با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Smart mask – Wearable IoT solution for improved protection and personal health
ماسک هوشمند – راه حل پوشیدنی اینترنت اشیا برای بهبود حفاظت و سلامت شخصی-2022 The use of face masks is an important way to fight the COVID-19 pandemic. In this paper, we
envision the Smart Mask, an IoT supported platform and ecosystem aiming to prevent and control
the spreading of COVID-19 and other respiratory viruses. The integration of sensing, materials,
AI, wireless, IoT, and software will help the gathering of health data and health-related event
detection in real time from the user as well as from their environment. In the larger scale, with the
help of AI-based analysis for health data it is possible to predict and decrease medical costs with
accurate diagnoses and treatment plans, where the comparison of personal data to large-scale
public data enables drawing up a personal health trajectory, for example. Key research prob-
lems for smart respiratory protective equipment are identified in addition to future research di-
rections. A Smart Mask prototype was developed with accompanying user application, backend
and heath AI to study the concept. keywords: کووید-۱۹ | محاسبات لبه | اینترنت اشیا | سلامت شخصی | پوشیدنی | COVID-19 | Edge computing | IoT | Personal health | Wearable |
مقاله انگلیسی |
2 |
An extensive survey on finger and palm vein recognition system
یک بررسی گسترده در مورد سیستم تشخیص ورید انگشت و کف دست-2021 The evolution of the internet drastically increases the utilization of online data, which needs security using unique identification. The traditional methods of security, such as password, personal identification number (PIN), could not reach the user-friendly requirement of the users. There is a necessity to provide high security for the data by using a unique identification system. Today, in many situations, biometrics plays a crucial role in today’s authentication and recognition. Biometrics deals with unique physical and behavioral characteristics. Fingerprint, face recognition, iris/ retinal recognition, voice recognition and vein recognition are some of the biometrics which is used for authentication purpose. In this paper, we highlight different processes that involve finger veins and palm veins recognition and authentication. These finger and palm vein is identified as one of the important unique identifications that can be used for the authentication which provide the security for the important personal data. In this study, we noticed that the advantage of using a vein for the authentication process is that it provides high security because it can be detected even when a finger or palm got injured, and it works only when the person is alive otherwise the authentication fails.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the International Conference on Advances in Materials Research – 2019. Keywords: Authentication | Biometrics | Finger recognition | Palm vein recognition | Personal identification number |
مقاله انگلیسی |
3 |
IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic
آدرسهای IP در زمینه شواهد دیجیتالی در پرونده کیفری و مدنی جمهوری اسلواکی-2020 Use of IP addresses by courts in their decisions is one of the issues with growing importance. This applies
especially at the time of the increased use of the internet as a mean to violate legal provisions of both
civil and criminal law. This paper focuses predominantly on two issues: (1) the use of IP addresses as
digital evidence in criminal and civil proceedings and possible mistakes in courts approach to this
specific evidence, and (2) the anonymisation of IP addresses in cases when IP addresses are to be
considered as personal data. This paper analyses the relevant judicial decisions of the Slovak Republic
spanning the time period from 2008 to 2019, in which the relevant courts used the IP address as evidence.
On this basis, the authors formulate their conclusions on the current state and developing trends
in the use of digital evidence in judicial proceedings. The authors demonstrate the common errors that
occur in the courts’ decisions as regards the use of IP addresses as evidence in the cases of the IP addresses
anonymisation, usage of the in dubio pro reo principle in criminal proceedings, and the relationship
between IP addresses and devices and persons. Keywords: IP address | Digital evidence | Criminal and civil proceedings | Privacy | Personal data | Anonymisation |
مقاله انگلیسی |
4 |
Addressing AI ethics through codification
پرداختن به اخلاق هوش مصنوعی از طریق تدوین-2020 AI ethics rapidly becomes one of the most
significant issues in assessing the impact of AI on social
welfare and development. A technology that does not meet
the ethical criteria of a society is likely to face a long and
hard process of acceptance regardless of its potentially
tremendous positive potential for long-term socio-economic
development. The development of artificial intelligence (AI)
technologies is undoubtedly associated with the need to
answer ethical questions, and the perception of AI in society
will be largely determined by compliance with ethical
criteria, whether written or not. At the same time, AI as a
technological system itself does not have a natural ethical
content; the authors believe that in practice ethical concerns
may be addressed by means of ethical codes and compliance
rules that articulate what constitutes ethical behaviour in
specific areas of application of AI systems. Such a set of rules
(a code for AI ethics) could be followed by all actors
throughout the complete lifecycle of the system starting with
the design stage. The specification of general ethical
principles as industry-specific codes of practice would also
facilitate classification, evaluation and measurement of
systems, both at the technical level and at the level of public
perception and trust. The article considers examples of codification of ethical
principles and offers several approaches for practical use in
solving issues of ethics in the field of AI at the national and
international level. Keywords: ethics | AI | codification | regulation | standards | responsibility | bias | trustworthiness | personal data protection | international cooperation in AI | soft regulation |
مقاله انگلیسی |
5 |
Efficiency investigation and optimization of contract management business processes in a workwear rental and laundry service company
297-S235197892030843X-2020 The paper presents business processes business process models in the area of contract management in a workwear rental and laundry service company. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team consists of IT specialist, subject-matter experts and employees of the rental company. Business models presented in the article are described in accordance with the assumptions of BPMN (Business Process Model and Notation).The models of the rental company’s activities were created in the ARIS software environment, where the simulation of all necessary operations was carried out. As the result of simulation experiments a number of interesting parameters were obtained. There is no possibility to obtain these parameters in the static analysis of a business process. They can be only determined by the dynamic analysis. A sample results show the frequency of various significant events, accumulated time corresponding to activities performance, number of actions being performed by different people, overall working time for employees, the degree of the human factor use, and the global cost connected with different activities. The following process models have been developed, simulated and optimized: Release of an employee, Locker room change request, Clothing size change request for an employee, Cabinet location change request, Clothing sets amount change request, Personal data change, Employment process, Registration of the own clothing for an employee, New cabinet order, New set of keys set up, Transfer of an employee, Clothing repair request.© 2020 The Authors. Published by Elsevier B.V.This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)Peer-review under responsibility of the scientific committee of the 1st International Conference on Optimization-Driven Architectural Design Keywords: automation | production planning | industrial enterprise | System Analysis and Program Development | mastering. |
مقاله انگلیسی |
6 |
Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments
به سمت امنیت و حفظ حریم خصوصی برای هوش مصنوعی لبه در محیط های بازاریابی دیجیتال مبتنی بر IoT / IoE-2020 Abstract—Edge Artificial Intelligence (Edge AI) is a crucial
aspect of the current and futuristic digital marketing Internet of
Things (IoT) / Internet of Everything (IoE) environment.
Consumers often provide data to marketers which is used to enhance
services and provide a personalized customer experience (CX).
However, use, storage and processing of data has been a key concern.
Edge computing can enhance security and privacy which has been
said to raise the current state of the art in these areas. For example,
when certain processing of data can be done local to where
requested, security and privacy can be enhanced. However, Edge AI
in such an environment can be prone to its own security and privacy
considerations, especially in the digital marketing context where
personal data is involved. An ongoing challenge is maintaining
security in such context and meeting various legal privacy
requirements as they themselves continue to evolve, and many of
which are not entirely clear from the technical perspective. This
paper navigates some key security and privacy issues for Edge AI in
IoT/IoE digital marketing environments along with some possible
mitigations. Keywords: edge security | edge privacy | edge AI | edge intelligence | artificial intelligence | AI | machine learning | ML | IoT | IoE | edge | cybersecurity | legal | law | digital marketing | smart | GDPR | CCPA | security | privacy |
مقاله انگلیسی |
7 |
Options towards a global standard for the protection of individuals with regard to the processing of personal data
گزینه های استاندارد جهانی برای حفاظت از افراد در مورد پردازش داده های شخصی-2020 Purpose: States have adopted a number of international instrument dedicated in full or in part to privacy and data protection, at multilateral or regional levels, in binding or non-binding form. This article discusses the potential and context of the emergence of a possible
global standard on data protection focusing on the 1981 Council of Europe Convention for the Protection of Individuals with Regard to
the Processing of Personal Data, as amended (Convention 108+).
Aims: With due regard being paid to the dynamic technological and business environment that surrounds policy-making in the field of personal data protection, this article attempts to look at some strengths, weaknesses, opportunities and challenges of Convention 108+ in the competition for becoming a global standard. It seeks to identify possible future directions and priorities, taking into account the evolving nature of international relations in a more multipolar world where multilateralism is less obviously the preferred approach to international issues. Findings: Informed by an in-depth study of relevant international instruments relating to the right to privacy this article explores several strengths and opportunities that may be built on to promote a global role for Convention 108+, but also some weaknesses and threats. In sum, it concludes that the Convention is relatively well placed to ambition becoming a global standard. |
مقاله انگلیسی |
8 |
Data protection law beyond identifiability? Atmospheric profiles, nudging and the Stratumseind Living Lab
قانون حفاظت از داده ها فراتر از قابلیت شناسایی؟ پروفایل های جوی، تلنگر زدن و آزمایشگاه زنده Stratumseind-2020 The deployment of pervasive information and communication technologies (ICTs) within
smart city initiatives transforms cities into extraordinary apparatuses of data capture. ICTs
such as smart cameras, sound sensors and lighting technology are trying to infer and affect
persons’ interests, preferences, emotional states, and behaviour. It should be no surprise
then that contemporary legal and policy debates on privacy in smart cities are dominated
by a debate focused on data and, therefore, on data protection law. In other words, data protection law is the go-to legal framework to regulate data processing activities within smart
cities and similar initiatives. While this may seem obvious, a number of important hurdles
might prevent data protection law to be (successfully) applied to such initiatives. In this contribution, we examine one such hurdle: whether the data processed in the context of smart
cities actually qualifies as personal data, thus falling within the scope of data protection
law. This question is explored not only through a theoretical discussion but also by taking
an illustrative example of a smart city-type initiative – the Stratumseind 2.0 project and its
living lab in the Netherlands (the Stratumseind Living Lab; SLL). Our analysis shows that the
requirement of ‘identifiability’ might be difficult to satisfy in the SLL and similar initiatives.
This is so for two main reasons. First, a large amount of the data at stake do not qualify
as personal data, at least at first blush. Most of it relates to the environment, such as, data
about the weather, air quality, sound and crowding levels, rather than to identified or even
likely identifiable individuals. This is connected to the second reason, according to which,
the aim of many smart city initiatives (including the SLL) is not to identify and target specific
individuals but to manage or nudge them as a multiplicity – a combination of the environment, persons and all of their interactions. This is done by trying to affect the ‘atmosphere’
on the street. We thus argue that a novel type of profiling operations is at stake; rather than
relying on individual or group profiling, the SLL and similar initiatives rely upon what we have called ‘atmospheric profiling’. We conclude that it remains highly uncertain, whether
smart city initiatives like the SLL actually process personal data. Yet, they still pose risks for
a wide variety of rights and freedoms, which data protection law is meant to protect, and a
need for regulation remains. Keywords: Data protection | Personal data | Smart city | Profiling | Nudging | Stratumseind |
مقاله انگلیسی |
9 |
Human-centric data protection laws and policies: A lesson from Japan
قوانین و سیاستهای حفاظت از دادههای انسان محور: درسی از ژاپن-2020 This article examines the human dignity defined in Convention 108+ and, from a Japanese
perspective, explores the possibility of a universal philosophy of data protection.
The recent human resources scandal (the Rikunabi case) in Japan has made stakeholders to
realise the importance of the basic philosophy of data protection. Convention 108+ declared
‘human dignity’ to prohibit an instrumental treatment of individuals in processing personal
data, and thereby, in a positive sense, place the human in the centre of data processing
cycle. Although there is no concept equivalent to ‘human dignity’ under the Japanese data
protection laws, due to social norms in Japan, the human-centric approach is supported by
recent Artificial Intelligence (AI) guidelines in Japan.
The basic idea of the relationship between humans and machines is universal, even if the
laws are local, in bridging the different legal regimes. The promise of Convention 108+ seems
to take the processing of massive volumes of personal data, sorting out the individuals, and
standardising the personality as its specific targets, and the defence of digital humanity as
its noble ideal. In this sense, Convention 108+ has a universal value with its human dignity.
Keywords: Human-centric data protection | Human dignity | Japanese data protection laws | Artificial intelligence | Convention 108+ |
مقاله انگلیسی |
10 |
Dead ringers? Legal persons and the deceased in European data protection law
زنگ های مرده؟ اشخاص حقوقی و متوفی در قانون حفاظت از داده های اروپا-2020 Notwithstanding suggestions that the concrete treatment of legal and deceased person data
during European data protection’s development has been broadly comparable, this article
finds that stark divergences are in fact apparent. Justification for the inclusion of both categories has rested on a claimed linkage to living natural person interests. However, despite
early fusion, legal persons have been increasingly seen to have qualitatively different information entitlements compared to natural persons, thereby leaving European data protection with a very limited and indirect role here. In contrast, living natural persons and the
deceased have not been conceived as normatively dichotomous and since the 1990s there
has been growing interest both in establishing sui generis direct protection for deceased person data and also indirect inclusion through a link with living natural persons. Whilst the
case for some indirect inclusion is overwhelming, a broad approach to the inter-relational
nature of data risks further destabilizing the personal data concept even in relation to living persons alone. Given that jurisdictions representing almost half of the EEA’s population
now provide some direct protection and the challenges of managing digital data on death
continue to grow, the time may be ripe for a ‘soft’ recommendation on direct protection in
this area. Drawing on existing law and scholarship, such a recommendation could seek to
specify the role of both specific control rights and diffuse confidentiality obligations, the criteria for time-limits in each case and the need for a balance with other rights and interests
which recognises the significantly decreasing interest in protection over time.
Keywords: Companies | Confidentiality | Personal data | Privacy | Testamentary interests | Reputation |
مقاله انگلیسی |