74,381 research outputs found

    Focus on: New trends, challenges and perspectives on healthcare cognitive computing: from information extraction to healthcare analytics

    Get PDF
    The focus of this special issue is cognitive computing in healthcare, due to the ever-increasing interest it is gaining for both research purposes and clinical applications. Indeed, cognitive computing is a challenging technology in many fields of application (Banavar, 2016) such as, e.g., medicine, education or eco- nomics (Coccoli et al., 2016) especially for the management of huge quantities of information where cognitive computing techniques push applications based on the use of big data (Coccoli et al., 2017). An unprecedented amount of data is made available from a heterogeneous variety of sources and this is true also in the case of health data, which can be exploited in many ways by means of sophisticated cognitive computing solutions and related technologies, such as, e.g., information extraction, natural language processing, and analytics. Also, from the point of view of programming they set challenging issues (see, e.g., Coccoli et al., 2015). In fact, the amount of healthcare that is now available and, potentially useful to care teams, reached 150 Exabytes worldwide and about 80% of this huge volume of data is in an unstructured form, being thus somehow invisible to systems. Hence, it is clear that cognitive computing and data analytics are the two key factors we have for make use – at least partially – of such a big volume of data. This can lead to personalized health solutions and healthcare systems that are more reliable, effective and efficient also re- ducing their expenditures. Healthcare will have a big impact on industry and research. However, this field, which seems to be a new era for our society, requires many scientific endeavours. Just to name a few, you need to create a hybrid and secure cloud to guarantee the security and confidentiality of health data, especially when smartphones or similar devices are used with specific app (see, e.g., Mazurczyk & Caviglione, 2015). Beside the cloud, you also need to consider novel ar- chitectures and data platforms that shall be different from the existing ones,because 90% of health and biomedical data are images and also because 80% of health data in the world is not available on the Web. This special issue wants to review state-of-the-art of issues and solutions of cognitive computing, focusing also on the current challenges and perspecti- ves and includes a heterogeneous collection of papers covering the following topics: information extraction in healthcare applications, semantic analysis in medicine, data analytics in healthcare, machine learning and cognitive com- puting, data architecture for healthcare, data platform for healthcare, hybrid cloud for healthcare

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

    Full text link
    The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart gridComment: 5 pages, 2 figure

    The Utilization of Mobile Technology for Crime Scene Investigation in the San Francisco Bay Area

    Get PDF
    The research presented aims to explore factors affecting the decision to adopt a mobile crime scene investigation application in police departments throughout the San Francisco Bay Area. To accomplish this goal, the mobile technology acceptance model was used in designing a survey for data collection. This model utilizes four categories to interpret the factors that influence a police officer’s decision to accept or reject mobile technologies: performance, security and reliability, management style, and cognitive acceptance. Nine police departments were sampled through a series of in-person and over-the-phone interviews to obtain data regarding factors affecting the adoption of a mobile crime scene investigation application. Results suggest that if a mobile crime scene investigation application were made available, a vast majority of the police departments in the Bay Area would implement this new technology
    • …
    corecore