40 research outputs found

    Identifying Reasons for Bias: An Argumentation-Based Approach

    Full text link
    As algorithmic decision-making systems become more prevalent in society, ensuring the fairness of these systems is becoming increasingly important. Whilst there has been substantial research in building fair algorithmic decision-making systems, the majority of these methods require access to the training data, including personal characteristics, and are not transparent regarding which individuals are classified unfairly. In this paper, we propose a novel model-agnostic argumentation-based method to determine why an individual is classified differently in comparison to similar individuals. Our method uses a quantitative argumentation framework to represent attribute-value pairs of an individual and of those similar to them, and uses a well-known semantics to identify the attribute-value pairs in the individual contributing most to their different classification. We evaluate our method on two datasets commonly used in the fairness literature and illustrate its effectiveness in the identification of bias.Comment: 10 page

    An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications

    Full text link
    This paper presents the first hardware implementation of the Datagram Transport Layer Security (DTLS) protocol to enable end-to-end security for the Internet of Things (IoT). A key component of this design is a reconfigurable prime field elliptic curve cryptography (ECC) accelerator, which is 238x and 9x more energy-efficient compared to software and state-of-the-art hardware respectively. Our full hardware implementation of the DTLS 1.3 protocol provides 438x improvement in energy-efficiency over software, along with code size and data memory usage as low as 8 KB and 3 KB respectively. The cryptographic accelerators are coupled with an on-chip low-power RISC-V processor to benchmark applications beyond DTLS with up to two orders of magnitude energy savings. The test chip, fabricated in 65 nm CMOS, demonstrates hardware-accelerated DTLS sessions while consuming 44.08 uJ per handshake, and 0.89 nJ per byte of encrypted data at 16 MHz and 0.8 V.Comment: Published in IEEE Journal of Solid-State Circuits (JSSC

    Local drivers of change in Southern Ocean ecosystems: Human activities and policy implications

    Get PDF
    Local drivers are human activities or processes that occur in specific locations, and cause physical or ecological change at the local or regional scale. Here, we consider marine and land-derived pollution, non-indigenous species, tourism and other human visits, exploitation of marine resources, recovery of marine mammals, and coastal change as a result of ice loss, in terms of their historic and current extent, and their interactions with the Southern Ocean environment. We summarise projected increases or decreases in the influence of local drivers, and projected changes to their geographic range, concluding that the influence of non-indigenous species, fishing, and the recovery of marine mammals are predicted to increase in the future across the Southern Ocean. Local drivers can be managed regionally, and we identify existing governance frameworks as part of the Antarctic Treaty System and other instruments which may be employed to mitigate or limit their impacts on Southern Ocean ecosystems

    Responses of Southern Ocean seafloor habitats and communities to global and local drivers of change

    Get PDF
    Knowledge of life on the Southern Ocean seafloor has substantially grown since the beginning of this century with increasing ship-based surveys and regular monitoring sites, new technologies and greatly enhanced data sharing. However, seafloor habitats and their communities exhibit high spatial variability and heterogeneity that challenges the way in which we assess the state of the Southern Ocean benthos on larger scales. The Antarctic shelf is rich in diversity compared with deeper water areas, important for storing carbon (“blue carbon”) and provides habitat for commercial fish species. In this paper, we focus on the seafloor habitats of the Antarctic shelf, which are vulnerable to drivers of change including increasing ocean temperatures, iceberg scour, sea ice melt, ocean acidification, fishing pressures, pollution and non-indigenous species. Some of the most vulnerable areas include the West Antarctic Peninsula, which is experiencing rapid regional warming and increased iceberg-scouring, subantarctic islands and tourist destinations where human activities and environmental conditions increase the potential for the establishment of non-indigenous species and active fishing areas around South Georgia, Heard and MacDonald Islands. Vulnerable species include those in areas of regional warming with low thermal tolerance, calcifying species susceptible to increasing ocean acidity as well as slow-growing habitat-forming species that can be damaged by fishing gears e.g., sponges, bryozoan, and coral species. Management regimes can protect seafloor habitats and key species from fishing activities; some areas will need more protection than others, accounting for specific traits that make species vulnerable, slow growing and long-lived species, restricted locations with optimum physiological conditions and available food, and restricted distributions of rare species. Ecosystem-based management practices and long-term, highly protected areas may be the most effective tools in the preservation of vulnerable seafloor habitats. Here, we focus on outlining seafloor responses to drivers of change observed to date and projections for the future. We discuss the need for action to preserve seafloor habitats under climate change, fishing pressures and other anthropogenic impacts

    Complete Genome Sequences of Cluster A Mycobacteriophages BobSwaget, Fred313, KADY, Lokk, MyraDee, Stagni, and StepMih

    Get PDF
    Seven mycobacteriophages from distinct geographical locations were isolated, using Mycobacterium smegmatis mc2155 as the host, and then purified and sequenced. All of the genomes are related to cluster A mycobacteriophages, BobSwaget and Lokk in subcluster A2; Fred313, KADY, Stagni, and StepMih in subcluster A3; and MyraDee in subcluster A18, the first phage to be assigned to that subcluster

    31st Annual Meeting and Associated Programs of the Society for Immunotherapy of Cancer (SITC 2016) : part two

    Get PDF
    Background The immunological escape of tumors represents one of the main ob- stacles to the treatment of malignancies. The blockade of PD-1 or CTLA-4 receptors represented a milestone in the history of immunotherapy. However, immune checkpoint inhibitors seem to be effective in specific cohorts of patients. It has been proposed that their efficacy relies on the presence of an immunological response. Thus, we hypothesized that disruption of the PD-L1/PD-1 axis would synergize with our oncolytic vaccine platform PeptiCRAd. Methods We used murine B16OVA in vivo tumor models and flow cytometry analysis to investigate the immunological background. Results First, we found that high-burden B16OVA tumors were refractory to combination immunotherapy. However, with a more aggressive schedule, tumors with a lower burden were more susceptible to the combination of PeptiCRAd and PD-L1 blockade. The therapy signifi- cantly increased the median survival of mice (Fig. 7). Interestingly, the reduced growth of contralaterally injected B16F10 cells sug- gested the presence of a long lasting immunological memory also against non-targeted antigens. Concerning the functional state of tumor infiltrating lymphocytes (TILs), we found that all the immune therapies would enhance the percentage of activated (PD-1pos TIM- 3neg) T lymphocytes and reduce the amount of exhausted (PD-1pos TIM-3pos) cells compared to placebo. As expected, we found that PeptiCRAd monotherapy could increase the number of antigen spe- cific CD8+ T cells compared to other treatments. However, only the combination with PD-L1 blockade could significantly increase the ra- tio between activated and exhausted pentamer positive cells (p= 0.0058), suggesting that by disrupting the PD-1/PD-L1 axis we could decrease the amount of dysfunctional antigen specific T cells. We ob- served that the anatomical location deeply influenced the state of CD4+ and CD8+ T lymphocytes. In fact, TIM-3 expression was in- creased by 2 fold on TILs compared to splenic and lymphoid T cells. In the CD8+ compartment, the expression of PD-1 on the surface seemed to be restricted to the tumor micro-environment, while CD4 + T cells had a high expression of PD-1 also in lymphoid organs. Interestingly, we found that the levels of PD-1 were significantly higher on CD8+ T cells than on CD4+ T cells into the tumor micro- environment (p < 0.0001). Conclusions In conclusion, we demonstrated that the efficacy of immune check- point inhibitors might be strongly enhanced by their combination with cancer vaccines. PeptiCRAd was able to increase the number of antigen-specific T cells and PD-L1 blockade prevented their exhaus- tion, resulting in long-lasting immunological memory and increased median survival

    Design and implementation of a secure energy-efficient hardware platform for wireless sensor networks

    No full text
    This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018Cataloged from student-submitted PDF version of thesis.Includes bibliographical references (pages 91-94).Wireless sensor networks are networks of resource-constrained devices that collaborate to sense data about an environment and route it back to a resource-plenty gateway device that is connected to the Internet for processing. Oftentimes, wireless sensor networks are deployed in hazardous or hard to reach areas. For many sensor networks, securing these devices incurs an inhibitively high overhead cost, and tradeoffs must be made between security and energy efficiency, as the energy consumption of these nodes dictates their lifetime. In previous work, a cryptographic accelerator [1] was proposed to speed up and reduce energy consumption of cryptographic primitives. The cryptographic accelerator is used in conjunction with a RISC-V processor to provide the flexibility to implement a wide range of security protocols. This work identifies common security threats in wireless sensor networks, and presents a hardware platform used to demonstrate the energy-efficient, cryptographic capabilities of the RISC-V security chip. We use the platform to test out various secure routing protocols on real hardware, and develop end-to-end energy models of our sensor node platform running these protocols. In developing these models, we seek to demonstrate that the RISC-V security chip can implement network security protocols at relatively little cost in a variety of different network configurations.by Madeleine Waller.M. Eng.M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Scienc

    Gigantopecten Rovereto, 1899 and Lissochlamys Sacco, 1897 (Mollusca, Bivalvia, PECTINIDAE): proposed conservation

    No full text
    Volume: 63Start Page: 155End Page: 16
    corecore