1,774 research outputs found

    Advancing IoT Security with Tsetlin Machines: A Resource-Efficient Anomaly Detection Approach

    Get PDF
    The number of IoT devices are rapidly increasing, and the nature of the devices leave them vulnerable to attacks. As of today there are no general security solutions that meet the requirements of running with limited resources on devices with a large variety of use cases. Traditional AI models are able to classify and distinguish between benign and malignant network traffic. However, they require more resources than IoT devices can provide, and cannot train on-chip once deployed. This thesis introduces the Tsetlin Machine as a potential solution to this problem. As a binary, propositional logic model, the Tsetlin Machine is compatible with hardware and can perform predictions in near real-time on limited resources, making it a suitable candidate for intrusion detection in IoT devices. To assess the viability of the Tsetlin Machine as an IDS, we developed custom data loaders for the benchmark datasets: CIC-IDS2017, KDD99, NSL-KDD, UNSW-NB15, and UNSW-Bot-IoT. We ran hyperparameter searches and numerous experiments to determine the performance of the Tsetlin machine on each dataset. We discovered that preprocessing data by converting each data value to a 32-bit binary number and imposing an upper bound on class sizes proved to be an effective strategy. Furthermore, we compared the performance of the Tsetlin Machine against various classifiers from the scikit-learn library and lazy predict. The results show that the Tsetlin Machine's performance was on par with, if not superior to, other machine learning models, indicating its potential as a reliable method for anomaly detection in IoT devices. However, future work is required to determine its viability in a real-life setting, running on limited resources and classifying real-time data

    Advancing IoT Security with Tsetlin Machines: A Resource-Efficient Anomaly Detection Approach

    Get PDF
    The number of IoT devices are rapidly increasing, and the nature of the devices leave them vulnerable to attacks. As of today there are no general security solutions that meet the requirements of running with limited resources on devices with a large variety of use cases. Traditional AI models are able to classify and distinguish between benign and malignant network traffic. However, they require more resources than IoT devices can provide, and cannot train on-chip once deployed. This thesis introduces the Tsetlin Machine as a potential solution to this problem. As a binary, propositional logic model, the Tsetlin Machine is compatible with hardware and can perform predictions in near real-time on limited resources, making it a suitable candidate for intrusion detection in IoT devices. To assess the viability of the Tsetlin Machine as an IDS, we developed custom data loaders for the benchmark datasets: CIC-IDS2017, KDD99, NSL-KDD, UNSW-NB15, and UNSW-Bot-IoT. We ran hyperparameter searches and numerous experiments to determine the performance of the Tsetlin machine on each dataset. We discovered that preprocessing data by converting each data value to a 32-bit binary number and imposing an upper bound on class sizes proved to be an effective strategy. Furthermore, we compared the performance of the Tsetlin Machine against various classifiers from the scikit-learn library and lazy predict. The results show that the Tsetlin Machine's performance was on par with, if not superior to, other machine learning models, indicating its potential as a reliable method for anomaly detection in IoT devices. However, future work is required to determine its viability in a real-life setting, running on limited resources and classifying real-time data

    Employees as Individually and Collectively Acting Subjects—Key Contributions from Nordic Working Life Research

    Get PDF
    The Nordic countries—Denmark, Finland, Iceland, Norway, and Sweden—are societies that share many features among themselves that also distinguish them from other industrialized countries. The paper poses the question whether the distinct character of the Nordic societies has generated working life research that is clearly distinguishable from similar research in other countries in terms of distinctness in topics, methods, empirical findings, or theoretical concepts. The aim of this paper is to answer this question by identifying, analyzing, and discussing selected key contributions from Nordic working life research to understand how they research and construe the conditions of humans at work with a special focus on the psychosocial well-being of industrial workers. The paper concludes that the key contributions to Nordic working life research have a distinctive emphasis on collective employee voice and autonomy and an extensive use of empirical and actionoriented research methods. Employees are construed not only as workers resisting exploitations from management or as workers pursuing individual careers, but also as members of collectives who share ideas and aspirations and who legitimately influence the management (and research) using cooperation and pressure

    Employees as Individually and Collectively Acting Subjects—Key Contributions from Nordic Working Life Research

    Get PDF
    The Nordic countries—Denmark, Finland, Iceland, Norway, and Sweden—are societies that share many features among themselves that also distinguish them from other industrialized countries. The paper poses the question whether the distinct character of the Nordic societies has generated working life research that is clearly distinguishable from similar research in other countries in terms of distinctness in topics, methods, empirical findings, or theoretical concepts. The aim of this paper is to answer this question by identifying, analyzing, and discussing selected key contributions from Nordic working life research to understand how they research and construe the conditions of humans at work with a special focus on the psychosocial well-being of industrial workers. The paper concludes that the key contributions to Nordic working life research have a distinctive emphasis on collective employee voice and autonomy and an extensive use of empirical and actionoriented research methods. Employees are construed not only as workers resisting exploitations from management or as workers pursuing individual careers, but also as members of collectives who share ideas and aspirations and who legitimately influence the management (and research) using cooperation and pressure

    Aetiology of thrombosed external haemorrhoids: a questionnaire study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>It is important to better understand the aetiology of thrombosed external haemorrhoids (TEH) because recurrence rates are high, prophylaxis is unknown, and optimal therapy is highly debated.</p> <p>Findings</p> <p>We conducted a questionnaire study of individuals with and without TEH. Aetiology was studied by comparison of answers to a questionnaire given to individuals with and without TEH concerning demography, history, and published aetiologic hypotheses. Participants were evaluated consecutively at our institution from March 2004 through August 2005.</p> <p>One hundred forty-eight individuals were enrolled, including 72 patients with TEH and 76 individuals without TEH but with alternative diagnoses, such as a screening colonoscopy or colonic polyps. Out of 38 possible aetiologic factors evaluated, 20 showed no significant bivariate correlation to TEH and were no longer traced, and 16 factors showed a significant bivariate relationship to TEH. By multivariate analysis, six independent variables were found to predict TEH correctly in 79.1% of cases: age of 46 years or younger, use of excessive physical effort, and use of dry toilet paper combined with wet cleaning methods after defaecation were associated with a significantly higher risk of developing TEH; use of bathtub, use of the shower, and genital cleaning before sleep at least once a week were associated with a significantly lower risk of developing TEH.</p> <p>Conclusion</p> <p>Six hypotheses on the causes of TEH have a high probability of being correct and should be considered in future studies on aetiology, prophylaxis, and therapy of TEH.</p

    Erstellung eines dänischen und eines deutschen Textkorpus - Fachsprache Gentechnik

    Get PDF
    No abstract

    Do we at all need surgery to treat thrombosed external hemorrhoids? Results of a prospective cohort study

    Get PDF
    Ole Gebbensleben1, York Hilger2, Henning Rohde31Park-Klinik Berlin-Weissensee, Berlin, Germany; 2Institut f&amp;uuml;r Biostatistik, Freiburg im Breisgau, Germany; 3Praxis f&amp;uuml;r Endoskopie und Proktologie, Berlin, GermanyBackground: It is unknown whether surgery is the gold standard for therapy of thrombosed external hemorrhoids (TEH).Methods: A prospective cohort study of 72 adults with TEH was conducted: no surgery, no sitz baths but gentle dry cleaning with smooth toilet paper after defecation. Follow-up information was collected six months after admission by questionnaire.Results: Despite our strict conservative management policy 62.5% (45/72) of patients (95% confidence interval [CI]: 51.0&amp;ndash;74.0) described themselves as &amp;ldquo;healed&amp;rdquo; or &amp;ldquo;ameliorated&amp;rdquo;, and 61.1% (44/72, 95% CI: 49.6&amp;ndash;72.6) found our management policy as &amp;ldquo;valuable to test&amp;rdquo; or &amp;ldquo;impracticable&amp;rdquo;. 13.9% (10/72, 95% CI: 5.7&amp;ndash;22.1) of patients suspected to have recurrences. 4.2% did not know. Twenty-two of the 48 responding patients reported symptoms such as itching (18.8%), soiling (12.5%), pricking (10.4%), or a sore bottom (8.3%) once a month (59.1%, 13/22), once a week (27.3%, 6/22), or every day (13.6%, 3/22). Conclusions: The dictum that surgery is the gold standard for therapy for TEH should be checked by randomized controlled trials.Keywords: hemorrhoids, acute hemorrhoidal disease, thrombosed external hemorrhoid, perianal thrombosis, conservative therapy, surger

    Computationally Secure Two-Round Authenticated Message Exchange

    Get PDF
    We study two-round authenticated message exchange protocols consisting of a single request and a single response, with the realistic assumption that the responder is long-lived and has bounded memory. We first argue that such protocols necessarily need elements such as timestamps to be secure. We then present such a protocol and prove that it is correct and computationally secure. In our model, the adversary provides the initiator and the responder with the payload of their messages, which means our protocol can be used to implement securely any service based on authenticated message exchange. We even allow the adversary to to read and reset the memory of the principals and to use, with very few restrictions, the private keys of the principals for signing the payloads or parts thereof. We use timestamps to secure our protocol, but only assume that each principal has access to a local clock

    Full-field hard x-ray microscopy with interdigitated silicon lenses

    Get PDF
    Full-field x-ray microscopy using x-ray objectives has become a mainstay of the biological and materials sciences. However, the inefficiency of existing objectives at x-ray energies above 15 keV has limited the technique to weakly absorbing or two-dimensional (2D) samples. Here, we show that significant gains in numerical aperture and spatial resolution may be possible at hard x-ray energies by using silicon-based optics comprising 'interdigitated' refractive silicon lenslets that alternate their focus between the horizontal and vertical directions. By capitalizing on the nano-manufacturing processes available to silicon, we show that it is possible to overcome the inherent inefficiencies of silicon-based optics and interdigitated geometries. As a proof-of-concept of Si-based interdigitated objectives, we demonstrate a prototype interdigitated lens with a resolution of ~255 nm at 17 keV.Comment: 10 pages, 5 figure. Submitted to Applied Physics Letters 31st March 2015, rejected 17th June 201
    • …
    corecore