8,147 research outputs found

    Privacy-aware secured discrete framework in wireless sensor network

    Get PDF
    Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol

    El rediseño de la arquitectura financiera internacional desde la perspectiva latinoamericana: ¿quién paga la cuenta?

    Get PDF
    (Disponible en idioma inglés únicamente) En este trabajo se toma en cuenta las reformas actuales o propuestas del sistema financiero internacional, a la luz de la experiencia latinoamericana reciente. La mayoría de las propuestas se basan en uno de tres diagnósticos: flujos excesivos de capitales, flujos insuficientes de capitales y flujos de capitales excesivamente inestables. Aunque las teorías de flujos excesivos de capitales carecen de base empírica, esos puntos de vista subyacen tanto a las reformas actuales como las sugeridas. En una sección posterior se evalúan propuestas que tienen que ver con el apoyo financiero oficial, la participación del sector privado y normas y reglamentos financieros. El trabajo verifica las medidas destinadas a reducir el contagio y las crisis de liquidez, tales como un tribunal internacional de quiebras, y atribuye las dificultades financieras en América Latina en parte al pecado original, es decir, la incapacidad de los países de endeudarse a plazos largos en sus propias monedas.

    Differential Privacy - A Balancing Act

    Get PDF
    Data privacy is an ever important aspect of data analyses. Historically, a plethora of privacy techniques have been introduced to protect data, but few have stood the test of time. From investigating the overlap between big data research, and security and privacy research, I have found that differential privacy presents itself as a promising defender of data privacy.Differential privacy is a rigorous, mathematical notion of privacy. Nevertheless, privacy comes at a cost. In order to achieve differential privacy, we need to introduce some form of inaccuracy (i.e. error) to our analyses. Hence, practitioners need to engage in a balancing act between accuracy and privacy when adopting differential privacy. As a consequence, understanding this accuracy/privacy trade-off is vital to being able to use differential privacy in real data analyses.In this thesis, I aim to bridge the gap between differential privacy in theory, and differential privacy in practice. Most notably, I aim to convey a better understanding of the accuracy/privacy trade-off, by 1) implementing tools to tweak accuracy/privacy in a real use case, 2) presenting a methodology for empirically predicting error, and 3) systematizing and analyzing known accuracy improvement techniques for differentially private algorithms. Additionally, I also put differential privacy into context by investigating how it can be applied in the automotive domain. Using the automotive domain as an example, I introduce the main challenges that constitutes the balancing act, and provide advice for moving forward

    Protective Mechanisms in Lower Limb to Noxious Stimuli:The Nociceptive Withdrawal Reflex

    Get PDF

    Derivatives and systemic risk: netting, collateral, and closeout

    Get PDF
    In the U.S., as in most countries with well-developed securities markets, derivative securities enjoy special protections under insolvency resolution laws. Most creditors are “stayed” from enforcing their rights while a firm is in bankruptcy. However, many derivatives contracts are exempt from these stays. Furthermore, derivatives enjoy netting and close-out, or termination, privileges which are not always available to most other creditors. The primary argument used to motivate passage of legislation granting these extraordinary protections is that derivatives markets are a major source of systemic risk in financial markets and that netting and close- out reduce this risk. ; To date, these assertions have not been subjected to rigorous economic scrutiny. This paper critically reexamines this hypothesis. These relationships are more complex than often perceived. We conclude that it is not clear whether netting, collateral, and/or close-out lead to reduced systemic risk, once the impact of these protections on the size and structure of the derivatives market has been taken into account.Derivative securities ; Financial markets

    Biological Subphenotypes of Acute Respiratory Distress Syndrome Show Prognostic Enrichment in Mechanically Ventilated Patients without Acute Respiratory Distress Syndrome

    Get PDF
    Rationale: Recent studies showed that biological subphenotypes in acute respiratory distress syndrome (ARDS) provide prognostic enrichment and show potential for predictive enrichment.Objectives: To determine whether these subphenotypes and their prognostic and potential for predictive enrichment could be extended to other patients in the ICU, irrespective of fulfilling the definition of ARDS.Methods: This is a secondary analysis of a prospective observational study of adult patients admitted to the ICU. We tested the prognostic enrichment of both cluster-derived and latentclass analysis (LCA)-derived biological ARDS subphenotypes by evaluating the association with clinical outcome (ICU-day, 30-day mortality, and ventilator-free days) using logistic regression and Cox regression analysis. We performed a principal component analysis to compare blood leukocyte gene expression profiles between subphenotypes and the presence of ARDS.Measurements and Main Results: We included 2,499 mechanically ventilated patients (674 with and 1,825 without ARDS). The cluster-derived "reactive" subphenotype was, independently of ARDS, significantly associated with a higher probability of ICU mortality, higher 30-day mortality, and a lower probability of successful extubation while alive compared with the "uninflamed" subphenotype. The blood leukocyte gene expression profiles of individual subphenotypes were similar for patients with and without ARDS. LCA-derived subphenotypes also showed similar profiles.Conclusions: The prognostic and potential for predictive enrichment of biological ARDS subphenotypes may be extended to mechanically ventilated critically ill patients without ARDS. Using the concept of biological subphenotypes for splitting cohorts of critically ill patients could add to improving future precision-based trial strategies and lead to identifying treatable traits for all critically ill patients

    Coordination and Privacy Preservation in Multi-Agent Systems

    Get PDF
    This dissertation considers two key problems in multi-agent systems: coordination (including both synchronization and desynchronization) and privacy preservation. For coordination in multi-agent systems, we focus on synchronization/desynchronization of distributed pulse-coupled oscillator (PCO) networks and their applications in collective motion coordination. Pulse-coupled oscillators were originally proposed to model synchronization in biological systems such as flashing fireflies and firing neurons. In recent years, with proven scalability, simplicity, accuracy, and robustness, the PCO based synchronization strategy has become a powerful clock synchronization primitive for wireless sensor networks. Driven by these increased applications in biological networks and wireless sensor networks, synchronization of pulse-coupled oscillators has gained increased popularity. However, most existing results address the local synchronization of PCOs with initial phases constrained in a half cycle, and results on global synchronization from any initial condition are very sparse. In our work, we address global PCO synchronization from an arbitrary phase distribution under chain or directed tree graphs. More importantly, different from existing global synchronization studies on decentralized PCO networks, our work allows heterogeneous coupling functions and perturbations on PCOs\u27 natural frequencies, and our results hold under any coupling strength between zero and one, which is crucial because a large coupling strength has been shown to be detrimental to the robustness of PCO synchronization to disturbances. Compared with synchronization, desynchronization of PCOs is less explored. Desynchronization spreads the phase variables of all PCOs uniformly apart (with equal difference between neighboring phases). It has also been found in many biological phenomena, such as neuron spiking and fish signaling. Recently, phase desynchronization has been employed to achieve round-robin scheduling, which is crucial in applications as diverse as media access control of communication networks, realization of analog-to-digital converters, and scheduling of traffic flows in intersections. In our work, we systematically characterize pulse-coupled oscillators based decentralized phase desynchronization and propose an interaction function that is more general than existing results. Numerical simulations show that the proposed pulse based interaction function also has better robustness to pulse losses, time delays, and frequency errors than existing results. Collective motion coordination is fundamental in systems as diverse as mobile sensor networks, swarm robotics, autonomous vehicles, and animal groups. Inspired by the close relationship between phase synchronization/desynchronization of PCOs and the heading dynamics of connected vehicles/robots, we propose a pulse-based integrated communication and control approach for collective motion coordination. Our approach only employs simple and identical pulses, which significantly reduces processing latency and communication delay compared with conventional packet based communications. Not only can heading control be achieved in the proposed approach to coordinate the headings (orientations) of motions in a network, but also spacing control for circular motion is achievable to design the spacing between neighboring nodes (e.g., vehicles or robots). The second part of this dissertation is privacy preservation in multi-agent systems. More specifically, we focus on privacy-preserving average consensus as it is key for multi-agent systems, with applications ranging from time synchronization, information fusion, load balancing, to decentralized control. Existing average consensus algorithms require individual nodes (agents) to exchange explicit state values with their neighbors, which leads to the undesirable disclosure of sensitive information in the state. In our work, we propose a novel average consensus algorithm for time-varying directed graphs which can protect the privacy of participating nodes\u27 initial states. Leveraging algorithm-level obfuscation, the algorithm does not need the assistance of any trusted third party or data aggregator. By leveraging the inherent robustness of consensus dynamics against random variations in interaction, our proposed algorithm can guarantee privacy of participating nodes without compromising the accuracy of consensus. The algorithm is distinctly different from differential-privacy based average consensus approaches which enable privacy through compromising accuracy in obtained consensus value. The approach is able to protect the privacy of participating nodes even in the presence of multiple honest-but-curious nodes which can collude with each other
    • …
    corecore