141 research outputs found

    Trading privacy for security

    Get PDF
    <p>Personal information is available to anyone, anywhere at anytime. That includes the data subject itself, commercial users, social networks, governmental authorities and also parties with illegal intentions. Is the availability to authorities of our personal data necessary for the protection of our national security and protection against computer-criminality? Can we be certain that the processing of our personal data is done for solely legitimate purposes? And are we certain that our personal data is well protected when being processed? ...and do we really care? In this article Rob van den Hoven van Genderen discusses these issues.</p&gt

    Clickfraude, waan of werkelijkheid

    Get PDF

    Recht en web 2.0

    Get PDF
    De klassieke afnemers van internetdiensten zijn leveranciers geworden. Tekst, beeld en geluid wordt door gebruikers geplaatst op Twitter, Youtube, LinkedIn, Hyves, The Pirate Bay, etc. Iedereen is overal bereikbaar, anyone, anytime, anywhere. Door het gebruik van overvloedig beschikbare persoonlijke data verstevigt de overheid zijn governance en bedrijven hun marktpositie. We zijn hulpeloos zonder mobiel en internet. Onze vrienden zijn te vinden op sociale netwerken en je wordt gealarmeerd als bepaalde personen - mobieltjes- zich in je omgeving bevinden. De apparatuur wordt steeds slimmer en de controle door natuurlijke personen vervaagt. We hebben geen inzicht in alle (rechts)gevolgen van wat er gebeurt, door wat en door wie. Is dat de toekomst? Lees, verheugt u of vrees

    Charting a new course in healthcare:early-stage AI algorithm registration to enhance trust and transparency

    Get PDF
    AI holds the potential to transform healthcare, promising improvements in patient care. Yet, realizing this potential is hampered by over-reliance on limited datasets and a lack of transparency in validation processes. To overcome these obstacles, we advocate the creation of a detailed registry for AI algorithms. This registry would document the development, training, and validation of AI models, ensuring scientific integrity and transparency. Additionally, it would serve as a platform for peer review and ethical oversight. By bridging the gap between scientific validation and regulatory approval, such as by the FDA, we aim to enhance the integrity and trustworthiness of AI applications in healthcare.</p

    Charting a new course in healthcare:early-stage AI algorithm registration to enhance trust and transparency

    Get PDF
    AI holds the potential to transform healthcare, promising improvements in patient care. Yet, realizing this potential is hampered by over-reliance on limited datasets and a lack of transparency in validation processes. To overcome these obstacles, we advocate the creation of a detailed registry for AI algorithms. This registry would document the development, training, and validation of AI models, ensuring scientific integrity and transparency. Additionally, it would serve as a platform for peer review and ethical oversight. By bridging the gap between scientific validation and regulatory approval, such as by the FDA, we aim to enhance the integrity and trustworthiness of AI applications in healthcare.</p

    Charting a new course in healthcare: early-stage AI algorithm registration to enhance trust and transparency

    Get PDF
    AI holds the potential to transform healthcare, promising improvements in patient care. Yet, realizing this potential is hampered by over-reliance on limited datasets and a lack of transparency in validation processes. To overcome these obstacles, we advocate the creation of a detailed registry for AI algorithms. This registry would document the development, training, and validation of AI models, ensuring scientific integrity and transparency. Additionally, it would serve as a platform for peer review and ethical oversight. By bridging the gap between scientific validation and regulatory approval, such as by the FDA, we aim to enhance the integrity and trustworthiness of AI applications in healthcare

    Study of Globular Cluster M53: new variables, distance, metallicity

    Full text link
    We study the variable star content of the globular cluster M53 to compute the physical parameters of the constituting stars and the distance of the cluster. Covering two adjacent seasons in 2007 and 2008, new photometric data are gathered for 3048 objects in the field of M53. By using the OIS method and subsequently TFA, we search for variables in the full sample by using DFT and BLS methods. We select variables based on the statistics related to these methods combined with visual inspections. We identified 12 new variables (2 RR Lyrae stars, 7 short periodic stars - 3 of them are SX Phe stars - and 3 long-period variables). No eclipsing binaries were found in the present sample. Except for the 3 (hitherto unknown) Blazhko RR Lyrae stars, no multiperiodic variables were found. We showed that after proper period shift, the PLC relation for the first overtone RR Lyrae sample tightly follows the one spanned by the fundamental stars. Furthermore, the slope is in agreement with the one derived from other clusters. Based on the earlier Baade-Wesselink calibration of the PLC relations, the derived reddening-free distance modulus of M53 is 16.31 +/- 0.04 mag, corresponding to a distance modulus of 18.5 mag for the Large Magellanic Cloud. From the Fourier parameters of the RRab stars we obtained an average iron abundance of -1.58 +/- 0.03. This is ~0.5 dex higher than the overall abundance of the giants as given in the literature and derived in this paper from the three-color photometry of giants. We suspect that the source of this discrepancy (observable also in other, low-metallicity clusters) is the want of sufficient number of low-metallicity objects in the calibrating sample of the Fourier method.Comment: Accepted for publication in Astronomy & Astrophysics. The paper contains 5 tables and 13 figure

    Four-colour photometry of eclipsing binaries. XL, uvby light curves for the B-type systems DW Carinae, BF Centauri, AC Velorum, and NSV 5783

    Get PDF
    Aims. In order to increase the limited number of B-stars with accurately known dimensions, and also the number of well studied eclipsing binaries in open clusters, we have undertaken observations and studies of four southern double-lined eclipsing B-type binaries; DWCar, BF Cen, ACVel, and NSV 5783. Methods. Complete uvby light curves were observed between January 1982 and April 1991 at the Danish 0.5 m telescope at ESO La Silla, since 1985 known as the Strömgren Automatic Telescope (SAT). Standard indices for the systems and the comparison stars,as well as additional minima observations for ACVel, have been obtained later at SAT. For DWCar and ACVel, high-resolution spectra for definitive spectroscopic orbits have also been obtained; they are presented as part of the detailed analyses of these systems. A few spectra of NSV 5783 are included in the present paper. Results. For all four systems, the first modern accurate light curves have been established. DWCar is a detached system consisting of two nearly identical components. It is member of the young open cluster Cr228. A detailed analysis, based on the new light curves and 29 high-resolution spectra, is published separately. BFCen is semidetached and is member of NGC 3766. Modern spectra are needed for a detailed study. ACVel is a detached system with at least one more star. A full analysis, based on the new light curves and 18 high-resolution spectra, is published separately. NSV 5783 is discovered to be an eclipsing binary consisting of two well-detached components in an 11-day period eccentric (e = 0.18) orbit. Secondary eclipse is practically total. From the light curves and a few high-resolution spectra, accurate photometric elements and preliminary absolute dimensions have been determined. The quite similar components have masses of about 5 M and radii of about 3.5 R, and they seem to have evolved just slightly off the ZAMS. The measured rotational velocities (≈150 km s−1) are about 6 times those corresponding to pseudosynchronization

    Privacy

    No full text
    corecore