1,679 research outputs found

    Privacy-preserving artificial intelligence in healthcare: Techniques and applications

    Get PDF
    There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial research worldwide, very few AI-based applications have successfully made it to clinics. Key barriers to the widespread adoption of clinically validated AI applications include non-standardized medical records, limited availability of curated datasets, and stringent legal/ethical requirements to preserve patients' privacy. Therefore, there is a pressing need to improvise new data-sharing methods in the age of AI that preserve patient privacy while developing AI-based healthcare applications. In the literature, significant attention has been devoted to developing privacy-preserving techniques and overcoming the issues hampering AI adoption in an actual clinical environment. To this end, this study summarizes the state-of-the-art approaches for preserving privacy in AI-based healthcare applications. Prominent privacy-preserving techniques such as Federated Learning and Hybrid Techniques are elaborated along with potential privacy attacks, security challenges, and future directions. [Abstract copyright: Copyright © 2023 The Author(s). Published by Elsevier Ltd.. All rights reserved.

    Autonomous Vehicles an overview on system, cyber security, risks, issues, and a way forward

    Full text link
    This chapter explores the complex realm of autonomous cars, analyzing their fundamental components and operational characteristics. The initial phase of the discussion is elucidating the internal mechanics of these automobiles, encompassing the crucial involvement of sensors, artificial intelligence (AI) identification systems, control mechanisms, and their integration with cloud-based servers within the framework of the Internet of Things (IoT). It delves into practical implementations of autonomous cars, emphasizing their utilization in forecasting traffic patterns and transforming the dynamics of transportation. The text also explores the topic of Robotic Process Automation (RPA), illustrating the impact of autonomous cars on different businesses through the automation of tasks. The primary focus of this investigation lies in the realm of cybersecurity, specifically in the context of autonomous vehicles. A comprehensive analysis will be conducted to explore various risk management solutions aimed at protecting these vehicles from potential threats including ethical, environmental, legal, professional, and social dimensions, offering a comprehensive perspective on their societal implications. A strategic plan for addressing the challenges and proposing strategies for effectively traversing the complex terrain of autonomous car systems, cybersecurity, hazards, and other concerns are some resources for acquiring an understanding of the intricate realm of autonomous cars and their ramifications in contemporary society, supported by a comprehensive compilation of resources for additional investigation. Keywords: RPA, Cyber Security, AV, Risk, Smart Car

    Family Life in the Time of COVID: International Perspectives

    Get PDF
    COVID-19 turned the world as we knew it upside down, impacting families around the world in profound ways. Seeking to understand this global experience, Family Life in the Time of COVID brings together case studies from 10 countries that explore how local responses to the pandemic shaped, and were shaped by, understandings and practices of family life. Carried out by an international team during the first year of the pandemic, these in-depth, longitudinal, qualitative investigations examined the impact of the pandemic on families and relationships across diverse contexts and cultures. They looked at how families made sense of complex lockdown laws, how they coped with collective worry about the unknown, managed their finances, fed themselves, and got to grips with online work and schooling to understand better how life had transformed (or not). In short, the research revealed their everyday joys and struggles in times of great uncertainty. Each case study follows the same methodology revealing experiences in Argentina, Chile, Pakistan, Russia, Singapore, South Africa, Sweden, Taiwan, the United Kingdom and the USA. They show how local government responses were understood and responded to by families, and how different cultures and life circumstances impacted everyday life during the pandemic. Ultimately the analysis demonstrates how experiences of global social upheaval are shaped by international and local policies, as well as the sociocultural ideas and practices of diverse families

    Resilient and Scalable Forwarding for Software-Defined Networks with P4-Programmable Switches

    Get PDF
    Traditional networking devices support only fixed features and limited configurability. Network softwarization leverages programmable software and hardware platforms to remove those limitations. In this context the concept of programmable data planes allows directly to program the packet processing pipeline of networking devices and create custom control plane algorithms. This flexibility enables the design of novel networking mechanisms where the status quo struggles to meet high demands of next-generation networks like 5G, Internet of Things, cloud computing, and industry 4.0. P4 is the most popular technology to implement programmable data planes. However, programmable data planes, and in particular, the P4 technology, emerged only recently. Thus, P4 support for some well-established networking concepts is still lacking and several issues remain unsolved due to the different characteristics of programmable data planes in comparison to traditional networking. The research of this thesis focuses on two open issues of programmable data planes. First, it develops resilient and efficient forwarding mechanisms for the P4 data plane as there are no satisfying state of the art best practices yet. Second, it enables BIER in high-performance P4 data planes. BIER is a novel, scalable, and efficient transport mechanism for IP multicast traffic which has only very limited support of high-performance forwarding platforms yet. The main results of this thesis are published as 8 peer-reviewed and one post-publication peer-reviewed publication. The results cover the development of suitable resilience mechanisms for P4 data planes, the development and implementation of resilient BIER forwarding in P4, and the extensive evaluations of all developed and implemented mechanisms. Furthermore, the results contain a comprehensive P4 literature study. Two more peer-reviewed papers contain additional content that is not directly related to the main results. They implement congestion avoidance mechanisms in P4 and develop a scheduling concept to find cost-optimized load schedules based on day-ahead forecasts

    Data ethics : building trust : how digital technologies can serve humanity

    Get PDF
    Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century: For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car, from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad, for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world? How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication. The authors and institutions come from all continents. The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust! The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors

    2023- The Twenty-seventh Annual Symposium of Student Scholars

    Get PDF
    The full program book from the Twenty-seventh Annual Symposium of Student Scholars, held on April 18-21, 2023. Includes abstracts from the presentations and posters.https://digitalcommons.kennesaw.edu/sssprograms/1027/thumbnail.jp

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum

    Animate Being: Extending a Practice of the Image to New Mediums via Speculative Game Design

    Get PDF
    This post-disciplinary practice as research thesis examines the potential of Carl Jung's therapeutic method of active imagination as a strategy for engaging with an increasingly complex and interconnected technological reality. Embracing a non-clinical, practice-driven approach, I harness James Hillman’s notion of the image and the imaginal to investigate the interdisciplinary capacity and ethical dimensions of an expansive mode of image-work. My approach to practice theoretically and practically intertwines analytical psychology, feminist worlding and design speculation. Building upon Susan Rowland’s work, I study image-work as an ecological alchemical craft that seeks to matter the immaterial. Through the cyclic iterative design of a video game, I mobilise and respond to image-work as a mode of myth-making that may facilitate dialogue between human and non-human intelligences. Departing from the essentialism of the hero's journey, I adopt Le Guin's Carrier Bag (1986/2019) as a feminist video game form and by utilising the framework of a video game (Bogost, 2007; Flannigan, 2013), the alchemical processes of image-work are transformed into novel interactive game mechanics. The game I design is both a vessel and a portal to an imaginal ecological realm, an open-world, procedurally generated ‘living world’ sandbox exploration game. This game integrates real-time, real-world data streams to invite the non-human to enter into play as player two, facilitating experimentation with possible new forms of cross-species dialogue, collaboration, and healing

    A framework to assess the authenticity of subjective information in the integration of blockchain technology - an application in supply chain management.

    Full text link
    Blockchain technology has burgeoned due to the booming value of cryptocurrency capitalisation. It enables financial transactions to be carried out without a bank or a third party regulating them. Aspects such as privacy, trust, security, and transparency of a transaction are ensured by its immutability characteristics. These features of blockchain have resulted in it being used in other domains, such as supply chains. As the adoption of blockchain has expanded, it is currently being applied in domains where there is an equal chance of opinions, facts, and personal commitment being part of the business operation. One such area is proactive supply chain risk management (SCRM). Previous researchers have often highlighted the fraudulent behaviour of supply chain partners who do not disclose information on the risks that impact their operations. Despite this, very few researchers consider subjective information in the processing of blockchain. Those who take this into consideration acknowledge the presence of such information but do not utilize it in the processing of blockchain. Blockchain can address this problem by encoding each partner's commitment to SCRM and achieving consensus. However, before this can be achieved, a key challenge to address is the inability of existing consensus mechanisms such as Proof of Work (PoW), Proof of Authority (PoA) and Proof of Stake (PoS) to deal with information that does not have a digital footprint such as claims, opinions, promises, or communications between supply chain partners when they form a Service Level Agreement (SLA). This type of information is called subjective information. Addressing this research gap is very important if the true potential of blockchain in providing a single source of truth in a domain, irrespective of what type of information is used, is to be achieved. Thus, future research should investigate a new consensus mechanism with a unified framework that not only stores this information but determines its trustworthiness. This thesis addresses this gap by proposing the Proof of Earnestness (PoE) consensus mechanism which accounts for the authenticity, legitimacy and trustworthiness of information that does not have a digital footprint. This thesis also proposes the Subjective Information Authenticity Earnestness Framework (SIAEF) as the overarching framework that assists PoE in achieving its aim. SIAEF comprises four modules, namely the Identification module, the Mapping module, the Data collection & Impact determination module and Local consensus & Global legitimacy module. These modules provide a complete solution to identify subjective information in an SLA, detect the potential operational risk term which may potentially impact a responsible partner who commits to the subjective information, collate its real-world occurrences in the geographic region of interest, then determine the responsible partner's adherence to what it had recommitted. SIAEF assists in achieving PoE's aim of generating a digital footprint of a responsible partner’s earnestness in communicating subjective information. Once this footprint is generated, existing consensus mechanisms such as PoW, PoS or PoA are used to encode this information in blockchains. Each module is computed in the application of machine learning and natural language processing with recent techniques, metrics and evaluation. The applicability of SIAEF and PoE is tested in a real-world blockchain environment by deploying it as a Decentralized application (Dapp) and applying it in BscScan Testnet which is an official test blockchain network. The thesis will contribute to the existing literature by proposing a new consensus mechanism and its framework to assist the existing blockchain framework in verifying and validating the truthfulness of subjective information. Supply chain partners can use the SIAEF framework as a reference to choose a potential partner with whom to form an SLA, preventing opportunistic and fraudulent behaviours in supply chain management
    corecore