5 research outputs found

    A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY

    Get PDF
    Technology use in healthcare is an integral part of diagnosis and treatment. The use of technology in medical devices and sensors is growing. These devices include implantable medical devices, and consumer health and fitness tracking devices and applications. Bluetooth Low Energy (BLE) is the most commonly used communication method in medical devices and sensors. Security and privacy are important, especially in healthcare technologies that can impact morbidity. There is an increasing need to evaluate the security and privacy of healthcare technology, especially with devices and sensors that use Bluetooth Low Energy due to the increasing prevalence and use of medical devices and sensors. Therefore, more robust security analysis is needed to evaluate security and privacy aspects of medical devices and sensors that use Bluetooth Low Energy

    Plastic surgery pioneers of the central powers in the Great War

    No full text
    Plastic surgical techniques were described in antiquity and the Middle Ages; however, the genesis of modern plastic surgery is in the early 20th century. The exigencies of trench warfare, combined with medical and technological advances at that time, enabled pioneers such as Sir Harold Gillies to establish what is now recognized as plastic and reconstructive surgery. The physicians of Germany, Russia, and the Ottoman Empire were faced with the same challenges; it is fascinating to consider parallel developments in these countries. A literature review was performed relating to the work of Esser, Lanz, Joseph, Morestin, and Filatov. Their original textbooks were reviewed. We describe the clinical, logistical, and psychological approaches to managing plastic surgical patients of these physicians and compare and contrast them to those of the Allies, identifying areas of influence such as Gillies' adoption of Filatov's tube pedicle flap

    Cybersecurity should be taught top-down and case-driven

    No full text
    This paper aims to re-engineer cybersecurity education with an innovative top-down & case-driven (TDCD) teaching model by dissecting recent high-profile cybersecurity breaches. The traditional way of teaching cybersecurity is usually bottom-up where a list of security topics are taught separately in an isolated context, with little or no effort to link these topics together. The proposed TDCD model starts with real-world cyber breaches including the Target Corporation breach, the Anthem Inc. breach, and selected Distributed Denial of Service (DDoS) attacks. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion, selected readings and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is taught top-down and driven by real-world breach cases. The proposed TDCD model is ideal for teaching cybersecurity. First, the new model can easily draw students\u27 attention and interest with real-world cases. Second, the new model can help instructors select important and timely cybersecurity topics from a wide range of options. Third, the new model can improve student learning outcomes, particularly help students gain a holistic view of security and learn socio-technical factors

    A healthier and more hopeful person: illegitimacy, mental disorder and the improved prognosis of the adolescent mother

    No full text
    This paper aims to contribute to the exploration of the shift from a problematisation of ‘unwed motherhood’ to ‘teenage motherhood’ in late twentieth century Britain. It does so by exploring the dominant social scientific understanding of ‘unwed mothers’ during the 1950s and 1960s which suggested that these women suffered from a psychological disorder. I then analyse the conceptualisation of ‘adolescent unwed mothers’ exploring why professionals deemed them to be less disturbed than older women in their predicament. This finding is discussed in light of contemporary social scientific concern with adolescent motherhood

    The First Habitable-zone Earth-sized Planet from TESS. I. Validation of the TOI-700 System

    Get PDF
    We present the discovery and validation of a three-planet system orbiting the nearby (31.1 pc) M2 dwarf star TOI-700 (TIC 150428135). TOI-700 lies in the TESS continuous viewing zone in the Southern Ecliptic Hemisphere; observations spanning 11 sectors reveal three planets with radii ranging from 1 R⊕ to 2.6 R⊕ and orbital periods ranging from 9.98 to 37.43 days. Ground-based follow-up combined with diagnostic vetting and validation tests enables us to rule out common astrophysical false-positive scenarios and validate the system of planets. The outermost planet, TOI-700 d, has a radius of 1.19 ± 0.11 R⊕ and resides within a conservative estimate of the host star's habitable zone, where it receives a flux from its star that is approximately 86% of Earth's insolation. In contrast to some other low-mass stars that host Earth-sized planets in their habitable zones, TOI-700 exhibits low levels of stellar activity, presenting a valuable opportunity to study potentially rocky planets over a wide range of conditions affecting atmospheric escape. While atmospheric characterization of TOI-700 d with the James Webb Space Telescope (JWST) will be challenging, the larger sub-Neptune, TOI-700 c (R = 2.63 R⊕), will be an excellent target for JWST and future space-based observatories. TESS is scheduled to once again observe the Southern Hemisphere, and it will monitor TOI-700 for an additional 11 sectors in its extended mission. These observations should allow further constraints on the known planet parameters and searches for additional planets and transit timing variations in the system
    corecore