12,891 research outputs found

    Towards Vision-Based Smart Hospitals: A System for Tracking and Monitoring Hand Hygiene Compliance

    Get PDF
    One in twenty-five patients admitted to a hospital will suffer from a hospital acquired infection. If we can intelligently track healthcare staff, patients, and visitors, we can better understand the sources of such infections. We envision a smart hospital capable of increasing operational efficiency and improving patient care with less spending. In this paper, we propose a non-intrusive vision-based system for tracking people's activity in hospitals. We evaluate our method for the problem of measuring hand hygiene compliance. Empirically, our method outperforms existing solutions such as proximity-based techniques and covert in-person observational studies. We present intuitive, qualitative results that analyze human movement patterns and conduct spatial analytics which convey our method's interpretability. This work is a step towards a computer-vision based smart hospital and demonstrates promising results for reducing hospital acquired infections.Comment: Machine Learning for Healthcare Conference (MLHC

    Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses

    Full text link
    Metaverse is expected to emerge as a new paradigm for the next-generation Internet, providing fully immersive and personalised experiences to socialize, work, and play in self-sustaining and hyper-spatio-temporal virtual world(s). The advancements in different technologies like augmented reality, virtual reality, extended reality (XR), artificial intelligence (AI), and 5G/6G communication will be the key enablers behind the realization of AI-XR metaverse applications. While AI itself has many potential applications in the aforementioned technologies (e.g., avatar generation, network optimization, etc.), ensuring the security of AI in critical applications like AI-XR metaverse applications is profoundly crucial to avoid undesirable actions that could undermine users' privacy and safety, consequently putting their lives in danger. To this end, we attempt to analyze the security, privacy, and trustworthiness aspects associated with the use of various AI techniques in AI-XR metaverse applications. Specifically, we discuss numerous such challenges and present a taxonomy of potential solutions that could be leveraged to develop secure, private, robust, and trustworthy AI-XR applications. To highlight the real implications of AI-associated adversarial threats, we designed a metaverse-specific case study and analyzed it through the adversarial lens. Finally, we elaborate upon various open issues that require further research interest from the community.Comment: 24 pages, 11 figure

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Diversity As A Trade Secret

    Get PDF
    When we think of trade secrets, we often think of famous examples such as the Coca-Cola formula, Google’s algorithm, or McDonald’s special sauce used on the Big Mac. However, companies have increasingly made the novel argument that diversity data and strategies are protected trade secrets. This may sound like an unusual, even suspicious, legal argument. Many of the industries that dominate the economy in wealth, status, and power continue to struggle with a lack of diversity. Various stakeholders have mobilized to improve access and equity, but there is an information asymmetry that makes this pursuit daunting. When potential plaintiffs and other diversity advocates request workforce statistics and related employment information, many companies have responded with virulent attempts to maintain secrecy, including the use of trade secret protection. In this Article, I use the technology industry as an example to examine the trending legal argument of treating diversity as a trade secret. I discuss how companies can use this tactic to hide gender and race disparities and interfere with the advancement of civil rights law and workplace equity. I argue that instead of permitting companies to hide information, we should treat diversity data and strategies as public resources. This type of open model will advance the goals of equal opportunity law by raising awareness of inequalities and opportunities, motivating employers to invest in effective practices, facilitating collaboration on diversity goals, fostering innovation, and increasing accountability for action and progress

    Fragile Watermarking of 3D Models in Transformed Domain

    Get PDF
    This paper presents an algorithm aimed at the integrity protection of 3D models represented as a set of vertices and polygons. The proposed method defines a procedure to perform a fragile watermarking of the vertices’ data, namely 3D coordinates and polygons, introducing a very small error in the vertices’ coordinates. The watermark bit string is embedded into a secret vector space defined by the Karhunen–Loève transform derived from a key image. Experimental results show the good performance of the method and its security

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    Enriching Discourse on Public Domains

    Get PDF
    Is there one public domain, or are there many public domains? The scholarly literature predominantly assumes there is only one, for references abound to “the public domain” in the singular. Yet, even a cursory review of this literature reveals that scholars sometimes define this term differently. So if there is only one public domain, but many definitions, perhaps one objective of scholarly discourse about the public domain should be to seek consensus on the one “true” definition.Professor James Boyle has provocatively suggested that there are many public domains, and has urged scholars to develop a rich vocabulary for distinguishing among them. He points out that the word “property” has multiple meanings, and discourse about property proceeds without confusion because legal professionals have learned to discern which meaning is intended from the textual context. Boyle urges intellectual property scholars to develop a similarly nuanced public domain vocabulary so that it will be possible to distinguish among its several meanings as well.This essay considers the potential benefits of accepting the existence of multiple public domains and ways in which discourse about public domains might be enriched thereby. Part II provides a synopsis of thirteen conceptions of the public domain found in the law review literature, explaining each, generally by reviewing the explication of it offered by its principal proponent or discoverer. Part III organizes the definitions by recognizing that they cluster around three main foci: 1) the legal status of information resources, 2) freedoms to use information resources, even if protected by IP rights, and 3) accessibility of information resources. Although it is common to think of information resources as either IP-protected or public domain, and as either publicly accessible or not, Part III shows that the public domain literature views these concepts not as binary opposites, but rather as points along a continuum. Part IV discusses the advantages and disadvantages of recognizing multiple public domains and recommends the use of adjectives to clarify discourse about the many public domains. The constitutional public domain, for instance, is distinct from the privatizable (although not yet, privatized) public domain. This Part differentiates among conceptions of public domains that should be accepted and those that perhaps should not. The principal advantage of recognizing multiple public domains is that it illuminates a range of important social values served by these domains and a plethora of strategies for preserving them and the values they serve
    • …
    corecore