121,932 research outputs found
Diffuse retro-reflective imaging for improved mosquito tracking around human baited bednets
Robust imaging techniques for tracking insects have been essential tools in numerous laboratory and field studies on pests, beneficial insects and model systems. Recent innovations in optical imaging systems and associated signal processing have enabled detailed characterisation of nocturnal mosquito behaviour around bednets and improvements in bednet design, a global essential for protecting populations against malaria. Nonetheless, there remain challenges around ease of use for large scale in situ recordings and extracting data reliably in the critical areas of the bednet where the optical signal is attenuated. Here we introduce a retro-reflective screen at the back of the measurement volume, which can simultaneously provide diffuse illumination, and remove optical alignment issues whilst requiring only one-sided access to the measurement space. The illumination becomes significantly more uniform, although, noise removal algorithms are needed to reduce the effects of shot noise particularly across low intensity bednet regions. By systematically introducing mosquitoes in front and behind the bednet in lab experiments we are able to demonstrate robust tracking in these challenging areas. Overall, the retro-reflective imaging setup delivers mosquito segmentation rates in excess of 90% compared to less than 70% with back-lit systems
Municipal Stormwater Management Outreach: Improving Surface Water Quality
Stormwater runoff is the leading cause of water pollution and has evolved from being an urban flood problem to an environmental protection and regulatory function. Monitoring and managing stormwater runoff contaminants is a serious issue faced by Massachusetts municipalities in protecting their water quality standards. The goal of this project was to create a master database and an online reporting form to aid municipalities in tracking data and improving stormwater pollution prevention practices. The focus of this guidance was to provide resources to municipalities as they address the three main contemporary stormwater program challenges: budgeting issues, compliance issues, and a breakdown in communication and organization
Implementing machine learning for data breach detection
Privata. ai is a User and Entity Behavior Analytics (UEBA) application used for the detection of data breaches in an organization. By tracking down the usual access to personal and sensitive data, it becomes much easier to detect an outlier. These anomalies could result in a real threat to the company’s data security and must, therefore, be promptly detected and addressed. This paper focuses on the managerial challenges that arise from the increasing threat of data breaches and how machine learning could help in protecting organizations from them. For this purpose, large part of the challenge came from understanding the unique specificities of these attacks and finding an appropriate machine learning method to detect them. Given the fact that the data used to train the models was randomly generated, the results should be taken with caution. Nevertheless, the models used for this paper should be taken as a basis for the future development of the software
After Heparin: Protecting Consumers From the Risks of Substandard and Counterfeit Drugs
Based on case studies, examines globalization and quality management trends in pharmaceutical manufacturing, barriers to Federal Drug Administration oversight, and the security of pharmaceutical distribution. Makes policy recommendations to ensure safety
Diffuse retro-reflective imaging for improved video tracking of mosquitoes at human baited bednets
Robust imaging techniques for tracking insects have been essential tools in numerous laboratory and field studies on pests, beneficial insects and model systems. Recent innovations in optical imaging systems and associated signal processing have enabled detailed characterization of nocturnal mosquito behaviour around bednets and improvements in bednet design, a global essential for protecting populations against malaria. Nonetheless, there remain challenges around ease of use for large-scale in situ recordings and extracting data reliably in the critical areas of the bednet where the optical signal is attenuated. Here, we introduce a retro-reflective screen at the back of the measurement volume, which can simultaneously provide diffuse illumination, and remove optical alignment issues while requiring only one-sided access to the measurement space. The illumination becomes significantly more uniform, although noise removal algorithms are needed to reduce the effects of shot noise, particularly across low-intensity bednet regions. By systematically introducing mosquitoes in front of and behind the bednet in laboratory experiments, we are able to demonstrate robust tracking in these challenging areas. Overall, the retro-reflective imaging set-up delivers mosquito segmentation rates in excess of 90% compared to less than 70% with backlit systems
The RFID PIA – developed by industry, agreed by regulators
This chapter discusses the privacy impact assessment (PIA) framework endorsed
by the European Commission on February 11th, 2011. This PIA, the first to receive the
Commission's endorsement, was developed to deal with privacy challenges associated with
the deployment of radio frequency identification (RFID) technology, a key building block of
the Internet of Things. The goal of this chapter is to present the methodology and key
constructs of the RFID PIA Framework in more detail than was possible in the official text.
RFID operators can use this article as a support document when they conduct PIAs and need
to interpret the PIA Framework. The chapter begins with a history of why and how the PIA
Framework for RFID came about. It then proceeds with a description of the endorsed PIA
process for RFID applications and explains in detail how this process is supposed to function.
It provides examples discussed during the development of the PIA Framework. These
examples reflect the rationale behind and evolution of the text's methods and definitions. The
chapter also provides insight into the stakeholder debates and compromises that have
important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation
Big Brother is Listening to You: Digital Eavesdropping in the Advertising Industry
In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the United States has no satisfactory legal framework in place to curb data collection by greedy businesses or to regulate how those companies may use and protect consumer data. This Article contemplates one use of that data: digital advertising. Inspired by stories of suspiciously well-targeted advertisements appearing on social media websites, this Article additionally questions whether companies have been honest about their collection of audio data. To address the potential harms consumers may suffer as a result of this deficient privacy protection, this Article proposes a framework wherein companies must acquire users\u27 consent and the government must ensure that businesses do not use consumer information for harmful purposes
- …