Search results for " surveillance"
showing 8 items of 388 documents
Musculoskeletal disorders and incongruous postures in workers on ropes: A pilot study
2023
Background: Occupational hazards believed to cause musculoskeletal disorders in rope workers are traditionally associated with maintaining incongruous postures for prolonged periods of time. Design and methods: A cross-sectional survey was conducted on 132 technical operators in the wind energy and acrobatic construction sectors, who work on ropes, analysing the ergonomic characteristics of the environments, the way in which tasks are carried out, the strain perceived by individual workers, and assessing the presence of any musculoskeletal disorders (MSDs) by means of an objective examination focused on the anatomical districts that were the object of our study. Results: Analysis of the dat…
Combined hexavalent diphtheria-tetanus-acellular pertussis-hepatitis B-inactivated poliovirus-Hemophilus influenzae type b vaccine; Infanrix™ hexa: T…
2014
Infant vaccination using 2-dose priming at 3 and 5 mo of age with a booster at 11–12 mo of age was pioneered in Italy. The 3-5-11 schedule is now used in a growing number of European countries. Infanrix™ hexa (DTPa-HBV-IPV/Hib, GlaxoSmithKline Vaccines) was first licensed for use in 2000 and has been the only pediatric hexavalent vaccine available since 2005. We reviewed available clinical trial data describing the immunogenicity of DTPa-HBV-IPV/Hib when administered at 3, 5, and 11 mo of age, and conducted an analysis of safety using global and Italian post-marketing surveillance data. In Italy, DTPa-HBV-IPV/Hib has a demonstrated safety record extending over a decade of use, it has been a…
Bcl-xL as a Modulator of Senescence and Aging
2021
Many features of aging result from the incapacity of cells to adapt to stress conditions. When cells are overwhelmed by stress, they can undergo senescence to avoid unrestricted growth of damaged cells. Recent findings have proven that cellular senescence is more than that. A specific grade of senescence promotes embryo development, tissue remodeling and wound healing. However, constant stresses and a weakening immune system can lead to senescence chronicity with aging. The accumulation of senescent cells is directly related to tissue dysfunction and age-related pathologies. Centenarians, the most aged individuals, should accumulate senescent cells and suffer from their deleterious effects,…
Developmental pathways of language development : a longitudinal predictive study from prelinguistic stage to outcome at school entry
2017
This research focused on the pathways of development during the prelinguistic stage and from prelinguistic development to later language ability. The first goal was to follow and describe the development of several prelinguistic communication skills during the first two years of life (Studies I and II). The second goal was to examine the predictive relations between this development and language ability and difficulties, as well as memory, up to school age (Studies I, II, and III). The third goal evaluated the feasibility of parental screening in identifying children at risk for language and communication difficulties (Studies I, II, and III). Prelinguistic skills were followed with a paren…
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications
2022
The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications
2022
It is estimated that over 1 billion Closed-Circuit Television (CCTV) cameras are operational worldwide. The advertised main benefits of CCTV cameras have always been the same; physical security, safety, and crime deterrence. The current scale and rate of deployment of CCTV cameras bring additional research and technical challenges for CCTV forensics as well, as for privacy enhancements. This paper presents the first end-to-end system for CCTV forensics and feasible privacy-enhancing applications such as exposure measurement, CCTV route recovery, CCTV-aware routing/navigation, and crowd-sourcing. For this, we developed and evaluated four complex and distinct modules (CCTVCV [1], OSRM-CCTV [2],…
How to apply privacy by design in osint and big data analytics?
2019
In a world where technology grows exponentially, more information is available to us every day. States and their governments have collected information on their citizens for a long time now. On the other hand, people give out more and more personal information voluntarily through social media. Information available on the Internet is easier to analyze with modern technologies and the original source of information is also easier to track down. Information is available to all of us and that information can be used to investigate personal data, defeat competitors in a corporate world, solve crimes or even win wars. This study analyses open source intelligence (OSINT) and big data analytics (B…