231 research outputs found
NetShaper: A Differentially Private Network Side-Channel Mitigation System
The widespread adoption of encryption in network protocols has significantly
improved the overall security of many Internet applications. However, these
protocols cannot prevent network side-channel leaks -- leaks of sensitive
information through the sizes and timing of network packets. We present
NetShaper, a system that mitigates such leaks based on the principle of traffic
shaping. NetShaper's traffic shaping provides differential privacy guarantees
while adapting to the prevailing workload and congestion condition, and allows
configuring a tradeoff between privacy guarantees, bandwidth and latency
overheads. Furthermore, NetShaper provides a modular and portable tunnel
endpoint design that can support diverse applications. We present a
middlebox-based implementation of NetShaper and demonstrate its applicability
in a video streaming and a web service application
Towards developing a reliable medical device for automated epileptic seizure detection in the ICU
Abstract. Epilepsy is a prevalent neurological disorder that affects millions of people globally, and its diagnosis typically involves laborious manual inspection of electroencephalography (EEG) data. Automated detection of epileptic seizures in EEG signals could potentially improve diagnostic accuracy and reduce diagnosis time, but there should be special attention to the number of false alarms to reduce unnecessary treatments and costs. This research presents a study on the use of machine learning techniques for EEG seizure detection with the aim of investigating the effectiveness of different algorithms in terms of high sensitivity and low false alarm rates for feature extraction, selection, pre-processing, classification, and post-processing in designing a medical device for detecting seizure activity in EEG data. The current state-of-the-art methods which are validated clinically using large amounts of data are introduced.
The study focuses on finding potential machine learning methods, considering KNN, SVM, decision trees and, Random forests, and compares their performance on the task of seizure detection using features introduced in the literature. Also using ensemble methods namely, bootstrapping and majority voting techniques we achieved a sensitivity of 0.80 and FAR/h of 2.10, accuracy of 97.1% and specificity of 98.2%. Overall, the findings of this study can be useful for developing more accurate and efficient algorithms for EEG seizure detection medical device, which can contribute to the early diagnosis and treatment of epilepsy in the intensive care unit for critically ill patients
Pacing with restoration of respiratory sinus arrhythmia improved cardiac contractility and the left ventricular output: a translational study
Introduction: Respiratory sinus arrhythmia (RSA) is a prognostic value for patients with heart failure and is defined as a beat-to-beat variation of the timing between the heart beats. Patients with heart failure or patients with permanent cardiac pacing might benefit from restoration of RSA. The aim of this translational, proof-of-principle study was to evaluate the effect of pacing with or without restored RSAon parameters of LV cardiac contractility and the cardiac output
Bindings, boundaries and cuts: relating agency and ontology in photobook encounters
PhD ThesisThe artwork and commodity known as a “photobook” is gaining visibility as an object of creative
practice and cultural economy. It has generally been studied within photographic histories. This
thesis builds alternative ontologies of the photobook as an experiential, social artefact using a
unique methodological assemblage that responds to the object’s hybrid nature.
The enquiry posits that encounters with photobooks are “material-discursive configurations” of
matter, materiality, meaning and context, in which the photobook-object is actualised in relation
to its surroundings and the reader’s sensations and interpretations. The study foregrounds
situated moments of “encounter” between humans and photobooks, which are simultaneously
texts, images, actants and phenomena, to question what roles photobooks perform in different
circumstances – what they do. The research identifies photobook agencies including: affecting
aesthetic art experiences, mediating social and economic relations, and pushing back against
established epistemic regimes.
The study of this messy, boundary object employs counter-hegemonic techniques such as
autoethnography alongside ethnographic data to uncover relational insight into photobook
encounters, analysed through a combined lens of Actor-Network Theory, New Materialism and
Phenomenology. The iterative methodology reveals the research process’ own agency, advancing
the thesis’ argument that more-than-human entities co-produce diverse knowledges. This original
theoretical position produces a multi-faceted analysis of an under-researched artistic medium,
form and genre, which is novel for studies of photographic history and culture, as well as
interdisciplinary object studies.
Through exploring the complexities of a seemingly quotidian book-shaped thing in wide-ranging
personal and institutional encounters, the study fosters a profound, felt awareness of
relationalities between humans and non-humans. This alternative approach shows how
encounters with art objects present new, pluralistic ways of knowing that disrupt habitual
schematic modes of cutting or limiting our experiences of phenomena and things, with
meaningful consequences for rethinking our modes of acting, consuming, feeling and being in
the world.Northern Bridge Doctoral Training Partnershi
Our Mythical Education
Clearly, wherever myth forms part of an educational syllabus, value judgements have been made by those who chose the texts, with regard to content, approach, usage, emphases, purpose and many other elements. [...] the present volume examines the reception of such myth within formal education in the twentieth and twenty-first centuries […]. It focuses for the most part on school education, but with forays into post-high school where relevant, and includes a wide geographical and chronological range. With regard to the latter limitations, the general emphasis is on modern day, and the current situation, but as a result of individual historical circumstances in each example.
Lisa Maurice, Editor of the Volume
This is a task of paramount importance, as educational processes have a lasting influence on us – all the more so as we are exposed to them already in childhood, when the capacity for critical thinking is being formed by none other than school curricula shaped and developed in specific circumstances. This volume makes us aware of these complex processes, their implications, and the opportunities they create for the future of Classical Antiquity.
Katarzyna Marciniak, Editor of the Serie
A productive response to legacy system petrification
Requirements change. The requirements of a legacy information system change, often in unanticipated ways, and at a more rapid pace than the rate at which the information system itself can be evolved to support them. The capabilities of a legacy system progressively fall further and further behind their evolving requirements, in a degrading process termed petrification. As systems petrify, they deliver diminishing business value, hamper business effectiveness, and drain organisational resources. To address legacy systems, the first challenge is to understand how to shed their resistance to tracking requirements change. The second challenge is to ensure that a newly adaptable system never again petrifies into a change resistant legacy system. This thesis addresses both challenges. The approach outlined herein is underpinned by an agile migration process - termed Productive Migration - that homes in upon the specific causes of petrification within each particular legacy system and provides guidance upon how to address them. That guidance comes in part from a personalised catalogue of petrifying patterns, which capture recurring themes underlying petrification. These steer us to the problems actually present in a given legacy system, and lead us to suitable antidote productive patterns via which we can deal with those problems one by one. To prevent newly adaptable systems from again degrading into legacy systems, we appeal to a follow-on process, termed Productive Evolution, which embraces and keeps pace with change rather than resisting and falling behind it. Productive Evolution teaches us to be vigilant against signs of system petrification and helps us to nip them in the bud. The aim is to nurture systems that remain supportive of the business, that are adaptable in step with ongoing requirements change, and that continue to retain their value as significant business assets
Cybersecurity of Digital Service Chains
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems
New Strategies for Treatment of Sepsis
This book represents a collection of paper from different specialists involved in the management of septic patients, aimed to disseminate the knowledge in the field of sepsis, particularly to non-intensivists physicians
- …