121,932 research outputs found

    Diffuse retro-reflective imaging for improved mosquito tracking around human baited bednets

    Get PDF
    Robust imaging techniques for tracking insects have been essential tools in numerous laboratory and field studies on pests, beneficial insects and model systems. Recent innovations in optical imaging systems and associated signal processing have enabled detailed characterisation of nocturnal mosquito behaviour around bednets and improvements in bednet design, a global essential for protecting populations against malaria. Nonetheless, there remain challenges around ease of use for large scale in situ recordings and extracting data reliably in the critical areas of the bednet where the optical signal is attenuated. Here we introduce a retro-reflective screen at the back of the measurement volume, which can simultaneously provide diffuse illumination, and remove optical alignment issues whilst requiring only one-sided access to the measurement space. The illumination becomes significantly more uniform, although, noise removal algorithms are needed to reduce the effects of shot noise particularly across low intensity bednet regions. By systematically introducing mosquitoes in front and behind the bednet in lab experiments we are able to demonstrate robust tracking in these challenging areas. Overall, the retro-reflective imaging setup delivers mosquito segmentation rates in excess of 90% compared to less than 70% with back-lit systems

    Municipal Stormwater Management Outreach: Improving Surface Water Quality

    Get PDF
    Stormwater runoff is the leading cause of water pollution and has evolved from being an urban flood problem to an environmental protection and regulatory function. Monitoring and managing stormwater runoff contaminants is a serious issue faced by Massachusetts municipalities in protecting their water quality standards. The goal of this project was to create a master database and an online reporting form to aid municipalities in tracking data and improving stormwater pollution prevention practices. The focus of this guidance was to provide resources to municipalities as they address the three main contemporary stormwater program challenges: budgeting issues, compliance issues, and a breakdown in communication and organization

    Implementing machine learning for data breach detection

    Get PDF
    Privata. ai is a User and Entity Behavior Analytics (UEBA) application used for the detection of data breaches in an organization. By tracking down the usual access to personal and sensitive data, it becomes much easier to detect an outlier. These anomalies could result in a real threat to the company’s data security and must, therefore, be promptly detected and addressed. This paper focuses on the managerial challenges that arise from the increasing threat of data breaches and how machine learning could help in protecting organizations from them. For this purpose, large part of the challenge came from understanding the unique specificities of these attacks and finding an appropriate machine learning method to detect them. Given the fact that the data used to train the models was randomly generated, the results should be taken with caution. Nevertheless, the models used for this paper should be taken as a basis for the future development of the software

    After Heparin: Protecting Consumers From the Risks of Substandard and Counterfeit Drugs

    Get PDF
    Based on case studies, examines globalization and quality management trends in pharmaceutical manufacturing, barriers to Federal Drug Administration oversight, and the security of pharmaceutical distribution. Makes policy recommendations to ensure safety

    Diffuse retro-reflective imaging for improved video tracking of mosquitoes at human baited bednets

    Get PDF
    Robust imaging techniques for tracking insects have been essential tools in numerous laboratory and field studies on pests, beneficial insects and model systems. Recent innovations in optical imaging systems and associated signal processing have enabled detailed characterization of nocturnal mosquito behaviour around bednets and improvements in bednet design, a global essential for protecting populations against malaria. Nonetheless, there remain challenges around ease of use for large-scale in situ recordings and extracting data reliably in the critical areas of the bednet where the optical signal is attenuated. Here, we introduce a retro-reflective screen at the back of the measurement volume, which can simultaneously provide diffuse illumination, and remove optical alignment issues while requiring only one-sided access to the measurement space. The illumination becomes significantly more uniform, although noise removal algorithms are needed to reduce the effects of shot noise, particularly across low-intensity bednet regions. By systematically introducing mosquitoes in front of and behind the bednet in laboratory experiments, we are able to demonstrate robust tracking in these challenging areas. Overall, the retro-reflective imaging set-up delivers mosquito segmentation rates in excess of 90% compared to less than 70% with backlit systems

    The RFID PIA – developed by industry, agreed by regulators

    Get PDF
    This chapter discusses the privacy impact assessment (PIA) framework endorsed by the European Commission on February 11th, 2011. This PIA, the first to receive the Commission's endorsement, was developed to deal with privacy challenges associated with the deployment of radio frequency identification (RFID) technology, a key building block of the Internet of Things. The goal of this chapter is to present the methodology and key constructs of the RFID PIA Framework in more detail than was possible in the official text. RFID operators can use this article as a support document when they conduct PIAs and need to interpret the PIA Framework. The chapter begins with a history of why and how the PIA Framework for RFID came about. It then proceeds with a description of the endorsed PIA process for RFID applications and explains in detail how this process is supposed to function. It provides examples discussed during the development of the PIA Framework. These examples reflect the rationale behind and evolution of the text's methods and definitions. The chapter also provides insight into the stakeholder debates and compromises that have important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation

    Big Brother is Listening to You: Digital Eavesdropping in the Advertising Industry

    Get PDF
    In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the United States has no satisfactory legal framework in place to curb data collection by greedy businesses or to regulate how those companies may use and protect consumer data. This Article contemplates one use of that data: digital advertising. Inspired by stories of suspiciously well-targeted advertisements appearing on social media websites, this Article additionally questions whether companies have been honest about their collection of audio data. To address the potential harms consumers may suffer as a result of this deficient privacy protection, this Article proposes a framework wherein companies must acquire users\u27 consent and the government must ensure that businesses do not use consumer information for harmful purposes
    • …
    corecore