scholarly journals Blockchain for Securing AI Applications and Open Innovations

2021 ◽  
Vol 7 (3) ◽  
pp. 189
Author(s):  
Rucha Shinde ◽  
Shruti Patil ◽  
Ketan Kotecha ◽  
Kirti Ruikar

Nowadays, open innovations such as intelligent automation and digitalization are being adopted by every industry with the help of powerful technology such as Artificial Intelligence (AI). This evolution drives systematic running processes, involves less overhead of managerial activities and increased production rate. However, it also gave birth to different kinds of attacks and security issues at the data storage level and process level. The real-life implementation of such AI-enabled intelligent systems is currently plagued by the lack of security and trust levels in system predictions. Blockchain is a prevailing technology that can help to alleviate the security risks of AI applications. These two technologies are complementing each other as Blockchain can mitigate vulnerabilities in AI, and AI can improve the performance of Blockchain. Many studies are currently being conducted on the applicability of Blockchains for securing intelligent applications in various crucial domains such as healthcare, finance, energy, government, and defense. However, this domain lacks a systematic study that can offer an overarching view of research activities currently going on in applying Blockchains for securing AI-based systems and improving their robustness. This paper presents a bibliometric and literature analysis of how Blockchain provides a security blanket to AI-based systems. Two well-known research databases (Scopus and Web of Science) have been examined for this analytical study and review. The research uncovered that idea proposals in conferences and some articles published in journals make a major contribution. However, there is still a lot of research work to be done to implement real and stable Blockchain-based AI systems.

2020 ◽  
Vol 9 (1) ◽  
pp. 1671-1674

Now a day’s in medical field number of application’s will develop for overcome the complexity of previous work. By using information technology and computer science provide various new techniques and medical equipment’s has improved digitalization in healthcare sector. In existing system much more advancement is providing to overcome the time and money of patients and perform exact treatments and store patient’s confidential records in securely but most important issues are security. To address the existing security issues to design and develop the proposed research work on security i.e. for patient’s confidential health data records in database servers. Existing work during data transmission can only protect the patient’s data records but they can’t stop the insider attacks. In proposed research work, first implement front end security with the help of keylogging technique, second to store patient’s confidential data in multiple data servers or chunks and to prevent the insider attacks and third and most important is access policy of search for encrypted data of multi-authority. The main contribution of this research work to assign patients data records in different chunks securely and applying the cryptosystems for security goals of a patient’s confidential records. Especially, proposed work advantages of SHA hashing technique to perform each and every user for access of particular data records. This research work explores secure data storage and sharing using proposed AES 128 encryption algorithm and Role Base Access Control (RBAC) for secure data access scheme for end user. This work also carried out backup server approach it works like proxy storage server for ad hoc data recovery for all distributed data servers.


2018 ◽  
Vol 8 (4) ◽  
pp. 153
Author(s):  
Petr Bychkov ◽  
Irina Zabrodina ◽  
Maria Vitalievna Netesova ◽  
Carlo Mapelli

This work describes the experience of Tomsk Polytechnic University in involving students in scientific research. The involvement is to be achieved by including scientific research elements into laboratory class programs, game-based learning, conducting laboratory classes in real-life scientific research facilities, including "Scientific research work for students" into Bachelor's curriculum (starting the second grade) and other actions. The experience described should be considered a success, as over the last decade the number of Bachelor's graduates at TPU willing to pursue the Master's degree (and then do postgraduate studies) has multiplied. The competition for enrolling into postgraduate studies has increased as well.


2018 ◽  
Vol 12 (1) ◽  
pp. 3-28
Author(s):  
Tamás Szádeczky

As compared with traditional paper-based versions and the standard username-password login to e-Government services, the new electronic identity and travel documents have made on-site electronic and on-line authentication of citizen more comfortable and secure.The biometric passport was introduced in Hungary in 2006. A decade later the electronic identity card (eID) was implemented. The reason for the improvement of such documents is twofold: enhancing security features and performing new functions. The development is certainly welcome, but it also generates new types of risks, with which governments and citizens must take into account.In this paper, I will first analyze the most widespread technologies of data storage cards from the passive elements to the chipcards, including the biometric passport. The objective is to provide an overview of the technical development as a background to my paper. I will then proceed to an analysis of the relevant EU and national legal background, data elements, data protection and the functions (ePASS, eID, eSIGN) of the new Hungarian and German identity card, as well as the security risks and protection properties of the eID-type documents. The paper concludes with a summary of the lessons learned from and the risks involved in the current solutions in Hungary and Germany.


2015 ◽  
Vol 5 (3) ◽  
pp. 95-112
Author(s):  
Miroslava Kovaříková

This article deals with the issue of security management and its following application in education. The article focuses on the topic of armed attacks at schools. Based on a research probe aimed at teachers which focused on perception of security risks, there are chosen areas to which Central emergency system services should react. Further, knowledge of technical and organizational measures of emergency plans in the organization and the level of attention paid to this issue by the school management were investigated. In the text there are also international models of solutions of this issue introduced. The contribution also brings outline of how is the issue solved in the European Union countries, in particular in the Kingdom of Spain. Experience with the solution of security issues of schools in Latin America are also mentioned. In the conclusion the summary of measures for improvement of security at schools is presented.


Author(s):  
Cristina Tassorelli ◽  
Vincenzo Silani ◽  
Alessandro Padovani ◽  
Paolo Barone ◽  
Paolo Calabresi ◽  
...  

Abstract Background The coronavirus disease 2019 (COVID-19) pandemic has severely impacted the Italian healthcare system, underscoring a dramatic shortage of specialized doctors in many disciplines. The situation affected the activity of the residents in neurology, who were also offered the possibility of being formally hired before their training completion. Aims (1) To showcase examples of clinical and research activity of residents in neurology during the COVID-19 pandemic in Italy and (2) to illustrate the point of view of Italian residents in neurology about the possibility of being hired before the completion of their residency program. Results Real-life reports from several areas in Lombardia—one of the Italian regions more affected by COVID-19—show that residents in neurology gave an outstanding demonstration of generosity, collaboration, reliability, and adaptation to the changing environment, while continuing their clinical training and research activities. A very small minority of the residents participated in the dedicated selections for being hired before completion of their training program. The large majority of them prioritized their training over the option of earlier employment. Conclusions Italian residents in neurology generously contributed to the healthcare management of the COVID-19 pandemic in many ways, while remaining determined to pursue their training. Neurology is a rapidly evolving clinical field due to continuous diagnostic and therapeutic progress. Stakeholders need to listen to the strong message conveyed by our residents in neurology and endeavor to provide them with the most adequate training, to ensure high quality of care and excellence in research in the future.


2007 ◽  
Vol 40 (2) ◽  
pp. 191-208 ◽  
Author(s):  
Douglas L. Tookey

Environmental challenges, resulting from either a scarcity of natural resources or environmental degradation, may contribute to security risks in Central Asia. An encouraging sign is the recent attention of the governments of Central Asia, civil society groups and international organizations to these environmental security issues. Their efforts indicate that by working together to prevent conflicts caused by environmental problems, cooperation among the countries of Central Asia may expand. Both short and long-term obstacles must be overcome if these groups are to ensure that environmental stresses do not lead to security concerns.


2017 ◽  
Vol 26 (01) ◽  
pp. 188-192 ◽  
Author(s):  
H. Dauchel ◽  
T. Lecroq

Summary Objective: To summarize excellent current research and propose a selection of best papers published in 2016 in the field of Bioinformatics and Translational Informatics with applications in the health domain and clinical care. Methods: We provide a synopsis of the articles selected for the IMIA Yearbook 2017, from which we attempt to derive a synthetic overview of current and future activities in the field. As in 2016, a first step of selection was performed by querying MEDLINE with a list of MeSH descriptors completed by a list of terms adapted to the section coverage. Each section editor evaluated separately the set of 951 articles returned and evaluation results were merged for retaining 15 candidate best papers for peer-review. Results: The selection and evaluation process of papers published in the Bioinformatics and Translational Informatics field yielded four excellent articles focusing this year on the secondary use and massive integration of multi-omics data for cancer genomics and non-cancer complex diseases. Papers present methods to study the functional impact of genetic variations, either at the level of the transcription or at the levels of pathway and network. Conclusions: Current research activities in Bioinformatics and Translational Informatics with applications in the health domain continue to explore new algorithms and statistical models to manage, integrate, and interpret large-scale genomic datasets. As addressed by some of the selected papers, future trends would include the question of the international collaborative sharing of clinical and omics data, and the implementation of intelligent systems to enhance routine medical genomics.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
A. Anil Sinaci ◽  
Gokce B. Laleci Erturkmen ◽  
Suat Gonul ◽  
Mustafa Yuksel ◽  
Paolo Invernizzi ◽  
...  

Postmarketing drug surveillance is a crucial aspect of the clinical research activities in pharmacovigilance and pharmacoepidemiology. Successful utilization of available Electronic Health Record (EHR) data can complement and strengthen postmarketing safety studies. In terms of the secondary use of EHRs, access and analysis of patient data across different domains are a critical factor; we address this data interoperability problem between EHR systems and clinical research systems in this paper. We demonstrate that this problem can be solved in an upper level with the use of common data elements in a standardized fashion so that clinical researchers can work with different EHR systems independently of the underlying information model. Postmarketing Safety Study Tool lets the clinical researchers extract data from different EHR systems by designing data collection set schemas through common data elements. The tool interacts with a semantic metadata registry through IHE data element exchange profile. Postmarketing Safety Study Tool and its supporting components have been implemented and deployed on the central data warehouse of the Lombardy region, Italy, which contains anonymized records of about 16 million patients with over 10-year longitudinal data on average. Clinical researchers in Roche validate the tool with real life use cases.


2021 ◽  
Vol 54 (6) ◽  
pp. 192-210
Author(s):  
Svetlana N. Dvoryatkina ◽  
◽  
Vera S. Merenkova ◽  
Eugeny I. Smirnov ◽  
◽  
...  

Introduction. The problem of improving the process of organizing and supporting the project and research activities of schoolchildren through intelligent management for the purpose of self-organization of the individual, understanding and comprehending complex mathematical knowledge as a principle of personal development is relevant and far from solved. Intelligent systems provide the process of individualization of learning, the establishment of personalized and computerized feedback of cognitive and creative processes. The purpose of the article is to assess the student's readiness for research activities in the context of designing a hybrid intelligent learning environment. Materials and methods. The assessment of the student's psychological readiness for research activities in the conditions of using a hybrid intellectual environment was carried out on an experimental representative sample of students of 1-2 courses of secondary vocational education (n1=42) and students of the senior classes of secondary schools (n2=30). The diagnosis was carried out using the intelligence structure test of R. Amthauer, the creativity questionnaire of D. Johnson, the test "Individual styles of thinking" by A. Alekseev, L. Gromova, the methods of value orientations by M. Rokich, etc. The significance of the differences was established by means of Student's t-test, Fisher's angular transformation, χ2-test. The results of the study. The assessment of psychological readiness for research activities in mathematics was carried out on the basis of the developed nine parameters of scientific potential. The presented results allow us to pre-set the framework of boundary conditions in order to minimize the imprinting time of a hybrid intelligent system (including the selection of the neural network topology). For all three groups of criteria, differences by gender were established, for example, by the parameter "value orientations" (temp  = 2.26 > tcr = 2.02); by the parameter "creativity" (χemp2 = 6,02 ≥ χcr2 (0,05;2) = 5,99). And also by the type of educational institution, for example, by the parameter “motivation to achieve the result” (φemp = 0,186 > φcr = 1,64). Conclusion. The results of the research are of practical value, as they serve as a technological basis for establishing the boundaries and boundary conditions of the most significant parameters for the effective realization of scientific potential, expressed in the work of a specialized web interface created with the student's personal account.


Sign in / Sign up

Export Citation Format

Share Document