Explore chapters and articles related to this topic
Differential privacy for edge computing-based smart grid operating over blockchain
Published in Muhammad Maaz Rehan, Mubashir Husain Rehmani, Blockchain-enabled Fog and Edge Computing, 2020
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
The field of privacy preservation is not new and researchers have searched for the most optimal way to preserve privacy. In the modern technological world, it started from sending encoded messages; now we have intelligent privacy-preserving strategies that can make decisions themselves. In this subsection, we discuss four major privacy-preserving strategies (i.e., anonymisation, encryption-based privacy, swapping, and differential privacy) of the current era along with mentioning their advances, features, drawbacks, functioning, and many other properties.Anonymisation: Let us begin the discussion with one of the pioneering privacy-preservation strategies for statistical databases, Anonymisation [17]. Anonymisation can be defined as a method of protecting statistical databases during analysis by removing personally identifiable information (PII) from them. This PII can vary from the privacy requirement to the type of databases (e.g., in some databases age could be PII, but in others it might be termed as PII.) So, finding exact PII that ensure maximum privacy has always remained a challenging task for researchers. To date, plenty of anonymisation techniques have been proposed by researchers ranging from k-anonymity [7] to onion routing [18]. However, k-anonymity [7], l-diversity [8], and t-closeness [9] are still the three most famous anonymisation-based privacy strategies. Anonymisation works on the principle of finding and removing direct identifiers that can further be used to invade the privacy of users. No doubt, anonymisation remained an effective technique for many years in the field of privacy preservation, but as a result of the advancement in modern machine learning algorithms, attackers have strengthened and now protecting a database by anonymising the databases is not enough. Attackers can carry out data correlation attacks and link attacks to invade privacy and can easily de-anonymise data by relating it with other anonymised data sets. Therefore, researchers are trying to integrate anonymisation with some other privacy-preservation strategies to ensure complete privacy.Swapping: Another well-known privacy-preserving strategy that is being used by researchers to protect statistical and real-time privacy is swapping [19]. In swapping, randomly selected data values are swapped with each other to ensure that the output database becomes anonymised and no adversary can link data records with some individual with confidence. One major hurdle that is faced by researchers during this implementation is to find the most adequate swappable subsets that will provide maximum privacy. This technique is not developed much because of lack of theoretical background, but plenty of variants have been discussed in literature, for example, equi-width [10], GroupSwap [11], and ValueSwap [12].
Semi-automatic 3D reconstruction of middle and inner ear structures using CBCT
Published in Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 2023
Florian Beguet, Thierry Cresson, Mathieu Schmittbuhl, Cédric Doucet, David Camirand, Philippe Harris, Jean-Luc Mari, Jacques de Guise
Since no reconstruction method exists regarding middle and inner ear structures in the literature without the use of a database and because actual reconstruction techniques do not allow for speed and precision of process, we looked at reconstruction method used for other anatomical structures. Some authors proposed the use of an atlas-based registration (as suggested by Noble et al. (2009)), followed by a fine deformation to segment 3D structures, such as kidneys (Chav et al. 2014), livers (Chartrand et al. 2016) or teeth (Harrison et al. 2019). These algorithms minimise the cost and the distance on the surface of the object to be segmented to obtain the surface of the boundary while determining the most plausible geometric solution in the presence of certain discontinuities of intensities or artefacts at the surface of the object. The advantage of these approaches consist in no required statistical database. They also are better adapted for non-common morphological structures or for subjects presenting congenital malformations. Cerrolaza et al. (2014) has highlighted the interest of the multi-structure segmentation for the inner structures of the temporal bone. This problem is also common in the medical field, with algorithms such as Kainmueller et al. (2009) that simultaneously segment the interface of the femoral head and acetabulum. Thus, a methodology based on prior shapes seems to be a means of adapting to morphological variability with control of neighbouring structures using a multi-structure approach.
Innovation has the power: the case of the Italian automotive sector during economic downturns
Published in International Journal of Logistics Research and Applications, 2021
Silvia Rocchetta, Neha B. Upadhayay
PATSAT (Patent Statistical Database) is a register of patent records from the European Patent Office (EPO). For the purpose of this study, it provides information about the patenting activities of the firms included in our sample. AIDA, is a service maintained by Bureau Van Dijk (2015) and contains detailed information about financial accounting data on Italian private and public firms. The edition at our disposal (2015) covers a time span of 9 years, from 2005 to 2014. We restrict our analysis to the period 2005–2012 to have a time interval with a good coverage of the variables of interest. In line with previous researches (among others Bianchini, Bottazzi, and Tamagni 2017), we excluded those businesses that entered the market after 2008 because our main concern is to compare the behaviour of the firms before and during the financial crisis.
Planning and financing the home and facility-based care using the multiple decrement approach
Published in Journal of Decision Systems, 2018
Valerija Rogelj, David Bogataj
Understanding individual transitions into and out of states of disability, which should be described by a multi-state transition model severe enough to trigger long-term care insurance payouts, is essential to product pricing and development. Such data are not available in any public statistical database. But to develop the Silver Economy in EU member states, multi-state transition demographic tables on functional capacity are essential for planning long-term care on national and insurance company levels and also on regional and municipality levels where it is needed to improve the spatial planning. To determine the parameters of multiple decrement and associated change in a dwelling, especially to determine the probabilities of transitions and costs associated with each of nodes in the graph, also qualitative analyses like those done by Black and Dobbs (2015), are required.