102 research outputs found

    The Virtual Physiological Human: Ten Years After

    Get PDF
    Biomedical research and clinical practice are struggling to cope with the growing complexity that the progress of health care involves. The most challenging diseases, those with the largest socioeconomic impact (cardiovascular conditions; musculoskeletal conditions; cancer; metabolic, immunity, and neurodegenerative conditions), are all characterized by a complex genotype–phenotype interaction and by a “systemic” nature that poses a challenge to the traditional reductionist approach. In 2005 a small group of researchers discussed how the vision of computational physiology promoted by the Physiome Project could be translated into clinical practice and formally proposed the term Virtual Physiological Human. Our knowledge about these diseases is fragmentary, as it is associated with molecular and cellular processes on the one hand and with tissue and organ phenotype changes (related to clinical symptoms of disease conditions) on the other. The problem could be solved if we could capture all these fragments of knowledge into predictive models and then compose them into hypermodels that help us tame the complexity that such systemic behavior involves. In 2005 this was simply not possible—the necessary methods and technologies were not available. Now, 10 years later, it seems the right time to reflect on the original vision, the results achieved so far, and what remains to be done

    Digital Transformation

    Get PDF
    The amount of literature on Digital Transformation is staggering—and it keeps growing. Why, then, come out with yet another such document? Moreover, any text aiming at explaining the Digital Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to be already obsolete at the time it is first published. The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the point of view of a profound change that is pervading the entire society—a change made possible by technology and that keeps changing due to technology evolution opening new possibilities but is also a change happening because it has strong economic reasons. The direction of this change is not easy to predict because it is steered by a cultural evolution of society, an evolution that is happening in niches and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation, selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario so unpredictable and continuously changing.The amount of literature on Digital Transformation is staggering—and it keeps growing. Why, then, come out with yet another such document? Moreover, any text aiming at explaining the Digital Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to be already obsolete at the time it is first published. The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the point of view of a profound change that is pervading the entire society—a change made possible by technology and that keeps changing due to technology evolution opening new possibilities but is also a change happening because it has strong economic reasons. The direction of this change is not easy to predict because it is steered by a cultural evolution of society, an evolution that is happening in niches and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation, selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario so unpredictable and continuously changing

    Human Enhancement Technologies and Our Merger with Machines

    Get PDF
    A cross-disciplinary approach is offered to consider the challenge of emerging technologies designed to enhance human bodies and minds. Perspectives from philosophy, ethics, law, and policy are applied to a wide variety of enhancements, including integration of technology within human bodies, as well as genetic, biological, and pharmacological modifications. Humans may be permanently or temporarily enhanced with artificial parts by manipulating (or reprogramming) human DNA and through other enhancement techniques (and combinations thereof). We are on the cusp of significantly modifying (and perhaps improving) the human ecosystem. This evolution necessitates a continuing effort to re-evaluate current laws and, if appropriate, to modify such laws or develop new laws that address enhancement technology. A legal, ethical, and policy response to current and future human enhancements should strive to protect the rights of all involved and to recognize the responsibilities of humans to other conscious and living beings, regardless of what they look like or what abilities they have (or lack). A potential ethical approach is outlined in which rights and responsibilities should be respected even if enhanced humans are perceived by non-enhanced (or less-enhanced) humans as “no longer human” at all

    End-to-end security in active networks

    Get PDF
    Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea

    A History of Materials and Technologies Development

    Get PDF
    The purpose of the book is to provide the students with the text that presents an introductory knowledge about the development of materials and technologies and includes the most commonly available information on human development. The idea of the publication has been generated referring to the materials taken from the organic and non-organic evolution of nature. The suggested texts might be found a purposeful tool for the University students proceeding with studying engineering due to the fact that all subjects in this particular field more or less have to cover the history and development of the studied object. It is expected that studying different materials and technologies will help the students with a better understanding of driving forces, positive and negative consequences of technological development, etc

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Generalized averaged Gaussian quadrature and applications

    Get PDF
    A simple numerical method for constructing the optimal generalized averaged Gaussian quadrature formulas will be presented. These formulas exist in many cases in which real positive GaussKronrod formulas do not exist, and can be used as an adequate alternative in order to estimate the error of a Gaussian rule. We also investigate the conditions under which the optimal averaged Gaussian quadrature formulas and their truncated variants are internal
    corecore