting in early childhood; enabling people from distinct socioeconomic backgrounds to be identified based on their different modes of speech.
The acoustic properties extracted from the audio signal may further include a plurality of attributes derived from the ambient noise and background sounds.
The acoustic properties extracted from the audio signal may further include a plurality of attributes that identify ultrasonic audio signals inaudible to the human ear such as ultrasonic beacons.
The acoustic properties extracted from the audio signal may further include media sounds, such as songs and movie soundtracks, allowing identification thereof and classification of any media sounds into a genre.
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the recognition of drinking and eating moments or the type of food a person is eating (e.g., soup, rice, apple, nectarine, banana, crisps, biscuits, gummi bears).
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the identification of animal sounds (e.g., dog, cat, crow, crickets), natural sounds (e.g., rain, sea waves, wind, thunderstorm), urban sounds (e.g., church bells, fireworks, jackhammer), office sounds (e.g., mouse click, keyboard typing, printer), bathroom sounds (e.g., showering, urination, defecation, brushing teeth), domestic sounds (e.g., clock tick, page turning, creaking door, keys placed on a table), and non-speech human sounds (e.g., crying, sneezing, breathing, coughing).
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the identification of the environment in which an audio sequence originates, including indoor environments (e.g., library, restaurant, grocery store, home, metro station, office), outdoor environments (e.g., beach, city center, forest, residential area, urban park), and transport modes (e.g., bus, car, train).
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling the identification of ambient sounds that may not only allow insights into a device holder's context and location, but also into his or her preferences and activities. For example, certain environments, such as places of worship or street protests, that might potentially reveal a person's religious and political affiliations.
The acoustic properties extracted from the audio signal may further include a plurality of attributes enabling inferences about a user's biometric identity.
The biometric identity may enable matching or linking of other data tied to said individual/biometric identity from a plurality of sources.
The biometric identity may enable matching or linking to prior communications from and/or with the same individual/biometric identity.
Outputs such as inferences, categorizations, probabilities, predictions, and conclusions derived from the audio signals and the voice signals, ambient sound signals, and text, language and linguistic content therein can be used to train the system and can then be obtained by trained models of the system.
Outputs such as inferences, categorizations, probabilities, predictions, and conclusions derived from audio signals and the voice signals, ambient sounds signals, and text, language and linguistic content therein can then be inputs into other trained models of the system and be used to predict an outcome.
A method for the server device is provided for system model(s) architecture design, training of model(s) and validation of model(s) including those used in intermediate steps and any used later in the systems machine learning pipeline (i.e., deep neural networks used in any ensemble stage).
An additional method is provided to generate synthetic data from real patient data that is statistically equivalent but from which the original identity of any patients in the source data set cannot ever be derived.
The output of the server device is one of the following for a patient:
The server can also use unsupervised learning techniques as well as supervised learning techniques to determine the group or cluster to which particular patient events belong. Referring to
A representation of the process for creating, training and using the trained model is shown in
Referring to
Usually a large initial radius value is selected for the purpose of having the almost the entire network covered. n is the iteration number and lambda is a time constant (iteration limit). This calculation of the radius is basically a decreasing function whereby the value of r will diminish over the course of the training iterations, another way of saying the topological neighborhood decays with distance or that the topological neighborhood decreases monotonically over the period of iterations. Hence a greater number of SOM nodes are updated early in the training process, and on subsequent rounds there is a smaller number of nodes in the neighborhood of the BMU that get updated. At this point in the training process the connection weights are updated for the BMU and those nodes in the neighborhood of influence. The connection weight update equation is as follows:
W
k(n+1)=Wk(n)+α(n)hck(n)[x(n)−Wk(n)]
Where n is the iteration number, k is the index of the node in the SOM network, and Wk(n+1), is the updated connection weight (weight vector of node k) for the next training iteration which is calculated as shown using α(n), a monotonically decreasing learning coefficient (learning rate), hck(n), the neighborhood kernel (function)—something that, for simplicity can be called the influence factor, and [x(n)−Wk(n)], the difference between Wk(n), the old weights (the weights on the current training iteration), and x(n), a randomly selected row or input pattern from the input data that was used on the current iteration.
Thus, a simplistic way of stating this is the new weights for the next training iteration are calculated by adding the old weights from the current training iteration to the product of the learning rate multiplied by the influence factor multiplied by the difference or delta between the old weights and the randomly picked input data used for a given training iteration. Note the influence factor is often a radial based function such as the Gaussian function (though as mentioned earlier, other types of radial functions can also be used) and this is the reason why the nodes closest to the BMU have or receive more influence than those further away from the BMU which are updated by a smaller amount. Also, in regards to the learning rate, it decreases (decays) over time, meaning that in the earlier phases of the training process, there is more learning, but over the training period the learning effect will decrease in each sequential iteration. The delta between the old weights and the randomly picked input data used in a given training iteration is a determinant of how different the current SOM network node is in comparison with the randomly picked input data row used on the given training iteration. Hence, these three factors are the determinants of the updated connection weights that should be used on each subsequent training iteration for the SOM network nodes. So the learning rate and the influence factor decay over the period of iteration to allow for the proper convergence of the solution such that a stable result can be obtained at the end of training. The training process is repeated for a fixed number of N iterations to generate the trained SOM network.
Returning to
Referring to
Exemplary Implementation
Referring to
In the example shown in
In doing so, the server can determine whether (the probability that) deployment of any given available resource(s) is likely to mitigate the predicted suicide risk for a given patient event; moreover, the server's NNMs can predict the probability of a suicide occurring that would potentially be reduced if a given resource allocation recommendation is made. As shown at 2, three patients are at risk for suicide with two being high risk and one being a moderate risk of suicide. Based on business logic and these results, the server may determine it does or does not recommend that any of the available additional resources be deployed as shown at 3. There are a number of approaches the server could take to arrive at a decision to recommend or not recommend the deployment of any available resource(s). One demonstrative approach the server might take would be to recommend the deployment of an available resource if the probability weighted reduction in the risk of suicide exceeded a particular threshold. If more than one potential allocation of available resources might be feasible at any given time, the business logic of the server, for example, could be configured such that the server issues the recommendation that in the net (summed together) results in the largest probability weighted suicide reduction for the hospital system as a whole at that moment—i.e. the constellation of recommendations at that moment that collectively has the maximum potential beneficial impact (probability weighted suicide reduction) for the hospital in question. Those skilled in the art know there is a broad set of approaches that the system may take to make such recommendations and the approaches can further vary depending on the specific optimization objective(s). Moreover, while in practice the optimization technique employed may be more complex, the embodiment herein was selected to provide a simple demonstrative example of one of many potential optimization approaches the system might take. The resource allocation example herein is not intended to limit the scope of potential approaches to that described.
Therefore, the present disclosure concerns machine learning models, the disclosure's application of specific technical techniques that leverage the specific aspects or attributes of particular care episodes in hospital systems in conjunction with the other system components that permit the identification of the a suicide risk.
While only certain features of the invention have been illustrated and described herein, many modifications and changes will occur to those of ordinary skill in the art. The following claims are intended to cover all such modifications and changes.
The present application is a continuation in part of U.S. application Ser. No. 15/950,071 filed on Apr. 10,2018, which claims the benefit of U.S. Provisional Patent Application No. 62/511,320 filed on May 25, 2017, the contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
62511320 | May 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15950071 | Apr 2018 | US |
Child | 18146386 | US |