SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING [PDF]
Venkata N Inukollu+2 more
openalex +1 more source
V‐NeuroStack: Open‐source 3D time stack software for identifying patterns in neuronal data
Abstract Understanding functional correlations between the activities of neuron populations is vital for the analysis of neuronal networks. Analyzing large‐scale neuroimaging data obtained from hundreds of neurons simultaneously poses significant visualization challenges.
Ashwini G. Naik+6 more
wiley +1 more source
ABSTRACT Objective This study aimed to examine the psychometric properties, including factor structure, internal consistency, and measurement invariance of the Eating Pathology Symptoms Inventory (EPSI) in a large national sample of transgender and gender‐diverse (TGD) adults. Method The sample consisted of 2098 TGD adults—including transgender men (n =
Jason M. Nagata+10 more
wiley +1 more source
Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks. [PDF]
Almuseelem W.
europepmc +1 more source
Comorbidity trajectories before and after the diagnosis of heart failure: A UK Biobank cohort study
Time of diagnosis of comorbidities in relation to heart failure. COPD, chronic obstructive pulmonary disease; MI, myocardial infarction. Abstract Aims Heart failure (HF) is frequently associated with multiple comorbidities. We aimed to define their trajectory of accrual to identify opportunities for disease prevention. Methods and results We identified
Hugo MacGowan+12 more
wiley +1 more source
Blockchain driven medical image encryption employing chaotic tent map in cloud computing. [PDF]
Shahid U+5 more
europepmc +1 more source
Data Security and Privacy Concerns in Cloud Computing [PDF]
Masrat Yousuf Pandith
openalex +1 more source
A blockchain-integrated chaotic fractal encryption scheme for secure medical imaging in industrial IoT settings. [PDF]
Inam S+4 more
europepmc +1 more source
Ensuring Privacy and Security in Data Sharing under Cloud Environment
Shilpa Elsa Abraham, R. Gokulavanan
openalex +1 more source
Recommendations and Best Practices for Cloud Enterprise Security [PDF]
Muthu Ramachandran, Victor Chang
openalex +1 more source