111 research outputs found
Modern meat: the next generation of meat from cells
Modern Meat is the first textbook on cultivated meat, with contributions from over 100 experts within the cultivated meat community.
The Sections of Modern Meat comprise 5 broad categories of cultivated meat: Context, Impact, Science, Society, and World.
The 19 chapters of Modern Meat, spread across these 5 sections, provide detailed entries on cultivated meat. They extensively tour a range of topics including the impact of cultivated meat on humans and animals, the bioprocess of cultivated meat production, how cultivated meat may become a food option in Space and on Mars, and how cultivated meat may impact the economy, culture, and tradition of Asia
Securing Intrusion Detection Systems in IoT Networks Against Adversarial Learning: A Moving Target Defense Approach based on Reinforcement Learning
Investigating the use of moving target defense (MTD) mechanisms in IoT networks is ongoing research, with unfathomable potential to equip IoT devices and networks with the ability to fend off cyber attacks despite the computational deficiencies many IoT ecosystems typically have. The AI community has extensively studied adversarial threats and attacks on machine learning-based systems, emphasizing the need to address the potential compromise of anomaly-based intrusion detection systems (IDS) through adversarial attacks. Another concept that has gained significant attention in the networking community is Game Theory. Protecting any given network is almost a never-ending battle between the attacker and defender, and hence a natural game of competitors can be modelled based on one’s parametric specifications to gain more insight into how attackers might interact with one’s system. The goal of this thesis is to propose a comprehensive, experimentally verifiable game-theoretic model of MTD in IoT networks to secure the IDS against adversarial attacks. Once a game with state transitions based on given actions can be modelled, reinforcement learning is used to develop policies based on various episodes (rounds) of the game, ultimately optimizing network decisions to minimize successful attacks on machine learning-based IDS. The state-of-the-art ToN-IoT dataset was investigated for MTD feasibility to implement the feature-based MTD approach. The overall performance of the proposed MTD-based IDS was compared to a conventional IDS by analyzing the accuracy curve of the MTD-based IDS and the conventional IDS for varying attacker success rates and resource demands. Our approach has proven effective in securing the IDS against adversarial learning.Master of Science in Applied Computer Scienc
Efficiency and Sustainability of the Distributed Renewable Hybrid Power Systems Based on the Energy Internet, Blockchain Technology and Smart Contracts-Volume II
The climate changes that are becoming visible today are a challenge for the global research community. In this context, renewable energy sources, fuel cell systems, and other energy generating sources must be optimally combined and connected to the grid system using advanced energy transaction methods. As this reprint presents the latest solutions in the implementation of fuel cell and renewable energy in mobile and stationary applications, such as hybrid and microgrid power systems based on the Energy Internet, Blockchain technology, and smart contracts, we hope that they will be of interest to readers working in the related fields mentioned above
IoT Health Devices: Exploring Security Risks in the Connected Landscape
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century
Lost in technology: Towards a critique of repugnant rights
Modern law is founded on an idea of justice that is made felt through rights and entitlements legal subjects enjoy. As such, for law and its idea of justice, rights are inherently good and therefore abundant. On encounter with injustice, it has become commonplace to inquire what laws and rights have been flouted, as if injustice would disappear in encounter with rights that encode justice. But what if no number of laws and rights – even with faultless execution – is up for the task of upholding what we deem just? In this dissertation, I look at the heart of this question, and find the law’s answer not simply wanting but repugnant.
The research is animated by interaction of three topoi: personhood, technology, and international law. The first part concerns how these concepts are perceived in law and by those working with laws. As part of the unearthing of the conceptual ground rules, a trilemma between effectiveness, responsiveness, and coherence familiar from regulatory research and international law rears its head. I show how setting the priority on effective and responsive solutions has amounted to derogation of justice and diminishment of law’s foundational entity, a natural person. I explore whether these outcomes could be avoided within liberal international law and answer my own question on the negative. I title this systematic outcome a theory of repugnant rights.
The latter part of the dissertation concerns technology, its regulation, and tendency to produce repugnant outcomes in international law. I focus on bio- and information technologies and their legal coding as tools to dismantle legal protection provided by our quality of being human. I will show how intricate legal norms break and remake us in ways that blur the boundaries between persons and things. Once something falls beyond or below the category of a person, its legal status can be warped, twisted, and turned – all while remaining at arm’s length from the person it was once legally part of. Technological intervention to such things allows for effective circumvention of legal shelter provided by human rights, as I show through example of regulation of surrogacy and data storage.
To come to terms with the repugnancy, I seek shelter from anger as a transitory category that would enable us to move across the present impasse with rights. I suggest that at the very least international lawyers ought to be angry at quotidian horrors international law upholds. And through such anger overcome the misery and repugnancy of international law.---
Moderni oikeus pohjaa ajatukseen oikeudenmukaisuudesta, joka ilmenee oikeussubjektien nauttimien ja käyttämien oikeuksien välityksellä. Näin ymmärrettynä oikeuden ja sen omaaman oikeudenmukaisuuden käsityksen kannalta oikeudet ovat itseisarvoisesti hyviä, mikä selittää niiden suuren määrän. Kun kohtaamme epäoikeudenmukaisuutta tapaamme kysyä, mitä lakeja ja oikeuksia on loukattu, ikään kuin epäoikeudenmukaisuus kaikkoaisi sen kohdatessa oikeuden sisältämän oikeudenmukaisuuden idean. Mutta entä jos mikään määrä lakeja ja oikeuksia – edes täydellisesti täytäntöönpantuna – ei riitä puolustamaan oikeudenmukaisena pitämäämme? Väitöskirjassani kurkistan tämän kysymyksen ytimeen ja löydän vastauksen, joka ei ole ainoastaan riittämätön vaan myös vastenmielinen.
Väitöksessäni operoin oikeushenkilön, teknologian ja kansainvälisen oikeuden rajapinnoilla. Väitökseni ensimmäinen osa koskee sitä, kuinka oikeuden ja lakien parissa työskentelevät mieltävät nämä käsitteet. Näiden käsitteiden tarkastelun yhteydessä havaitsen sääntelytutkimuksesta ja kansainvälisestä oikeudesta tutun tehokkuuden, responsiivisuuden ja johdonmukaisuuden välisen trilemman. Osoitan, miten tehokkaiden ja responsiivisten ratkaisujen asettaminen etusijalle on merkinnyt lipeämistä oikeudenmukaisuudesta ja samalla oikeuden keskeisen subjektin, luonnollisen henkilön, merkityksen pienentymistä. Tutkin, voitaisiinko tämä trilemma välttää liberaalin kansainvälisen oikeuden puitteissa, ja vastaan omaan kysymykseeni kielteisesti. Nimeän tämän tuloksen vastenmielisten oikeuksien teoriaksi.
Väitöskirjan jälkimmäinen osa käsittelee teknologiaa, sen säätelyä ja sen taipumusta tuottaa vastenmielisiä lopputuloksia kansainvälisessä oikeudessa. Tarkastelen lähemmin bio- ja informaatioteknologioita ja niiden oikeudellista sääntelyä, sekä sitä millaisia välineitä ne tarjoavat ihmisyyden tarjoaman oikeudellisen suojan purkamiseen. Osoitan kuinka monimutkaiset oikeudelliset normit rikkovat ja muokkaavat meitä tavoilla, jotka hämärtävät ihmisten ja asioiden välisiä rajoja. Kun jokin ei ole enää henkilö, sen oikeudellista asemaa voidaan vääristää, vääntää ja kääntää. Teknologinen puuttuminen tällaisiin esineisiin ja asioihin mahdollistaa ihmisoikeuksien tarjoaman laillisen suojan tehokkaan kiertämisen, kuten osoitan sijaissynnytyksen ja datan tallennuksen sääntelyn kautta.
Vastauksena oikeuden vastenmielisyydelle haen suojaa vihasta. Viha tarjoaa sellaisen tilapäisen kategorian, jonka avulla voimme välttää havaitsemani oikeuksien umpikujan. Katson, että kansainvälisen oikeuden harjoittajien olisi vähintäänkin oltava vihaisia kohdatessaan kansainvälisen oikeuden synnyttämiä ja mahdollistamia jokapäiväisiä kauhuja. Turvautumalla vihaan, jonka voimme myöhemmin asettaa sivuun, voisimme selättää kansainvälisen oikeuden surkeuden ja sen vastenmielisyyden
Assuming Data Integrity and Empirical Evidence to The Contrary
Background: Not all respondents to surveys apply their minds or understand
the posed questions, and as such provide answers which lack coherence, and
this threatens the integrity of the research. Casual inspection and limited
research of the 10-item Big Five Inventory (BFI-10), included in the dataset of
the World Values Survey (WVS), suggested that random responses may be
common.
Objective: To specify the percentage of cases in the BRI-10 which include
incoherent or contradictory responses and to test the extent to which the
removal of these cases will improve the quality of the dataset.
Method: The WVS data on the BFI-10, measuring the Big Five Personality (B5P), in South Africa (N=3 531), was used. Incoherent or contradictory responses were removed. Then the cases from the cleaned-up dataset were analysed for their theoretical validity.
Results: Only 1 612 (45.7%) cases were identified as not including incoherent
or contradictory responses. The cleaned-up data did not mirror the B5P- structure, as was envisaged. The test for common method bias was negative. Conclusion: In most cases the responses were incoherent. Cleaning up the data did not improve the psychometric properties of the BFI-10. This raises concerns about the quality of the WVS data, the BFI-10, and the universality of B5P-theory. Given these results, it would be unwise to use the BFI-10 in South Africa. Researchers are alerted to do a proper assessment of the
psychometric properties of instruments before they use it, particularly in a
cross-cultural setting
Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective
Les tecnologies de la informació i la comunicació han canviat les nostres vides de manera irreversible. La indústria sanitària, una de les indústries més grans i de major creixement, està dedicant molts esforços per adoptar les últimes tecnologies en la pràctica mèdica diària. Per tant, no és sorprenent que els paradigmes sanitaris estiguin en constant evolució cercant serveis més eficients, eficaços i sostenibles. En aquest context, el potencial de la computació ubiqua mitjançant telèfons intel·ligents, rellotges intel·ligents i altres dispositius IoT ha esdevingut fonamental per recopilar grans volums de dades, especialment relacionats amb l'estat de salut i la ubicació de les persones. Les millores en les capacitats de detecció juntament amb l'aparició de xarxes de telecomunicacions d'alta velocitat han facilitat la implementació d'entorns sensibles al context, com les cases i les ciutats intel·ligents, capaços d'adaptar-se a les necessitats dels ciutadans. La interacció entre la computació ubiqua i els entorns sensibles al context va obrir la porta al paradigma de la salut intel·ligent, centrat en la prestació de serveis de salut personalitzats i de valor afegit mitjançant l'explotació de grans quantitats de dades sanitàries, de mobilitat i contextuals. No obstant, la gestió de dades sanitàries, des de la seva recollida fins a la seva anàlisi, planteja una sèrie de problemes desafiants a causa del seu caràcter altament confidencial. Aquesta tesi té per objectiu abordar diversos reptes de seguretat i privadesa dins del paradigma de la salut intel·ligent. Els resultats d'aquesta tesi pretenen ajudar a la comunitat científica a millorar la seguretat dels entorns intel·ligents del futur, així com la privadesa dels ciutadans respecte a les seves dades personals i sanitàries.Las tecnologías de la información y la comunicación han cambiado nuestras vidas de forma irreversible. La industria sanitaria, una de las industrias más grandes y de mayor crecimiento, está dedicando muchos esfuerzos por adoptar las últimas tecnologías en la práctica médica diaria. Por tanto, no es sorprendente que los paradigmas sanitarios estén en constante evolución en busca de servicios más eficientes, eficaces y sostenibles. En este contexto, el potencial de la computación ubicua mediante teléfonos inteligentes, relojes inteligentes, dispositivos wearables y otros dispositivos IoT ha sido fundamental para recopilar grandes volúmenes de datos, especialmente relacionados con el estado de salud y la localización de las personas. Las mejoras en las capacidades de detección junto con la aparición de redes de telecomunicaciones de alta velocidad han facilitado la implementación de entornos sensibles al contexto, como las casas y las ciudades inteligentes, capaces de adaptarse a las necesidades de los ciudadanos. La interacción entre la computación ubicua y los entornos sensibles al contexto abrió la puerta al paradigma de la salud inteligente, centrado en la prestación de servicios de salud personalizados y de valor añadido mediante la explotación significativa de grandes cantidades de datos sanitarios, de movilidad y contextuales. No obstante, la gestión de datos sanitarios, desde su recogida hasta su análisis, plantea una serie de cuestiones desafiantes debido a su naturaleza altamente confidencial. Esta tesis tiene por objetivo abordar varios retos de seguridad y privacidad dentro del paradigma de la salud inteligente. Los resultados de esta tesis pretenden ayudar a la comunidad científica a mejorar la seguridad de los entornos inteligentes del futuro, así como la privacidad de los ciudadanos con respecto a sus datos personales y sanitarios.Information and communication technologies have irreversibly changed our lives. The healthcare industry, one of the world’s largest and fastest-growing industries, is dedicating many efforts in adopting the latest technologies into daily medical practice. It is not therefore surprising that healthcare paradigms are constantly evolving seeking for more efficient, effective and sustainable services. In this context, the potential of ubiquitous computing through smartphones, smartwatches, wearables and IoT devices has become fundamental to collect large volumes of data, including people's health status and people’s location. The enhanced sensing capabilities together with the emergence of high-speed telecommunication networks have facilitated the implementation of context-aware environments, such as smart homes and smart cities, able to adapt themselves to the citizens needs. The interplay between ubiquitous computing and context-aware environments opened the door to the so-called smart health paradigm, focused on the provision of added-value personalised health services by meaningfully exploiting vast amounts of health, mobility and contextual data. However, the management of health data, from their gathering to their analysis, arises a number of challenging issues due to their highly confidential nature. In particular, this dissertation addresses several security and privacy challenges within the smart health paradigm. The results of this dissertation are intended to help the research community to enhance the security of the intelligent environments of the future as well as the privacy of the citizens regarding their personal and health data
Death & policy: toward an understanding of motivational reactivity as a predictor of partisanship in response to mortality salient media
As biomedical advancements continue to improve, the line between life and death continues to blur. At the same time, the American populace is challenged by a variety of competing cultural values in respect to end-of-life rights and post-mortem care, the result of which is often heated debate within an already polarized political arena. These realities make the prospect of satisfactory advancement of end-of-life care reform worrisome. The present study sought to find a constructive pathway forward by exploring the psychological framework for mortality salient processing posited by terror management theory as it relates to subsequent affective polarization. In working to bolster this theory’s predictive power by incorporating individual-level cognitive traits, namely motivational reactivity and self-compassion, in conditional process models, the author also aimed to gain a better understanding for the individual-level conditions that support political cohesion in the face of death-related policies and messaging. Though findings did not achieve statistical significance, they signal an important role of innate traits as predictors of mortality salience processing while also calling for additional studies that reliably account for lifestyle influences
- …