Search results for "tiet"
showing 10 items of 3420 documents
Patented intelligence: Cloning human decision models for Industry 4.0
2018
Industry 4.0 is a trend related to smart factories, which are cyber-physical spaces populated and controlled by the collective intelligence for the autonomous and highly flexible manufacturing purposes. Artificial Intelligence (AI) embedded into various planning, production, and management processes in Industry 4.0 must take the initiative and responsibility for making necessary real-time decisions in many cases. In this paper, we suggest the Pi-Mind technology as a compromise between completely human-expert-driven decision-making and AI-driven decision-making. Pi-Mind enables capturing, cloning and patenting essential parameters of the decision models from a particular human expert making …
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
2017
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…
Towards a Security Competence of Software Developers
2020
Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
Safety of Novel Amino-5-laevulinate Photosensitizer Precursors in Photodynamic Therapy for Healthy Human Skin.
2015
Peer reviewed
GABA and Gap Junctions in the Development of Synchronized Activity in Human Pluripotent Stem Cell-Derived Neural Networks.
2017
The electrical activity of the brain arises from single neurons communicating with each other. However, how single neurons interact during early development to give rise to neural network activity remains poorly understood. We studied the emergence of synchronous neural activity in human pluripotent stem cell (hPSC)-derived neural networks simultaneously on a single-neuron level and network level. The contribution of gamma-aminobutyric acid (GABA) and gap junctions to the development of synchronous activity in hPSC-derived neural networks was studied with GABA agonist and antagonist and by blocking gap junctional communication, respectively. We characterized the dynamics of the network-wide…
Stopping injection attacks with code and structured data
2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed
Physical Activity and Nutrition INfluences In ageing (PANINI): consortium mission statement
2018
First paragraph: Current demographic trends indicate that by the year 2020, almost one in five of the European population will be aged 65 years or over. Although life expectancy is increasing by 2 years per decade, the period of life spent in good health is not keeping pace and most Europeans spend their last decade in poor health. Consequently, there is an urgent need to understand how lifestyle factors can influence age-related changes from gene to society level and how they may be integrated into a net effect of healthy ageing. It is also crucial to develop and validate interventions and health policies to ensure that more of our older adults have a healthy and active later life. This is…
The effects of acceptance and commitment therapy on eating behavior and diet delivered through face-to-face contact and a mobile app: a randomized co…
2018
Background Internal motivation and good psychological capabilities are important factors in successful eating-related behavior change. Thus, we investigated whether general acceptance and commitment therapy (ACT) affects reported eating behavior and diet quality and whether baseline perceived stress moderates the intervention effects. Methods Secondary analysis of unblinded randomized controlled trial in three Finnish cities. Working-aged adults with psychological distress and overweight or obesity in three parallel groups: (1) ACT-based Face-to-face (n = 70; six group sessions led by a psychologist), (2) ACT-based Mobile (n = 78; one group session and mobile app), and (3) Control (n = 71; …
Transcriptional Differences between Diapausing and Non-Diapausing D. montana Females Reared under the Same Photoperiod and Temperature
2016
Background A wide range of insects living at higher latitudes enter diapause at the end of the warm season, which increases their chances of survival through harsh winter conditions. In this study we used RNA sequencing to identify genes involved in adult reproductive diapause in a northern fly species, Drosophila montana. Both diapausing and non-diapausing flies were reared under a critical day length and temperature, where about half of the emerging females enter diapause enabling us to eliminate the effects of varying environmental conditions on gene expression patterns of the two types of female flies. Results RNA sequencing revealed large differences between gene expression patterns of…