4 research outputs found

    Ten simple rules for providing effective bioinformatics research support.

    Get PDF
    Life scientists are increasingly turning to high-throughput sequencing technologies in their research programs, owing to the enormous potential of these methods. In a parallel manner, the number of core facilities that provide bioinformatics support are also increasing. Notably, the generation of complex large datasets has necessitated the development of bioinformatics support core facilities that aid laboratory scientists with cost-effective and efficient data management, analysis, and interpretation. In this article, we address the challenges-related to communication, good laboratory practice, and data handling-that may be encountered in core support facilities when providing bioinformatics support, drawing on our own experiences working as support bioinformaticians on multidisciplinary research projects. Most importantly, the article proposes a list of guidelines that outline how these challenges can be preemptively avoided and effectively managed to increase the value of outputs to the end user, covering the entire research project lifecycle, including experimental design, data analysis, and management (i.e., sharing and storage). In addition, we highlight the importance of clear and transparent communication, comprehensive preparation, appropriate handling of samples and data using monitoring systems, and the employment of appropriate tools and standard operating procedures to provide effective bioinformatics support

    Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization

    Get PDF
    This is especially true given the spread of IoT, which makes it possible for two-way communication between various electronic devices and is therefore essential to contemporary living. However, it has been shown that IoT may be readily exploited. There is a need to develop new technology or combine existing ones to address these security issues. DL, a kind of ML, has been used in earlier studies to discover security breaches with good results. IoT device data is abundant, diverse, and trustworthy. Thus, improved performance and data management are attainable with help of big data technology. The current state of IoT security, big data, and deep learning led to an all-encompassing study of the topic. This study examines the interrelationships of big data, IoT security, and DL technologies, and draws parallels between these three areas. Technical works in all three fields have been compared, allowing for the development of a thematic taxonomy. Finally, we have laid the groundwork for further investigation into IoT security concerns by identifying and assessing the obstacles inherent in using DL for security utilizing big data. The security of large data has been taken into consideration in this article by categorizing various dangers using a deep learning method. The purpose of optimization is to raise both accuracy and performance

    An ontology-based secure design framework for graph-based databases

    Get PDF
    Graph-based databases are concerned with performance and flexibility. Most of the existing approaches used to design secure NoSQL databases are limited to the final implementation stage, and do not involve the design of security and access control issues at higher abstraction levels. Ensuring security and access control for Graph-based databases is difficult, as each approach differs significantly depending on the technology employed. In this paper, we propose the first technology-ascetic framework with which to design secure Graph-based databases. Our proposal raises the abstraction level by using ontologies to simultaneously model database and security requirements together. This is supported by the TITAN framework, which facilitates the way in which both aspects are dealt with. The great advantages of our approach are, therefore, that it: allows database designers to focus on the simultaneous protection of security and data while ignoring the implementation details; facilitates the secure design and rapid migration of security rules by deriving specific security measures for each underlying technology, and enables database designers to employ ontology reasoning in order to verify whether the security rules are consistent. We show the applicability of our proposal by applying it to a case study based on a hospital data access control.This work has been developed within the AETHER-UA (PID2020-112540RB-C43), AETHER-UMA (PID2020-112540RB-C41) and AETHER-UCLM (PID2020-112540RB-C42), ALBA (TED2021-130355B-C31, TED2021-130355B-C33), PRESECREL (PID2021-124502OB-C42) projects funded by the “Ministerio de Ciencia e Innovación”, Andalusian PAIDI program with grant (P18-RT-2799) and the BALLADER Project (PROMETEO/2021/088) funded by the “Consellería de Innovación, Universidades, Ciencia Sociedad Digital”, Generalitat Valenciana

    The Contribution of Ethical Governance of Artificial Intelligence & Machine Learning in Healthcare

    Get PDF
    With the Internet Age and technology progressively advancing every year, the usage of Artificial Intelligence (AI) along with Machine Learning (ML) algorithms has only increased since its introduction to society. Specifically, in the healthcare field, AI/ML has proven to its end-users how beneficial its assistance has been. However, despite its effectiveness and efficiencies, AI/ML has also been under scrutiny due to its unethical outcomes. As a result of this, two polarizing views are typically debated when discussing AI/ML. One side believes that AI/ML usage should continue regardless of its unsureness, while the other side argues that this technology is too dangerous and should not be utilized at all. Given the fact that AI/ML can provide prompt and fairly accurate results, it is unrealistic to assume that AI/ML usage will end any time soon. Therefore, governance of AI/ML is needed to ensure that these technologies are reliable. Notably, AI governance has been positively reviewed and pushed for by scholars in the field. While AI governance does guarantee a sense of oversight on AI/ML, this form of governance is not sustainable. AI governance primarily focuses on the safety of the technology, with ethical, legal, and social factors serving as elements of AI governance. The safety of AI/ML is only one of the considerations for producing and ensuring ethical AI/ML. Ethical governance of AI/ML, which concentrates on incorporating ethics into all aspects of AI/ML—specifically, narrowing in on the stakeholders involved, will lead to not only a safer product but a more viable one as well. Thus, ethical governance of AI/ML must be advocated for in order to bring more awareness, which would lead to greater research and implementation of this type of governance. Although AI/ML can be used for a multitude of areas, the healthcare industry is slightly more significant, especially since these technologies directly affect the patients’ health. This dissertation explores the contribution of ethical governance of AI/ML in several facets of healthcare. As AI/ML requires big data to provide outcomes, the context of data analytics is discussed. Other areas the dissertation explores are clinical decision-making, end-of-life decisions, and biotechnology. While these topics certainly do not cover the whole healthcare field, the dissertation attempts to include a wide range of AI/ML functions from the beginning of its process (with data analytics) to the future of AI/ML (with biotechnology). With each of these areas of interest, various ethical governance principles are introduced and endorsed for to develop ethical AI/ML. The goal of this dissertation in discussing the contribution of ethical governance of AI/ML in healthcare is to provide a foundational groundwork for more future research of the ethical governance of AI/ML
    corecore