112 research outputs found

    Exhaled nitric oxide measurements with dynamic flow restriction in children aged 4-8 yrs

    Get PDF
    Fractional exhaled nitric oxide concentration (FENO) depends on exhalation flow; however, children often are unable to perform controlled flow procedures. Therefore, a device was developed for off-line FENO sampling, with dynamic flow restriction (DFR). The authors compared off-line w

    Test-Time Training for Image Inpainting

    Get PDF
    Image inpainting is the task of filling missing regions in images with plausible and coherent content. The usual process involves training a CNN on a large collection of examples that it can learn from, to later apply this knowledge on new, unseen images with areas to complete. One important consideration is that each training dataset has its own domain, and domains in the image space are extremely diverse. For optimal results, the user image at inference time should belong to the same domain as the training examples, which greatly limits the range of inputs a trained network can be used for. Moreover, collecting new data is hard, and training on different datasets requires a great amount of computation power and time. In this thesis, we propose a test-time learning approach for inpainting. More specifically, we train a CNN like described above, but in addition, we use the user image with holes to build a new dataset, on which we continue training the network for a small number of iterations during test-time training. To the best of our knowledge, test-time training has never been done for inpainting. With this technique, our hope is that the model will learn to fill holes that are specific to the user image better. It also facilitates domain adaptation, which means that a wider range of input domains at inference time can produce acceptable results when using the same pretrained model. We obtain results demonstrating that even for a state-of-the-art model, our method can achieve significant improvements, in particular for perceptual scores. Moreover, if used in a software, it has the advantage of being optional, meaning that the user can choose to keep the original result if there is no significant improvement, which makes our framework beneficial in all situations

    Integrating CSI Sensing in Wireless Networks: Challenges to Privacy and Countermeasures

    Get PDF
    The path toward 6G is still long and blurred, but a few key points seem to be already decided: integration of many different access networks; adoption of massive MIMO technologies; use of frequencies above current radio spectrum up to THz and beyond; and inclusion of artificial intelligence and machine learning in standard management and operations. One additional point that is less discussed, but seems key for success, is the advanced use of channel state information (CSI) for both equalization and decoding purposes as well as for sensing ones. CSI-based sensing promises a plethora of new applications and a quantum leap in service personalization and customer-centric network management. At the same time, CSI analysis, being based on the physical characteristics of the propagated signal, poses novel threats to people's privacy and security: No software-based solution or cryptographic method above the physical layer can prevent the analysis of CSI. CSI analysis can reveal people's position or activity, allow tracking them, and discover details on the environment that today can be seen only with cameras or radars. In this article, we discuss the current status of CSI-based sensing and present some technologies that can protect people's privacy and at the same time allow legitimate use of the information carried by the CSI to offer better services

    On the Implementation of Location Obfuscation in openwifi and Its Performance

    Get PDF
    Wi-Fi sensing as a side-effect of communications is opening new opportunities for smart services integrating communications with environmental properties, first and foremost the position of devices and people. At the same time, this technology represents an unprecedented threat to people’s privacy, as personal information can be collected directly at the physical layer without any possibility to hide or protect it. Several works already discussed the possibility of safeguarding users’ privacy without hampering communication performance. Usually, some signal pre-processing at the transmitter side is needed to introduce pseudo-random (artificial) patterns in the channel response estimated at the receiver, preventing the extraction of meaningful information from the channel state. However, there is currently just one implementation of such techniques in a real system (openwifi), and it has never been tested for performance. In this work, we present the implementation of a location obfuscation technique within the openwifi project that enables fine manipulation of the radio signal at transmitter side and yields acceptable, if not good, performance. The paper discusses the implementation of the obfuscation subsystem, its performance, possible improvements, and further steps to allow authorized devices to “de-obfuscate” the signal and retrieve the sensed information

    Can Platoons Form on Their Own?

    Get PDF
    Research on platooning has tackled many different facets of the topic, from lateral and longitudinal control to algorithms for optimization of platoon size and coordination. However, very few works started addressing the following two foundational questions. The first: Given a stretch of road where platooning is enabled and some form of V2X communication is feasible, will vehicles be able to organize locally in platoons without the need of central intervention? The second: Is a coordination protocol for platoon formation possible, or will traffic dynamics prevent the efficient formation of platoons? This paper gives a first, positive answer to these questions: A platoon formation protocol is proposed and tested upon DSRC communications, though it can be implemented on top of any transmission technology. We assess the performance in terms of platoon formation efficiency, on a multi-lane highway, as a function of the penetration rate of platooning-enabled vehicles and traffic characteristics. Realistic simulation results highlight the properties of the protocol as well as the impact of different traffic parameters, foremost the traffic density and the maximum distance between vehicles considered to start a platoon negotiation. These initial results pave the road for more sophisticated analysis, enhancements of the protocol and evaluation of advanced-possibly centralized-approaches to improve platoon management to achieve safer roads with increased capacity

    Exact Distributed Load Centrality Computation: Algorithms, Convergence, and Applications to Distance Vector Routing

    Get PDF
    Many optimization techniques for networking protocols take advantage of topological information to improve performance. Often, the topological information at the core of these techniques is a centrality metric such as the Betweenness Centrality (BC) index. BC is, in fact, a centrality metric with many well-known successful applications documented in the literature, from resource allocation to routing. To compute BC, however, each node must run a centralized algorithm and needs to have the global topological knowledge; such requirements limit the feasibility of optimization procedures based on BC. To overcome restrictions of this kind, we present a novel distributed algorithm that requires only local information to compute an alternative similar metric, called Load Centrality (LC). We present the new algorithm together with a proof of its convergence and the analysis of its time complexity. The proposed algorithm is general enough to be integrated with any distance vector (DV) routing protocol. In support of this claim, we provide an implementation on top of Babel, a real-world DV protocol. We use this implementation in an emulation framework to show how LC can be exploited to reduce Babel's convergence time upon node failure, without increasing control overhead. As a key step towards the adoption of centrality-based optimization for routing, we study how the algorithm can be incrementally introduced in a network running a DV routing protocol. We show that even when only a small fraction of nodes participate in the protocol, the algorithm accurately ranks nodes according to their centrality

    Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures

    Get PDF
    Recent advances in signal processing and AI-based inference enable the exploitation of wireless communication signals to collect information on devices, people, actions, and the environment in general, i.e., to perform Integrated Sensing And Communication (ISAC). This possibility offers exciting opportunities for Internet of Things (IoT) systems, but it also introduces unprecedented threats to the security and privacy of data, devices, and systems. In fact, ISAC operates in the wireless PHY and Medium Access Control (MAC) layers, where it is impossible to protect information with standard encryption techniques or with any other purely digital methodologies. The goals of this paper are threefold. First, it analyzes the threats to security and privacy posed by ISAC and how they intertwine in the wireless PHY layer within the framework of IoT and distributed pervasive communication systems in general. Secondly, it presents and discusses possible countermeasures to protect users’ security and privacy. Thirdly, it introduces an architectural proposal, discussing the available choices and tradeoffs to implement such countermeasures, as well as solutions and protocols to preserve the potential benefits of ISAC while ensuring data protection and users’ privacy. The outcome and contribution of the paper is a systematic argumentation on wireless PHY-layer privacy and security threats and their relation with ISAC, framing the boundaries that research and innovation in this area should respect to avoid jeopardizing people’s rights

    La eficacia de la fiscalización realizada por SUNAFIL frente a la explotación laboral en adolescentes mayores de 14 años en el sector secundario “Hornos” en el distrito de San Sebastián del año 2020

    Get PDF
    La explotación en el trabajo infantil es un gran problema pluridimensional que es difícil de separar de los factores políticos, económicos y culturales de nuestro país, siendo por ello trascendental la erradicación y abolición de la misma conociendo esta gran problemática. El presente trabajo tiene por propósito ver la eficiencia y eficacia de la Superintendencia Nacional de Fiscalización Laboral (SUNAFIL) y su rol fiscalizador o de inspección. Por otro lado, el concepto de trabajo nocivo, son las actividades que vulneran los derechos de los menores de edad, las cuales estropean su integridad y desarrollo personal, así también afecta directamente en su educación teniendo el objetivo de resguardar el desarrollo integral de los niños, niñas y adolescentes que cumplen una actividad laboral a pesar de su corta edad. Para ello se ha realizado un trabajo exhaustivo a fin de identificar el desconocimiento absoluto de la SUNAFIL, asimismo se ha procedido a revisar la normativa nacional e internacional vigente, doctrina enfocada a los niños y adolescentes sin dejar de lado los programas que existen relacionados a la lucha del trabajo infantil. Finalmente veremos que la lucha contra la explotación del trabajo infantil en el Perú no es de exclusividad del estado sino por el contrario es necesario desarrollar un trabajo unido del sector privado, organizaciones gubernamentales y demás agentes involucrados.The exploitation in child labor is a major multidimensional problem that is difficult to separate from the political, economic and cultural factors of our country, and that is why the eradication and abolition of this problem, in the light of this big problem, is crucial. The purpose of this work is to see the efficiency and effectiveness of the National Superintendency of Labor Inspection (SUNAFIL) and its oversight or inspection role. On the other hand, the concept of harmful work, are activities that violate the rights of the persons under the legal age, which damage their integrity and personal development, it also directly affects their education, with the aim of safeguarding the comprehensive development of children and adolescents who are engaged in work despite their young age. To this end, exhaustive work has been carried out to identify the absolute lack of knowledge of the SUNAFIL, and the current national and international regulations, a doctrine focused on children and adolescents without neglecting existing programs related to the fight against child labor. Finally, we will see that the fight against the exploitation of child labor in Peru is not exclusive to the State more, on the contrary, it is necessary to develop a united work of the private sector, governmental organizations and other actors involved.Tesi

    A Blockchain Definition to Clarify its Role for the Internet of Things

    Get PDF
    The term blockchain is used for disparate projects, ranging from cryptocurrencies to applications for the Internet of Things (IoT). The concept of blockchain appears therefore blurred, as the same technology cannot empower applications with extremely different requirements, levels of security and performance. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain allowing us to clarify its possible role in the IoT. The definition binds together three elements that, as a whole, delineate those unique features that distinguish the blockchain from other distributed ledger technologies: immutability, transparency and anonymity. We note that immutability - which is imperative for securing blockchains - imposes remarkable resource consumption. Moreover, while transparency demands no confidentiality, anonymity enhances privacy but prevents user identification. As such, we raise the concern that these blockchain features clash with the requirements of most IoT applications where devices are power-constrained, data needs to be kept confidential, and users to be clearly identifiable. We consequently downplay the role of the blockchain for the IoT: this can act as a ledger external to the IoT architecture, invoked as seldom as possible and only to record the aggregate results of myriads of local (IoT) transactions that are most of the time performed off-chain to meet performance and scalability requirements

    What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things

    Get PDF
    The use of the term blockchain is documented for disparate projects, from cryptocurrencies to applications for the Internet of Things (IoT), and many more. The concept of blockchain appears therefore blurred, as it is hard to believe that the same technology can empower applications that have extremely different requirements and exhibit dissimilar performance and security. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain that allows us to clarify its role in the IoT. This definition inextricably binds together three elements that, as a whole, provide the blockchain with those unique features that distinguish it from other distributed ledger technologies: immutability, transparency and anonimity. We note however that immutability comes at the expense of remarkable resource consumption, transparency demands no confidentiality and anonymity prevents user identification and registration. This is in stark contrast to the requirements of most IoT applications that are made up of resource constrained devices, whose data need to be kept confidential and users to be clearly known. Building on the proposed definition, we derive new guidelines for selecting the proper distributed ledger technology depending on application requirements and trust models, identifying common pitfalls leading to improper applications of the blockchain. We finally indicate a feasible role of the blockchain for the IoT: myriads of local, IoT transactions can be aggregated off-chain and then be successfully recorded on an external blockchain as a means of public accountability when required
    corecore