The scientific literature peer review workflow is under strain because of the constant growth of submission volume. One response to this is to make initial screening of submissions less time ...intensive. Reducing screening and review time would save millions of working hours and potentially boost academic productivity. Many platforms have already started to use automated screening tools, to prevent plagiarism and failure to respect format requirements. Some tools even attempt to flag the quality of a study or summarise its content, to reduce reviewers’ load. The recent advances in artificial intelligence (AI) create the potential for (semi) automated peer review systems, where potentially low-quality or controversial studies could be flagged, and reviewer-document matching could be performed in an automated manner. However, there are ethical concerns, which arise from such approaches, particularly associated with bias and the extent to which AI systems may replicate bias. Our main goal in this study is to discuss the potential, pitfalls, and uncertainties of the use of AI to approximate or assist human decisions in the quality assurance and peer-review process associated with research outputs. We design an AI tool and train it with 3300 papers from three conferences, together with their reviews evaluations. We then test the ability of the AI in predicting the review score of a new, unobserved manuscript, only using its textual content. We show that such techniques can reveal correlations between the decision process and other quality proxy measures, uncovering potential biases of the review process. Finally, we discuss the opportunities, but also the potential unintended consequences of these techniques in terms of algorithmic bias and ethical concerns.
Abstract
The growing integration of software within medical devices introduces the potential for cybersecurity threats. How significant is this risk, and to what extent are citizens currently ...exposed? In this study, we adopt a new data-gathering methodology using datasets provided in Open Contracting Data Standard (OCDS). This allowed us to perform an extensive analysis across over 36 countries within a 12-year range, searching 92 million public administration purchase records for potentially vulnerable medical devices. The findings reveal a concerning landscape wherein numerous medical devices purchased by national health services possessed or still possess 661 distinct vulnerabilities—more than half of which are deemed critical or high-severity. These vulnerabilities enable relatively simple attacks to impact data confidentiality, integrity, and accessibility severely. Even if patches were applied immediately upon discovery, these vulnerabilities would still result in roughly 3.2 years of system exposure from the time a device is purchased until a software vulnerability is announced, with all classes of devices affected, including high-risk IIB and III devices which accounts for 74% of instances. While a full analysis requires interactivity, this noninvasive methodology enables a large-scale study, emphasizing the need to move faster from the safety to the security of medical devices.
The design of wireless sensor nodes for animal tracking is a multidisciplinary activity that presents several research challenges both from a technical and a biological point of view. A monitoring ...device has to be designed accounting for all system requirements including the specific characteristics of animals and environment. In this work we present some aspects of the design of a wireless sensor node to track and monitor the pink iguana of the Galápagos: a recently discovered species living in remote locations at the Galápagos Islands. The few individuals of this species live in a relatively small area that lacks of any available communication infrastructure. We present and discuss the energy harvesting architecture and the related energy management logic. We also discuss the impact of packaging on the sensor performance and the consequences of the limited available energy on the GPS tracking.
World population and life expectancy have increased steadily in recent years, raising issues regarding access to medical treatments and related expenses. Through last-generation medical sensors, NFC ...(Near Field Communication) and radio frequency identification (RFID) technologies can enable healthcare internet of things (H-IoT) systems to improve the quality of care while reducing costs. Moreover, the adoption of point-of-care (PoC) testing, performed whenever care is needed to return prompt feedback to the patient, can generate great synergy with NFC/RFID H-IoT systems. However, medical data are extremely sensitive and require careful management and storage to protect patients from malicious actors, so secure system architectures must be conceived for real scenarios. Existing studies do not analyze the security of raw data from the radiofrequency link to cloud-based sharing. Therefore, two novel cloud-based system architectures for data collected from NFC/RFID medical sensors are proposed in this paper. Privacy during data collection is ensured using a set of classical countermeasures selected based on the scientific literature. Then, data can be shared with the medical team using one of two architectures: in the first one, the medical system manages all data accesses, whereas in the second one, the patient defines the access policies. Comprehensive analysis of the H-IoT system can be useful for fostering research on the security of wearable wireless sensors. Moreover, the proposed architectures can be implemented for deploying and testing NFC/RFID-based healthcare applications, such as, for instance, domestic PoCs.
Along with the creation of medical profiles of patients, Electronic Health Records have several secondary missions, such as health economy and research. The recent, increasing adoption of a common ...standard, i.e., the Fast Healthcare Interoperability Resources (FHIR), makes it easier to exchange medical data among the several parties involved, for example, in an epidemiological research activity. However, this exchange process is hindered by regulatory frameworks due to privacy issues related to the presence of personal information, which allows patients to be identified directly (or indirectly) from their medical data. When properly used, de-identification techniques can provide crucial support in overcoming these problems. FHIR-DIET aims to bring flexibility and concreteness to the implementation of de-identification of health data, supporting many customised data-processing behaviours that can be easily configured and tailored to match specific use case requirements. Our solution enables faster and easier cooperation between legal and IT professionals to establish and implement de-identification rules. The performance evaluation demonstrates the viability of processing hundreds of FHIR patient information data per second using standard hardware. We believe FHIR-DIET can be a valuable tool to satisfy the current regulation requirements and help to create added-value for the secondary use of healthcare data.
In the past few years, blockchain technology has emerged in numerous smart grid applications, enabling the construction of systems without the need for a trusted third party. Blockchain offers ...transparency, traceability, and accountability, which lets various energy management system functionalities be executed through smart contracts, such as monitoring, consumption analysis, and intelligent energy adaptation. Nevertheless, revealing sensitive energy consumption information could render users vulnerable to digital and physical assaults. This paper presents a novel method for achieving a dual balance between privacy and transparency, as well as accountability and verifiability. This equilibrium requires the incorporation of cryptographic tools like Secure Multiparty Computation and Verifiable Secret Sharing within the distributed components of a multi-channel blockchain and its associated smart contracts. We corroborate the suggested architecture throughout the entire process of a Demand Response scenario, from the collection of energy data to the ultimate reward. To address our proposal's constraints, we present countermeasures against accidental crashes and Byzantine behavior while ensuring that the solution remains appropriate for low-performance IoT devices.
Autonomous Underwater Vehicles (AUVs) are assuming an important role in the monitoring and mapping of marine ecosystems, especially for their ability to explore harsh environments. AUV swarm can ...collect data operating autonomously for long periods enabling new applications in this field. However, the mission duration is usually limited also by the high power consumption required for acoustic transmissions. A new generation of devices complements the acoustic modem with an optical modem that can provide a communication channel with higher capacity and lower power consumption with respect to the acoustic channel. However, the optical link that uses the visible light is very sensitive to the water turbidity that can strongly limit the link coverage. In this paper, we evaluate the networking performances of the Venus vessel, a real AUV prototype equipped with an acoustical modem and an optical modem. The presented analysis aims to evaluate key system parameters allowing to select the best way to set up network communications according to the surrounding conditions (e.g., quality of water) and to the application requirements. Simulation results account for the case of ports or basins, where the water quality is poor and the use of the optical modem is strongly limited by distance. We evaluate system performance in terms of transmission delay in the network and we also provide a power–capacity trade-off.
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric ...devices to environmental sensors that can be opportunistically used to feed behavioural authentication systems. How to integrate all this information in a reliable way to get a continuous authentication service presents several open challenges. Among these: how to combine semi-trusted information coming from non-tamper-proof sensors, where to store such data avoiding a single point of failure, how to analyse data in a distributed way, which interface to use to provide an authentication service to a multitude of different services and applications. In this paper, we present a Blockchain-based architectural solution of a distributed system able to transform IoT interactions into useful data for an authentication system. The design includes: (i) a security procedure to certify users’ positions and identities, (ii) a secure storage to hold this information, and (iii) a service to dynamically assign a trust level to a user’s position. We call this system “Secure Path”.
Lyapunov optimization is a powerful control technique that allows the stabilisation of real or virtual queues while optimizing a performance objective. The method has become popular due to the fact ...that it applies a greedy optimization that does not rely on any statistical knowledge of the underlying process. Moreover, the technique includes a parameter <inline-formula> <tex-math notation="LaTeX">V </tex-math></inline-formula> to control the stability vs utility trade-off, offering a theoretical bound on the performance. However, in its basic form, the optimization ensures that queues are only asymptotically stable, and there is no guarantee that queues will stay below a given threshold at all times. This can affect the applicability of this technique to many applications with queues with limited capacity or, equivalently, systems with hard delay constraints. In this letter we analyse the conditions under which it is possible to set a queue maximum capacity constraint, and we provide a technique to set an extra bound on the parameter <inline-formula> <tex-math notation="LaTeX">V </tex-math></inline-formula> to enforce such constraint.
Invasive alien species control is recognized worldwide as a priority action to preserve global biodiversity. However, a lack of general life history knowledge for threatened species can impede the ...effectiveness of conservation actions. Galápagos pink land iguanas (Conolophus marthae) are endemic to Wolf Volcano, Galápagos, Ecuador. These iguanas are threatened by invasive alien species, particularly feral cats, that may affect their small population size. To guarantee the long-term survival of C. marthae, the Galápagos National Park Directorate is considering, along with an ongoing campaign of feral cat control, the implementation of a head-start program. However, the success of this management strategy necessarily relies on the identification of pink iguana nesting grounds, which were still unknown at the onset of this study. We modeled the movement patterns of male and female iguanas during the reproductive season, using location data collected from custom-made remote tracking devices installed on adult pink iguanas in April 2021. We first calculated for each individual the vector of distances from its starting location, which was defined as net displacement. We then used net displacement as the response variable in a generalized additive mixed model with day of the year as the predictor. Based on the hypothesis that males and females may behaviorally differ after mating, we looked for female-specific migratory behavior suggesting females were moving toward nesting areas. The results obtained confirmed our hypothesis, as females exhibited a distinct migratory behavior, reaching a small plateau area inside of Wolf Volcano’s caldera and ca. 400 m below the volcano’s northern rim. Moreover, once inside the caldera, females displayed a more aggregated distribution pattern. The movement data obtained allowed Galápagos National Park rangers to locate individual pink iguana nests and subsequently to sight and collect the first observed hatchlings of the species. This work constitutes a necessary baseline to perform dedicated studies of pink iguana nests and emerging hatchling iguanas, which is an essential step toward the development of an effective head-start program.